Join Matindale-Hubbell Connected



Search Results (4676)

  
Documents on internet e commerce
 

View Page: Prev  1  2  3  4  5  6  7  8  9  10  Next  >>
Show: results per page
Sort by:
Sponsored Results

HTMLPrivacy and Cyber Security: Summary of the Report from the Privacy Commissioner of Canada
Roland Hung, Kevin Stenner; McCarthy Tétrault LLP;
Legal Alert/Article
March 26, 2015, previously published on March 4, 2015
In December 2014, the Office of the Privacy Commissioner of Canada (the “Commissioner”) released a report entitled Privacy and Cyber Security: Emphasizing privacy protection in cyber security activities (the “Report”), examining the common interests and tensions between...

 

HTMLWhite House Proposes National Data Breach Notification Standard
Cynthia J. Larose, Ari Z. Moskowitz; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
Legal Alert/Article
March 25, 2015, previously published on January 14, 2015
This has been a big week for cybersecurity announcements from Washington. In what the White House has called a series of “SOTU Spoilers,” President Obama announced his intention to follow through on some of the recommendations in his administration’s Big Data report - the...

 

HTMLProtect Your Business from Competitive Intelligence
Zachary W. Behler, Samuel J. Frederick, Mindi M. Johnson, Iris K. Linder, John W. Mashni; Foster, Swift, Collins & Smith, P.C.;
Legal Alert/Article
March 25, 2015, previously published on January 7, 2015
The term "competitive intelligence" is the process of legally gathering information about one's competitors to gain a strategic advantage in the marketplace. Large corporations will have strategic intelligence experts as a part of their marketing department. These experts specialize in...

 

HTMLHealthcare Home Monitoring Company Avoids FCRA Liability Over Stolen Laptop
Michael J. Zbiegien; Taft Stettinius & Hollister LLP;
Legal Alert/Article
March 25, 2015, previously published on December 1, 2014
Theft or accidental loss of a laptop, thumb drive or other device is “[t]he single most common way that protected health information is compromised.” And while violating the Health Insurance Portability and Accountability Act’s Privacy and Security Rules can result in...

 

HTMLQuestions Every Tech Start-Up Should Answer Before Drafting a Privacy Policy
Matthew D. Lawless; Taft Stettinius & Hollister LLP;
Legal Alert/Article
March 25, 2015, previously published on January 5, 2015
So you know what information you will collect, how you will use it, where you will store it, how you will secure it and with whom you will share it. Put all of this information in a “privacy policy” and you’re done, right?

 

HTMLTop Five Tips for Employers Regarding Employee Use of Social Media
Alana M. De Young; Modrall Sperling;
Legal Alert/Article
March 25, 2015
Odds are that you, or at least one person you know, have at least some presence on social media, whether it be a Facebook or Instagram profile, a Twitter handle, a LinkedIn page, or a personal blog. Employers, too, are engaging more in social media in terms of marketing to clients, recruiting and...

 

HTMLInternational Hacking Ring Executes $1 Billion Banking Breach
James J. Giszczak, Sara Hutchins Jodka, Dominic A. Paluzzi; McDonald Hopkins LLC;
Legal Alert/Article
March 25, 2015, previously published on February 16, 2015
Kaspersky Lab, an Internet security firm, confirmed that an international hacking ring made up of hackers from Russia, Ukraine, China, and Europe stole as much as $1 billion from more than 100 banks in 30 countries, including the United States, in what could be one of the biggest banking breaches...

 

HTMLObama Administration Continues Push for National Privacy Governance
Matthew D. Lawless; Taft Stettinius & Hollister LLP;
Legal Alert/Article
March 25, 2015, previously published on February 27, 2015
He also announced that he was creating a new federal agency called the Cyber Threat Intelligence Integration Center to collect and analyze cyber attacks against U.S. companies and develop and coordinate strategic defenses to those attacks.

 

HTMLCompany Websites and the Internet: Choose Your Words with Care
Stephen R. Ayres; Heyl, Royster, Voelker & Allen Professional Corporation;
Legal Alert/Article
March 24, 2015, previously published on Spring 2015
One of the great advantages of the internet is that it enables a business to reach a vast audience, crossing state and, indeed, international borders. With the internet, a business can, in a sense, be everywhere all at once. Businesses, including those in the trucking industry, therefore see the...

 

HTMLIncreasing Wireless Use Is Driving Antennas Closer To the Street
Matthew D. Alegi, Marc B. Bergoffen, Larry A. Gordon, Michael L. Higgs, Alan S. Tilles; Shulman, Rogers, Gandal, Pordy & Ecker, P.A.;
Legal Alert/Article
March 24, 2015, previously published on February 2015
The use of wireless data by mobile devices is exploding at an exponential rate. As we have transitioned from 3G to 4G wireless services, more and more consumers and businesses are reliant on high-speed, high-bandwidth mobile data connections. Today’s smartphones and tablets are every bit as...

 


View Page: Prev  1  2  3  4  5  6  7  8  9  10  Next  >>