Search Results (3614)
Documents on Internet Law
Show: results per page
|The Ashley Madison Hack is More than Just Embarrassing|
McDonald Hopkins LLC;
August 25, 2015, previously published on August 21, 2015It was a bad week for people looking to cheat on their spouses - hackers publicly released the personal information of roughly 33 million users of the cheating site Ashley Madison. Aside from the obvious public embarrassment, many experts are saying the incident underscores the serious...
|U.S. Court of Appeals Upholds FTC’s Authority to Regulate Cybersecurity|
Sutherland Asbill Brennan LLP;
August 25, 2015, previously published on August 24, 2015Today, the United States Court of Appeals for Third Circuit issued its opinion in FTC v. Wyndham Worldwide Corp. upholding the authority of the Federal Trade Commission to regulate corporate cybersecurity under Section 5(a) of the Federal Trade Commission Act, which prohibits businesses from...
|Data Dump! AshleyMadison.com Fallout Deepens|
Wynter Lavier Deagle; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
August 20, 2015, previously published on August 20, 2015The Impact Team, the vigilante group behind the hacking of the infamous website AshleyMadison.com has followed through on its threat to leak the full database of the site’s users online. On Tuesday, August 18, 2015, an impressive 9.7 gigabytes of compressed data was posted to the dark web...
|NAIC CyberSecurity Task Force To Review Federal Financial Institutions Examination Council's (FFIEC) Cyber-Assessment Tool|
G. Donovan Brown; Colodny Fass, P.A.;
August 12, 2015, previously published on August 10, 2015The National Association of Insurance Commissioners ("NAIC") Cybersecurity Task Force will discuss the Federal Financial Institutions Examination Council ("FFIEC") Cybersecurity Assessment Tool ("CAT") as part of its Summer 2015 National Meeting agenda (Twitter Hashtag...
|Getting Compliant With the EU Cookie Law|
Matthew D. Lawless, Diane D. Reynolds, Michael Wager; Taft Stettinius & Hollister LLP;
August 7, 2015, previously published on August 4, 2015Google recently sent out a letter to users of its AdSense, DoubleClick for Publishers, and DoubleClick Ad Exchange products.
|Internet of Things and Cybersecurity|
Kevin L. LaRoche, Scott Widdowson; Borden Ladner Gervais LLP;
August 7, 2015, previously published on August 4, 2015The “Internet of Things” (IoT) is the developing web of objects embedded with microchips capable of allowing sending and receiving data, and so connecting them to the network we call the Internet. In an article in the Harvard Business Review late last year, Michael Porter and James...
|Nevada, Washington and North Dakota Expand Data Breach Definition and Notice Requirements|
Lindsay B. Nickle, Kevin M. Scott; Wilson Elser Moskowitz Edelman & Dicker LLP;
August 6, 2015, previously published on July 29, 2015Continuing the trend of states expanding their data privacy laws, companies that store and transmit personal information about residents of Nevada, Washington and North Dakota must now take note of additional data-element definitions and notice requirements following data breach incidents. In...
|Seventh Circuit Holds That Risk of Future Fraudulent Charge on Credit Card Sufficient to Withstand Motion to Dismiss|
Melissa K. Ventrone, Aleksandra M. S. Vold; Wilson Elser Moskowitz Edelman & Dicker LLP;
August 5, 2015, previously published on July 22, 2015During the 2013 holiday season, Neiman Marcus, like many other retailers, discovered that its payment card systems had been compromised and customers’ credit and debit card information was potentially stolen. The rush to the courthouse began, and multiple class action lawsuits were filed and...
|Department of Justice Releases Cyber Security Best Practices|
Paul Hawkins; Vandeventer Black LLP;
August 5, 2015, previously published on July 2015Cyber security is a hot topic in today’s news cycle. Whether it was the much-publicized Sony hack, or the very recent compromise of enormous amounts of highly sensitive U.S. government information, these types of incidents have been shown to be extremely costly to organizations. Today,...
|Appointing Legacy Contacts for Facebook|
Meredith Edwards Collins; Adams and Reese LLP;
July 31, 2015, previously published on July 7, 2015Earlier this year (Feb. 2015), Facebook announced a new feature that allows Facebook users to designate a legacy contact to manage their Facebook account when they pass away. According to facebook.com, a legacy contact is, "[s]omeone you choose to look after your account if it's...