Search Results (4765)
Documents on internet e commerce
Show: results per page
|Delaware Enacts Package Of Internet Data Laws|
Ieuan Jolly; Loeb & Loeb LLP;
September 28, 2015, previously published on September 2015Joining the collection of states with online privacy laws, Delaware has enacted a package of statutes governing the collection, storage and use of the personal information of Delaware residents by websites, Internet and cloud service providers, and Internet and mobile applications. While the...
|An Ounce of Prevention...|
Geoffrey G. Hemphill; Vandeventer Black LLP;
September 25, 2015, previously published on September 2015Too many times in my practice, clients have come to me in the midst of a tumultuous intracompany squabble. Owners who once thought they were going to start the next Microsoft or Apple are now at each other’s throats, lobbing all sorts of accusations and wrestling for control of the company....
|NAIC Adopts New Cybersecurity Exam Tool|
Mark D. Herlach, John S. Pruitt, Stephen E. Roth, Brian L. Rubin, Cynthia R. Shoss; Sutherland Asbill & Brennan LLP;
September 24, 2015, previously published on September 23, 2015On September 21, the National Association of Insurance Commissioners (the NAIC) IT Examination Working Group (the Working Group) adopted amendments to the IT section of the Financial Condition Examiners Handbook (the Handbook) to strengthen the Handbook¿s already existing cybersecurity guidance....
|Third Circuit Holds FTC Has Authority to Regulate Cybersecurity under Unfairness Prong of 15 U.S.C. § 45(a)|
Melissa K. Ventrone, Aleksandra M. S. Vold; Wilson Elser Moskowitz Edelman & Dicker LLP;
September 2, 2015, previously published on September 1, 2015The Third Circuit recently issued its highly anticipated ruling in the Federal Trade Commission v. Wyndham Worldwide Corp., Case. No. 14-3514, holding that the FTC has authority to regulate the cybersecurity practices of companies under the “unfair” prong of section 5 of the FTC Act. In...
|5 Deadly Sins Cyber Criminals Know About Law Firm Security|
Brent Cantrell, Fred Cobb, Justin Joy, William Kunkel; Lewis, Thomason, King, Krieg & Waldrop, P.C.;
September 2, 2015, previously published on August 2015Nearly every day we hear news of some new, large-scale cyber hack. For instance, the recent OPM database hack compromised personal information for over 21 million past and current federal employees and contractors. This attack, along with those on Target, Home Depot and several large insurance...
|The Ashley Madison Hack is More than Just Embarrassing|
McDonald Hopkins LLC;
August 25, 2015, previously published on August 21, 2015It was a bad week for people looking to cheat on their spouses - hackers publicly released the personal information of roughly 33 million users of the cheating site Ashley Madison. Aside from the obvious public embarrassment, many experts are saying the incident underscores the serious...
|Data Dump! AshleyMadison.com Fallout Deepens|
Wynter Lavier Deagle; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
August 20, 2015, previously published on August 20, 2015The Impact Team, the vigilante group behind the hacking of the infamous website AshleyMadison.com has followed through on its threat to leak the full database of the site’s users online. On Tuesday, August 18, 2015, an impressive 9.7 gigabytes of compressed data was posted to the dark web...
|Getting Compliant With the EU Cookie Law|
Matthew D. Lawless, Diane D. Reynolds, Michael Wager; Taft Stettinius & Hollister LLP;
August 7, 2015, previously published on August 4, 2015Google recently sent out a letter to users of its AdSense, DoubleClick for Publishers, and DoubleClick Ad Exchange products.
|Internet of Things and Cybersecurity|
Kevin L. LaRoche, Scott Widdowson; Borden Ladner Gervais LLP;
August 7, 2015, previously published on August 4, 2015The “Internet of Things” (IoT) is the developing web of objects embedded with microchips capable of allowing sending and receiving data, and so connecting them to the network we call the Internet. In an article in the Harvard Business Review late last year, Michael Porter and James...
|Germany Rushes to Adopt a New IT Security Act|
Wolfgang G. Büchner, Ted-Philip (Ted) Kroke, Undine von Diemar; Jones Day;
July 31, 2015, previously published on July 2015The German Federal Council (Bundesrat) has approved the Act regarding Improved Security of Information Technology systems ("IT Security Act") on July 10, 2015 without seeing a need to defer it to the Reconciliation Committee (Vermittlungsschuss). Shortly before, on June 12, 2015, the...