Search Results (2547)
Documents on Internet Law, Internet & E-Commerce, Government
Show: results per page
|REMINDER: Register for Wednesday Webinar! Another Cop on the Cybersecurity Beat: What to Do Before and After the SEC and FINRA Come Knockin|
Mintz Levin Cohn Ferris Glovsky Popeo P.C.;
October 1, 2015, previously published on September 28, 2015The SEC has announced a new round of cybersecurity inspections at broker-dealer and registered investment advisory firms. If that’s not enough to catch your attention, just days after issuing the Risk Alert, the SEC censured and fined a St. Louis-based investment advisor for a failure to...
|Delaware Enacts Package Of Internet Data Laws|
Ieuan Jolly; Loeb & Loeb LLP;
September 28, 2015, previously published on September 2015Joining the collection of states with online privacy laws, Delaware has enacted a package of statutes governing the collection, storage and use of the personal information of Delaware residents by websites, Internet and cloud service providers, and Internet and mobile applications. While the...
|An Ounce of Prevention...|
Geoffrey G. Hemphill; Vandeventer Black LLP;
September 25, 2015, previously published on September 2015Too many times in my practice, clients have come to me in the midst of a tumultuous intracompany squabble. Owners who once thought they were going to start the next Microsoft or Apple are now at each other’s throats, lobbing all sorts of accusations and wrestling for control of the company....
|NAIC Adopts New Cybersecurity Exam Tool|
Mark D. Herlach, John S. Pruitt, Stephen E. Roth, Brian L. Rubin, Cynthia R. Shoss; Sutherland Asbill & Brennan LLP;
September 24, 2015, previously published on September 23, 2015On September 21, the National Association of Insurance Commissioners (the NAIC) IT Examination Working Group (the Working Group) adopted amendments to the IT section of the Financial Condition Examiners Handbook (the Handbook) to strengthen the Handbook¿s already existing cybersecurity guidance....
|5 Deadly Sins Cyber Criminals Know About Law Firm Security|
Brent Cantrell, Fred Cobb, Justin Joy, William Kunkel; Lewis, Thomason, King, Krieg & Waldrop, P.C.;
September 2, 2015, previously published on August 2015Nearly every day we hear news of some new, large-scale cyber hack. For instance, the recent OPM database hack compromised personal information for over 21 million past and current federal employees and contractors. This attack, along with those on Target, Home Depot and several large insurance...
|Third Circuit Holds FTC Has Authority to Regulate Cybersecurity under Unfairness Prong of 15 U.S.C. § 45(a)|
Melissa K. Ventrone, Aleksandra M. S. Vold; Wilson Elser Moskowitz Edelman & Dicker LLP;
September 2, 2015, previously published on September 1, 2015The Third Circuit recently issued its highly anticipated ruling in the Federal Trade Commission v. Wyndham Worldwide Corp., Case. No. 14-3514, holding that the FTC has authority to regulate the cybersecurity practices of companies under the “unfair” prong of section 5 of the FTC Act. In...
|Third Circuit Affirms the FTC's Authority to Regulate and Enforce Data Security|
Richard J. Johnson, Todd S. McClelland, Daniel J. McLoon, Michael G. Morgan, Jeffrey Rabkin; Jones Day;
September 1, 2015, previously published on August 2015In FTC v. Wyndham Worldwide Corp., No 14-3514, -- F.3d-- (3d Cir. Aug. 24, 2015), the Third Circuit issued an important decision affirming a United States District Court of New Jersey ruling that the Federal Trade Commission ("FTC") has authority under Section 5 of the Federal Trade...
|The Ashley Madison Hack is More than Just Embarrassing|
McDonald Hopkins LLC;
August 25, 2015, previously published on August 21, 2015It was a bad week for people looking to cheat on their spouses - hackers publicly released the personal information of roughly 33 million users of the cheating site Ashley Madison. Aside from the obvious public embarrassment, many experts are saying the incident underscores the serious...
|Data Dump! AshleyMadison.com Fallout Deepens|
Wynter Lavier Deagle; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
August 20, 2015, previously published on August 20, 2015The Impact Team, the vigilante group behind the hacking of the infamous website AshleyMadison.com has followed through on its threat to leak the full database of the site’s users online. On Tuesday, August 18, 2015, an impressive 9.7 gigabytes of compressed data was posted to the dark web...
|Getting Compliant With the EU Cookie Law|
Matthew D. Lawless, Diane D. Reynolds, Michael Wager; Taft Stettinius & Hollister LLP;
August 7, 2015, previously published on August 4, 2015Google recently sent out a letter to users of its AdSense, DoubleClick for Publishers, and DoubleClick Ad Exchange products.