Home > Legal Library > Advanced Search > Search Results









Join Matindale-Hubbell Connected



Search Results (3614)

  
Documents on Internet Law
 

View Page: 1  2  3  4  5  6  7  8  9  10  Next  >>
Show: results per page
Sort by:
Sponsored Results

HTMLThe Ashley Madison Hack is More than Just Embarrassing
McDonald Hopkins LLC;
Legal Alert/Article
August 25, 2015, previously published on August 21, 2015
It was a bad week for people looking to cheat on their spouses - hackers publicly released the personal information of roughly 33 million users of the cheating site Ashley Madison. Aside from the obvious public embarrassment, many experts are saying the incident underscores the serious...

 

HTMLU.S. Court of Appeals Upholds FTC’s Authority to Regulate Cybersecurity
Sutherland Asbill Brennan LLP;
Legal Alert/Article
August 25, 2015, previously published on August 24, 2015
Today, the United States Court of Appeals for Third Circuit issued its opinion in FTC v. Wyndham Worldwide Corp. upholding the authority of the Federal Trade Commission to regulate corporate cybersecurity under Section 5(a) of the Federal Trade Commission Act, which prohibits businesses from...

 

HTMLData Dump! AshleyMadison.com Fallout Deepens
Wynter Lavier Deagle; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
Legal Alert/Article
August 20, 2015, previously published on August 20, 2015
The Impact Team, the vigilante group behind the hacking of the infamous website AshleyMadison.com has followed through on its threat to leak the full database of the site’s users online. On Tuesday, August 18, 2015, an impressive 9.7 gigabytes of compressed data was posted to the dark web...

 

HTMLNAIC CyberSecurity Task Force To Review Federal Financial Institutions Examination Council's (FFIEC) Cyber-Assessment Tool
G. Donovan Brown; Colodny Fass, P.A.;
Legal Alert/Article
August 12, 2015, previously published on August 10, 2015
The National Association of Insurance Commissioners ("NAIC") Cybersecurity Task Force will discuss the Federal Financial Institutions Examination Council ("FFIEC") Cybersecurity Assessment Tool ("CAT") as part of its Summer 2015 National Meeting agenda (Twitter Hashtag...

 

HTMLGetting Compliant With the EU Cookie Law
Matthew D. Lawless, Diane D. Reynolds, Michael Wager; Taft Stettinius & Hollister LLP;
Legal Alert/Article
August 7, 2015, previously published on August 4, 2015
Google recently sent out a letter to users of its AdSense, DoubleClick for Publishers, and DoubleClick Ad Exchange products.

 

HTMLInternet of Things and Cybersecurity
Kevin L. LaRoche, Scott Widdowson; Borden Ladner Gervais LLP;
Legal Alert/Article
August 7, 2015, previously published on August 4, 2015
The “Internet of Things” (IoT) is the developing web of objects embedded with microchips capable of allowing sending and receiving data, and so connecting them to the network we call the Internet. In an article in the Harvard Business Review late last year, Michael Porter and James...

 

HTMLNevada, Washington and North Dakota Expand Data Breach Definition and Notice Requirements
Lindsay B. Nickle, Kevin M. Scott; Wilson Elser Moskowitz Edelman & Dicker LLP;
Legal Alert/Article
August 6, 2015, previously published on July 29, 2015
Continuing the trend of states expanding their data privacy laws, companies that store and transmit personal information about residents of Nevada, Washington and North Dakota must now take note of additional data-element definitions and notice requirements following data breach incidents. In...

 

HTMLSeventh Circuit Holds That Risk of Future Fraudulent Charge on Credit Card Sufficient to Withstand Motion to Dismiss
Melissa K. Ventrone, Aleksandra M. S. Vold; Wilson Elser Moskowitz Edelman & Dicker LLP;
Legal Alert/Article
August 5, 2015, previously published on July 22, 2015
During the 2013 holiday season, Neiman Marcus, like many other retailers, discovered that its payment card systems had been compromised and customers’ credit and debit card information was potentially stolen. The rush to the courthouse began, and multiple class action lawsuits were filed and...

 

HTMLDepartment of Justice Releases Cyber Security Best Practices
Paul Hawkins; Vandeventer Black LLP;
Legal Alert/Article
August 5, 2015, previously published on July 2015
Cyber security is a hot topic in today’s news cycle. Whether it was the much-publicized Sony hack, or the very recent compromise of enormous amounts of highly sensitive U.S. government information, these types of incidents have been shown to be extremely costly to organizations. Today,...

 

HTMLAppointing Legacy Contacts for Facebook
Meredith Edwards Collins; Adams and Reese LLP;
Legal Alert/Article
July 31, 2015, previously published on July 7, 2015
Earlier this year (Feb. 2015), Facebook announced a new feature that allows Facebook users to designate a legacy contact to manage their Facebook account when they pass away. According to facebook.com, a legacy contact is, "[s]omeone you choose to look after your account if it's...

 


View Page: 1  2  3  4  5  6  7  8  9  10  Next  >>