Search Results (2242)
Documents on Intellectual Property, Internet & E-Commerce, Legal Management, Computer & Data Services, Information Services
Show: results per page
|Why Employers Need a Social Media Policy|
Jeffrey Silence, Maria Crimi Speth; Jaburg Wilk;
February 17, 2017, previously published on February 8, 2017Although social media is great for developing business, expanding a brand or building a network, it is not without pitfalls. There are an increasing number of cases where an employee’s use of social media has created problems for the employer. The best practice is to maintain a well-written...
|Know The Law: Who Is Liable For Data Breach?|
Ramey D. Sylvester; McLane Middleton, Professional Association;
January 24, 2017, previously published on December 19, 2016Q: My company handles a lot of sensitive customer information (medical, financial, biographical) and has relationships with third party service providers that have access to the information. Can my company be held liable to our customers for my service provider’s mishandling of that data?
|Michigan State University Confirms Data Breach of Server Containing 400k Records|
James J. Giszczak, Sherri A. Krause, Dominic A. Paluzzi; McDonald Hopkins LLC;
November 29, 2016, previously published on November 21, 2016Michigan State University announced last Friday, November 18, that on November 13 unauthorized users gained access to university computer and data systems containing about 400,000 records of sensitive personal information of current and former students and employees, including names, Social...
David Jay, Jason Kislin, Paige Nestel; Greenberg Traurig, LLP;
July 7, 2016, previously published on June 21, 2016Although New Jersey’s Truth-in-Consumer Contract Warranty and Notice Act (TCCWNA) was enacted over 30 years ago, there has been a dramatic spike in the statute’s popularity amongst plaintiff’s attorneys in recent months - leading to dozens of lawsuits, class actions, and threats...
|Utah Enacts New Laws Addressing Post-Employment Restrictions and Unauthorized Computer Use|
Clifford R. Atlas, Conrad S. Kee; Jackson Lewis P.C.;
April 15, 2016, previously published on April 7, 2016Utah has enacted two new laws of importance to employers concerned about trade secrets, customer relationships, and other protectable interests in its 2016 legislative session. The first statute, the Post-Employment Restrictions Act (Utah Code § 34-51-101, et seq.), sets a one-year time limit...
|Panama Papers Leak 11.5 Million Documents, Exposing Public Officials|
Eversheds Sutherland (US) LLP;
April 11, 2016, previously published on April 8, 2016On Sunday, April 3, 11.5 million confidential documents exposing a widespread system of global tax evasion were made public as a result of a hack. The documents, which were records of the Panamanian corporate service provider and law firm Mossack Fonseca, were obtained by an anonymous source,...
|EU and U.S. Release Terms of Privacy Shield|
Paloma Bru, Jonathon Little, Mauricio F. Paez, Elizabeth A. (Liz) Robertson, Undine von Diemar; Jones Day;
March 31, 2016, previously published on March 2016The European Commission ("EC") and U.S. Department of Commerce ("DOC") recently released the full text of the EU¿U.S. Privacy Shield framework. This release follows the February 2, 2016, announcement that EU and U.S. officials had reached an agreement to replace the...
|CISA Guidelines: Privacy and Civil Liberties Interim Guidelines for Federal Agencies|
Mintz Levin Cohn Ferris Glovsky Popeo P.C.;
March 11, 2016, previously published on March 2, 2016Last week, we discussed the Federal government’s first steps toward implementing the Cybersecurity Information Sharing Act (CISA). Among the guidance documents released by the Department of Homeland Security and the Department of Justice were the Privacy and Civil Liberties Interim...
|Data Breaches are on the Rise in Australia: What if it Happens to You?|
Peter T. Brabant, Adam Salter, Nicola Walker; Jones Day;
March 3, 2016, previously published on February 2016Data breaches are becoming more prevalent in Australia. While the reporting of data breaches to regulators or affected customers or clients is presently not mandatory, the Office of the Australian Information Commissioner ("OAIC") received 110 voluntary data breach notifications in...
|California Attorney General Releases Data Breach Report|
Daniel J. (Dan) McLoon, Michael G. (Mike) Morgan, Jeff Rabkin, David W. Schecter, Gregory P. Silberman; Jones Day;
March 3, 2016, previously published on February 2016On Tuesday, February 16, 2016, the California Attorney General's Office released its Data Breach Report, analyzing the 657 data breaches reported to the Attorney General's office from 2012 to 2015. According to the report, the majority of the reported breaches were the result of security failures....