Search Results (2240)
Documents on Intellectual Property, Internet & E-Commerce, Legal Management, Computer & Data Services, Information Services
Show: results per page
|Michigan State University Confirms Data Breach of Server Containing 400k Records|
James J. Giszczak, Sherri A. Krause, Dominic A. Paluzzi; McDonald Hopkins LLC;
November 29, 2016, previously published on November 21, 2016Michigan State University announced last Friday, November 18, that on November 13 unauthorized users gained access to university computer and data systems containing about 400,000 records of sensitive personal information of current and former students and employees, including names, Social...
David Jay, Jason Kislin, Paige Nestel; Greenberg Traurig, LLP;
July 7, 2016, previously published on June 21, 2016Although New Jersey’s Truth-in-Consumer Contract Warranty and Notice Act (TCCWNA) was enacted over 30 years ago, there has been a dramatic spike in the statute’s popularity amongst plaintiff’s attorneys in recent months - leading to dozens of lawsuits, class actions, and threats...
|Utah Enacts New Laws Addressing Post-Employment Restrictions and Unauthorized Computer Use|
Clifford R. Atlas, Conrad S. Kee; Jackson Lewis P.C.;
April 15, 2016, previously published on April 7, 2016Utah has enacted two new laws of importance to employers concerned about trade secrets, customer relationships, and other protectable interests in its 2016 legislative session. The first statute, the Post-Employment Restrictions Act (Utah Code § 34-51-101, et seq.), sets a one-year time limit...
|Panama Papers Leak 11.5 Million Documents, Exposing Public Officials|
Sutherland Asbill Brennan LLP;
April 11, 2016, previously published on April 8, 2016On Sunday, April 3, 11.5 million confidential documents exposing a widespread system of global tax evasion were made public as a result of a hack. The documents, which were records of the Panamanian corporate service provider and law firm Mossack Fonseca, were obtained by an anonymous source,...
|EU and U.S. Release Terms of Privacy Shield|
Paloma Bru, Jonathon R. Little, Mauricio F. Paez, Elizabeth Robertson, Undine von Diemar; Jones Day;
March 31, 2016, previously published on March 2016The European Commission ("EC") and U.S. Department of Commerce ("DOC") recently released the full text of the EU¿U.S. Privacy Shield framework. This release follows the February 2, 2016, announcement that EU and U.S. officials had reached an agreement to replace the...
|CISA Guidelines: Privacy and Civil Liberties Interim Guidelines for Federal Agencies|
Mintz Levin Cohn Ferris Glovsky Popeo P.C.;
March 11, 2016, previously published on March 2, 2016Last week, we discussed the Federal government’s first steps toward implementing the Cybersecurity Information Sharing Act (CISA). Among the guidance documents released by the Department of Homeland Security and the Department of Justice were the Privacy and Civil Liberties Interim...
|California Attorney General Releases Data Breach Report|
Daniel J. McLoon, Michael G. Morgan, Jeffrey Rabkin, David W. Schecter, Gregory P. Silberman; Jones Day;
March 3, 2016, previously published on February 2016On Tuesday, February 16, 2016, the California Attorney General's Office released its Data Breach Report, analyzing the 657 data breaches reported to the Attorney General's office from 2012 to 2015. According to the report, the majority of the reported breaches were the result of security failures....
|Data Breaches are on the Rise in Australia: What if it Happens to You?|
Peter T. Brabant, Adam Salter, Nicola Walker; Jones Day;
March 3, 2016, previously published on February 2016Data breaches are becoming more prevalent in Australia. While the reporting of data breaches to regulators or affected customers or clients is presently not mandatory, the Office of the Australian Information Commissioner ("OAIC") received 110 voluntary data breach notifications in...
|Apple’s encryption fight against the U.S. government could spill into Canada|
Joe Abdul-Massih, Éloïse Gratton; Borden Ladner Gervais LLP;
February 26, 2016, previously published on February 22, 2016Last week, the news that a magistrate ordered Apple to help the Federal Bureau of Investigation (FBI) hack an iPhone used by one of the San Bernardino shooter suspects has polarized the media. Despite the fact that this is happening outside our jurisdiction, the U.S. legal fight will be closely...
|EU Extends "Qualified" Moratorium on Enforcement Actions for Data Transfers to the U.S.|
Simon J. McMenemy, Hendrik Muschal, Grant D. Petersen; Ogletree Deakins International, LLP;
February 16, 2016, previously published on February 4, 2016On February 3, 2016, the Article 29 Working Party, the EU body representing the data protection authorities (DPA) of each EU member country, announced that all of the DPAs across the EU have agreed to extend the current moratorium on enforcement action regarding transatlantic data transfers until...