Search Results (2367)
Documents on Internet Law, Internet & E-Commerce, Government
Show: results per page
|Recent Dismissal Of Derivative Suit Demonstrates That Directors Must Focus Their Attention On CyberSecurity|
Travis P. Brennan, Marc J. Schneider; Stradling Yocca Carlson & Rauth A Professional Corporation;
December 12, 2014, previously published on November 2014With the increasing sophistication and variety of cyber-attacks, directors of companies holding sensitive customer information or trade secrets cannot be complacent about cyber security risk management and compliance. A recent decision in U.S. District Court dismissing a shareholder derivative suit...
|New Jersey District Court Rejects Shareholder Derivative Action Based on Cybersecurity Breach|
Kyle Evans Gay, Lewis H. Lazarus; Morris James LLP;
December 8, 2014, previously published on November 18, 2014In Palkon v. Holmes, C.A. No. 2:14-CV-01234 (SRC) (October 20, 2014), the United States District Court for the District of New Jersey dismissed with prejudice a shareholder derivative action arising from three distinct breaches of Wyndham Worldwide Corporation (“Wyndham”). The Court...
|Alberta’s Personal Information Protection Act: Supreme Court Grants Time Extension to Alberta Government to Make Amendments|
Craig Brusnyk, Tamara L. Hunter, Matylda Makulska; Davis LLP;
December 3, 2014, previously published on November 10, 2014On November 15, 2013, the Supreme Court of Canada unanimously held that Alberta’s Personal Information Protection Act (“PIPA”) infringed on the right of freedom of expression in the Canadian Charter of Rights and Freedoms by limiting the ability of labour unions to videotape and...
|FDA: Industry Must Address Cybersecurity Risks for Medical Devices.|
Theodore P. Augustinos, Sharon A. Blinkoff, Ellen Marie Giblin, Mark E. Schreiber, David S. Szabo; Edwards Wildman Palmer LLP;
November 25, 2014, previously published on October 2014On October 1, 2014 the U.S. Food and Drug Administration finalized guidance on recommendations to manufacturers for managing cybersecurity risks to better protect patient health and information. The purpose of the guidance is to encourage manufacturers to consider possible cybersecurity risks while...
|This Week in Internet Gaming (Week of Oct. 6-10)|
Eric D. Frank; Duane Morris LLP;
November 18, 2014, previously published on October 10, 2014The Gibraltar Betting and Gaming Association lost its court battle fighting the United Kingdom’s Gambling (Licensing & Advertising) Act, specifically the point of consumption tax required to be paid on all online gaming activities taking place in the UK.
|Cybersecurity Assessment Observations|
Craig N. Landrum; Jones Walker LLP;
November 17, 2014, previously published on November 13, 2014In June 2014, the Federal Financial Institutions Examination Council ("FFIEC") launched a pilot cybersecurity testing program utilizing upcoming state and federal regulatory examinations at more than 500 community financial institutions. The purpose of the effort was to assess how these...
|Pennsylvania Senate Amendment to Lottery Bill would Prohibit Sale of Internet Instant Games by State Lottery|
Eric D. Frank; Duane Morris LLP;
November 17, 2014, previously published on October 9, 2014The Minnesota State Lottery and the Minnesota State Legislature recently squared off in a battle over the sale of online ticket sales and online lottery instant games. Other state lotteries are looking to internet options as a way to boost declining lottery revenues. Yesterday, the Pennsylvania...
|Cyberwarfare Is Here; Is the U.S. Prepared?|
Eric J. Sinrod; Duane Morris LLP;
November 17, 2014, previously published on October 28, 2014Practically every aspect of life now takes place in cyberspace in addition to in the traditional world we know. While at first blush that generally may sound like a good thing, warfare now also takes place online as part of real conflicts, and not just in the realm of computer games.
|Mandatory Privacy Training Rule for Federal Contractors Expected Soon|
Jonathan T. Cain; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
November 17, 2014, previously published on November 10, 2014A rule to require federal contactors handling personally identifiable information to train their employees in safeguarding the information is close to release. Under the anticipated rule, contractor employees will have to undergo either agency training when the agency chooses to make it available,...
|US FCC Enforcement Action Represents Unprecedented Expansion of the Agency’s Authority Over Data Security|
Lei Shen, Howard W. Waltzman; Mayer Brown LLP;
November 14, 2014, previously published on October 28, 2014The US Federal Communications Commission (FCC) is asserting unprecedented authority to regulate data security matters with its recent action against two telecommunications carriers for failing to protect customers’ personal information from unauthorized disclosure. The FCC issued a Notice of...