Search Results (4658)
Documents on internet e commerce
Show: results per page
|Court Decertifies Class Action Suit against Henry Ford Health System for Data Breach|
Zachary W. Behler, Michael R. Blum, Lauren B. Dunn, Samuel J. Frederick, Gilbert M. Frimet; Foster, Swift, Collins & Smith, P.C.;
March 20, 2015, previously published on February 4, 2015The Michigan Court of Appeals recently decertified a class action suit against Henry Ford Health System (HFHS) and its subcontractor, a medical transcription service, for inadvertently disclosing sensitive patient information online. On December 18, 2014, a unanimous three-judge panel reversed the...
|What Happens When a Twitter 'Tweet' of a Few Words Becomes a Horse Industry Defamation Lawsuit?|
Julie I. Fershtman; Foster, Swift, Collins & Smith, P.C.;
March 20, 2015, previously published on February 4, 2015At Foster Swift, we've successfully defended equine-related defamation litigation. Today we're sharing an interesting case from Massachusetts that arose from a "tweet" of only a few words.
|The Duty to Report Data Leaks|
Jacomijn Christ, Hans Urlus; Greenberg Traurig, LLP;
March 19, 2015, previously published on March 5, 2015On Feb. 1, 2015, the Dutch House of Representatives voted in favor of a legislative bill introducing a duty to report data leaks. The bill, titled Duty to Report Data Leaks and the Expansion of the Administrative Penalty Competence of Dutch Data Protection Authority (Dutch DPA), will amend the...
|Getting Serious About Cybersecurity|
Eric J. Sinrod; Duane Morris LLP;
March 19, 2015, previously published on February 17, 2015Hack attacks have been in the news for a while. But the most recent headlines seem to indicate that hackers are far outpacing security efforts to contain them.
|The Private Sector’s Role in the New Face of Homeland Security|
Madi Bakker, Ashley Prickett Cuttino; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
March 19, 2015, previously published on February 20, 2015The Obama administration recently announced the creation of the Cyber Threat Intelligence Integration Center (CTIIC), a new governmental agency created to prevent cyber threats by analyzing and integrating digital intelligence collected through government and non-government sources. The agency is...
|Will Companies Voluntarily Share Data Regarding Cyber Security at the President’s Request?|
Ashley Prickett Cuttino; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
March 19, 2015, previously published on February 16, 2015On Friday February 13, 2015, President Obama spoke at the White House Summit on Cybersecurity and Consumer Protection at Stanford University. After his address, President Obama signed an executive order, Promoting Private Sector Cybersecurity Information Sharing, that will encourage private...
|Honored in the Breach: Employer Action Items for an Insurer Data Breach|
Stephen A. Riga, Danielle Y. Vanderzanden, Timothy G. Verrall; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
March 19, 2015, previously published on February 5, 2015This morning, Anthem Blue Cross and Blue Shield, one of the largest health insurers in the country, notified its policyholders, members, and business partners that it was recently the target of an external cyber attack that appears to have comprised the confidentiality of medical and other personal...
|The Russian President signed amendments to Federal Law żOn personal dataż: who is affected and what to do?|
Rimma Leshcheva; Capital Legal Services;
March 18, 2015, previously published on January 2015New regulations for storing personal data of Russian citizens will enter into force on September 01, 2015.
|Anthem's two small details that led to one big breach|
James J. Giszczak, Sara Hutchins Jodka, Dominic A. Paluzzi, Antoinette M. Pilzner, Miriam L. Rosen; McDonald Hopkins LLC;
March 18, 2015, previously published on February 18, 2015Since we first advised on the Anthem data breach, additional information about the breach has come to light that provides some lessons for all businesses. Two significant issues with Anthem’s security appear to have played a role in making the Anthem breach potentially the biggest disclosed...
|Who Will Fight Against Cyber Crime?|
James J. Giszczak, Sara Hutchins Jodka, Dominic A. Paluzzi; McDonald Hopkins LLC;
March 18, 2015, previously published on February 27, 2015The cyber threat is real and growing every day, and finding solutions will require partnership and collaboration. President Barack Obama and leaders from technology, law enforcement, industry, Congress, and education recently convened at the Summit on Cybersecurity and Consumer Protection at...