Search Results (405)
Documents on Intellectual Property, Computer & Data Services
Show: results per page
|It is that Time of Year....|
Scot Ganow; Faruki Ireland & Cox P.L.L.;
December 14, 2015, previously published on December 9, 2015As we head into the holidays, we begin to take stock of the year and make a myriad of resolutions for the New Year. Well, the same should be true in business as you take stock of your privacy footprint in 2015 and how it might change in 2016.
|Current Status of EU Data Transfers and Recommended Next Steps for Former Safe Harbor Companies|
Simon J. McMenemy, Hendrik Muschal, Grant D. Petersen; Ogletree Deakins International, LLP;
November 27, 2015, previously published on November 20, 2015As has been widely publicized, on October 6, 2015, the European Court of Justice (ECJ) issued its much-anticipated decision in Schrems v. Data Protection Commissioner, Case C-362/14 invalidating European Commission’s Decision 2000/520, which previously held that the Safe Harbor principles...
|Privacy Monday - March 2, 2015: How is Your Cyber Resilience?|
Julia Siripurapu; Mintz Levin Cohn Ferris Glovsky Popeo P.C.;
March 19, 2015, previously published on March 2, 2015The Federal Financial Institutions Examination Council (FFIEC) recently described “cyber resilience” as an organization’s ability to recover critical IT systems and resume normal business operations in the event of a cyberattack. On February 6, the FFIEC added a new Appendix J to...
|FINRA and SEC Issue Cybersecurity Reports Identifying Common Industry Practices|
Kyle T. Barrett, Richard J. Johnson, Todd S. McClelland, Mauricio F. Paez, Gregory P. Silberman; Jones Day;
February 26, 2015, previously published on February 2015New reports by the Financial Industry Regulatory Authority ("FINRA") and the SEC's Office of Compliance Inspections and Examinations ("OCIE") highlight the increased regulatory focus in the financial sector on cybersecurity. Both reports merit industry attention.
|ALJ Pender Sets Procedural Schedule In Certain Consumer Electronics And Display Devices With Graphics Processing (337-TA-932)|
Eric W. Schweibenz; Oblon, McClelland, Maier & Neustadt, L.L.P.;
February 18, 2015, previously published on January 2, 2015On December 29, 2014, ALJ Thomas B. Pender issued Order No. 9 in Certain Consumer Electronics And Display Devices With Graphics Processing Units Therein (Inv. No. 337-TA-932).
|FCC Proposes $10 Million Forfeiture for Privacy Violations|
Richard L. Reiter; Wilson Elser Moskowitz Edelman & Dicker LLP;
November 10, 2014, previously published on October 30, 2014On October 24, 2014, the Federal Communications Commission (FCC) proposed a $10 million forfeiture penalty against TerraCom, Inc. (TerraCom) and YourTel America, Inc. (YourTel) (collectively, the Corporations) for alleged data security violations. Although the FCC is currently unaware of any...
|The Supreme Court's Aereo Ruling: Is the Sky Falling for Cloud Computing?|
Janina Gorbach; Foley & Lardner LLP;
July 14, 2014, previously published on July 8, 2014With the Supreme Court’s Aereo decision finally out, the digital industry is struggling with its impact, if any, on various products and services, particularly with regard to cloud computing. However, the Supreme Court narrowly tailored the Aereo decision to services that closely resemble...
|Supreme Court Reconciles Federal Circuit Diverse Views on Patent Eligibility of Computer Implemented Inventions|
Dev Batta, Rory J. Radding; Edwards Wildman Palmer LLP;
June 24, 2014, previously published on June 2014The Supreme Court has tried to quiet the debate on what is patent eligible. They have now recognized that fundamental economic practices are not patent eligible if they are merely implemented on a computer without additional features as well as that computers are ubiquitous now so wholly generic...
|The Heartbleed Bug: Data Breach and Liability Risks|
Richard J. Johnson, Mauricio F. Paez, Gregory P. Silberman; Jones Day;
April 24, 2014, previously published on April 2014It seems that every other day we learn about a new data security threat or compromise. The so-called "heartbleed bug," or CVE-2014-0160 for those technically inclined, is the latest reported data security vulnerability, and it requires an immediate and swift response. The bug was recently...
|A Desk Guide to Data Protection and Breach Response - Part 6|
Jason Stephen Juceam, David M. Siegal; Haynes Boone LLP;
March 24, 2014, previously published on March 21, 2014When a company falls victim to a damaging cyber attack or suffers a theft of sensitive data or intellectual property, the incident very well may fall within the ambit of one or more criminal statutes designed to deter and punish perpetrators with the prospect of jail time, financial penalties and...