Search Results (4717)
Documents on internet e commerce
Show: results per page
|The Internet of Things|
Lei Shen, Howard W. Waltzman; Mayer Brown LLP;
April 8, 2015, previously published on March 17, 2015The proliferation of smart phones raised novel privacy and security concerns due to the unprecedented amounts and types of personal information that these devices and their applications could collect, use, store and share. Many aspects of our lives-communications, social interactions, shopping,...
|Florida's Fourth District Court of Appeal Holds That There is Minimal Privacy Interest in Social Media Accounts|
Victoria San Pedro; Rumberger, Kirk & Caldwell Professional Association;
April 7, 2015, previously published on March 9, 2015On January 7, 2015, Florida’s Fourth District Court of Appeal held that plaintiff in a personal injury suit has a limited privacy interest in his or her social networking site. See Nucci v. Target, &under;&under;&under; So. 3d &under;&under;&under;, 2015 WL 71726 (Fla. 4th DCA Jan. 7, 2015)....
|The Need for Speed Online: Don’t Just Sit There!|
Eric J. Sinrod; Duane Morris LLP;
April 6, 2015, previously published on February 10, 2015Do you ever get up in the morning, feeling sluggish and just not up to the tasks that await you? For most of us, the answer is yes, at least once in a while.
|Astroturfing the Grassroots|
John B. King; Breazeale, Sachse & Wilson, L.L.P.;
April 6, 2015, previously published on March 23, 2015Astroturfing is the practice of masking the sponsors of a message to make it appear as though it originates from and is supported by grassroots participants. A grassroots movement is one naturally and spontaneously originating at the local level to give voice to a particular point of view.
|NYDFS to Collect Data on Cyber Security, but Could Hackers Use This Database as a Road Map to Launch Targeted Attacks?|
Jonathan L. Bing, Melissa K. Ventrone; Wilson Elser Moskowitz Edelman & Dicker LLP;
April 6, 2015, previously published on March 31 2015On March 26, 2015, the New York State Department of Financial Services (NYDFS) announced that it is broadening the scope of questions and topics in its current information technology (IT) examination framework. In addition, the NYDFS requires insurers to provide a response to 16 questions about...
|Cybersecurity: a Few of my Favorite Videos and Some Thought Provoking Questions|
Ralph C. Losey; Jackson Lewis P.C.;
April 6, 2015, previously published on February 17, 2015One of my passions is Cybersecurity, especially in the context of electronic discovery. I am focused on safeguarding the electronic data of the clients of my law firm. There are many black hat hackers out there, and even foreign governments, that hack into the computers of U.S. corporations and law...
|FTC May Have Authority to Regulate Companies’ Data Security Practices|
Jenna K. Shedd-Sawl, Lawrence J. Tabas; Obermayer Rebmann Maxwell & Hippel LLP;
April 6, 2015, previously published on March 5, 2015Between 2008 and 2010, hackers stole credit card information from the computer network of Wyndham Hotels & Resorts LLC (“Wyndham”), which affected hundreds of thousands of Wyndham’s customers in the process. The Federal Trade Commission (the “FTC”) took action and...
|How To Appropriately Obtain Relevant Information From Social Networking Sites|
Brett M. Anders, Michael A. Frankel; Jackson Lewis P.C.;
April 6, 2015, previously published on February 12, 2015A New York state appellate court has confirmed that the mere initiation of a lawsuit does not provide a basis to permit a defendant unfettered access to a plaintiff’s social media sites. In Pecile v. Titan Capital Group, LLC, 2014 N.Y. App. Div. LEXIS 420 (1st Dep’t Jan. 23, 2014), the...
|Cyber Insurance: Do I Really Need It?|
William C. Wagner; Taft Stettinius & Hollister LLP;
April 1, 2015, previously published on March 23, 2015*This is the first post in a five-part series on cyber insurance, culminating in a webinar entitled “Insurance Coverage for Privacy and Data Breaches: Hot Topics and Critical Issues” on Wednesday, April 22, 2015, at 12:00-1:00 p.m. Eastern.
|Looking At Angles Of Liability After A Cyberattack|
Thomas B. Caswell, Judith Bevis Langevin; Zelle Hofmann Voelbel & Mason LLP;
April 1, 2015, previously published by Insurance Law360 and Employment Law360 on January 28, 2015All employers have personnel data on their information technology systems and devices. This data includes personally identifiable information such as names, addresses, birth dates and Social Security numbers of employees and their family members. In light of high-profile, employee-led lawsuits like...