Home > Legal Library > Advanced Search > Search Results









Join Matindale-Hubbell Connected



Search Results (520)

  
Documents on Communications Law, Computer & Data Services, Health Care
 

View Page: 1  2  3  4  5  6  7  8  9  10  Next  >>
Show: results per page
Sort by:
Sponsored Results

HTMLSimplifying Classroom Consent: the FTC’s Guidance on COPPA in Schools
Matthew D. Lawless; Taft Stettinius & Hollister LLP;
Legal Alert/Article
March 27, 2015, previously published on January 29, 2015
The Children’s Online Privacy Protection Act (“COPPA”) governs an online operator’s collection of personal information from children, i.e., those under 13 years of age. Generally, the act requires verifiable parental consent before an online operator may collect a...

 

Adobe PDFOCIE Risk Alert on Cybersecurity: SEC’s Office of Compliance Inspections and Examinations Announces Findings from its Cybersecurity Examination Initiative
Jay Clayton, John Evangelakos, Scott D. Miller, Nader A. Mousavi, Frederick Wertheim; Sullivan & Cromwell LLP;
Legal Alert/Article
March 27, 2015, previously published on February 5, 2015
On February 3, the SEC’s Office of Compliance Inspections and Examinations (“OCIE”) published a Risk Alert summarizing findings from its Cybersecurity Examination Initiative relating to broker-dealers and investment advisers, which was announced in April 2014. A copy of the Risk...

 

HTMLTelecom Business Alert - Open Internet and Municipal Broadband Orders, Rural Call Completion Reporting, FirstNet Activities, K&H Attorneys to speak at IWCE Conference, Webinar Audios Available - Vol XII, Issue 11
C. Douglas Jarrett, Gregory E. Kunkle, Thomas B. Magee, Tracy P. Marshall, Jack Richards; Keller and Heckman LLP;
Legal Alert/Article
March 27, 2015, previously published on March 16, 2015
Last week, the FCC released its Open Internet Order (Order) adopted on February 26, 2015. Under the Order, a broadband Internet access service provider may not block lawful content, applications, services, or the attachment of non-harmful devices. Further, it may not “impair or degrade lawful...

 

HTMLData Breach Security: The Five Best Questions Every Organization Should Answer
Diane D. Reynolds, William C. Wagner; Taft Stettinius & Hollister LLP;
Legal Alert/Article
March 27, 2015, previously published on January 6, 2015
The news headline “Jimmy John’s Notifies Customers of Payment Card Security Incident” caught our attention because the credit and debit card information was stolen at 216 Jimmy John’s locations, some of which are in states where Taft has offices (Arizona, Illinois, Indiana,...

 

HTMLPrivacy and Cyber Security: Summary of the Report from the Privacy Commissioner of Canada
Roland Hung, Kevin Stenner; McCarthy Tétrault LLP;
Legal Alert/Article
March 26, 2015, previously published on March 4, 2015
In December 2014, the Office of the Privacy Commissioner of Canada (the “Commissioner”) released a report entitled Privacy and Cyber Security: Emphasizing privacy protection in cyber security activities (the “Report”), examining the common interests and tensions between...

 

HTMLQuestions Every Tech Start-Up Should Answer Before Drafting a Privacy Policy
Matthew D. Lawless; Taft Stettinius & Hollister LLP;
Legal Alert/Article
March 25, 2015, previously published on January 5, 2015
So you know what information you will collect, how you will use it, where you will store it, how you will secure it and with whom you will share it. Put all of this information in a “privacy policy” and you’re done, right?

 

HTMLProtect Your Business from Competitive Intelligence
Zachary W. Behler, Samuel J. Frederick, Mindi M. Johnson, Iris K. Linder, John W. Mashni; Foster, Swift, Collins & Smith, P.C.;
Legal Alert/Article
March 25, 2015, previously published on January 7, 2015
The term "competitive intelligence" is the process of legally gathering information about one's competitors to gain a strategic advantage in the marketplace. Large corporations will have strategic intelligence experts as a part of their marketing department. These experts specialize in...

 

HTMLHealthcare Home Monitoring Company Avoids FCRA Liability Over Stolen Laptop
Michael J. Zbiegien; Taft Stettinius & Hollister LLP;
Legal Alert/Article
March 25, 2015, previously published on December 1, 2014
Theft or accidental loss of a laptop, thumb drive or other device is “[t]he single most common way that protected health information is compromised.” And while violating the Health Insurance Portability and Accountability Act’s Privacy and Security Rules can result in...

 

HTMLWhite House Proposes National Data Breach Notification Standard
Cynthia J. Larose, Ari Z. Moskowitz; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
Legal Alert/Article
March 25, 2015, previously published on January 14, 2015
This has been a big week for cybersecurity announcements from Washington. In what the White House has called a series of “SOTU Spoilers,” President Obama announced his intention to follow through on some of the recommendations in his administration’s Big Data report - the...

 

HTMLObama Administration Continues Push for National Privacy Governance
Matthew D. Lawless; Taft Stettinius & Hollister LLP;
Legal Alert/Article
March 25, 2015, previously published on February 27, 2015
He also announced that he was creating a new federal agency called the Cyber Threat Intelligence Integration Center to collect and analyze cyber attacks against U.S. companies and develop and coordinate strategic defenses to those attacks.

 


View Page: 1  2  3  4  5  6  7  8  9  10  Next  >>