Search Results (2529)
Documents on Internet Law, Internet & E-Commerce, Technology & Science
Show: results per page
|5 Deadly Sins Cyber Criminals Know About Law Firm Security|
Brent Cantrell, Fred Cobb, Justin Joy, William Kunkel; Lewis, Thomason, King, Krieg & Waldrop, P.C.;
September 2, 2015, previously published on August 2015Nearly every day we hear news of some new, large-scale cyber hack. For instance, the recent OPM database hack compromised personal information for over 21 million past and current federal employees and contractors. This attack, along with those on Target, Home Depot and several large insurance...
|Third Circuit Holds FTC Has Authority to Regulate Cybersecurity under Unfairness Prong of 15 U.S.C. § 45(a)|
Melissa K. Ventrone, Aleksandra M. S. Vold; Wilson Elser Moskowitz Edelman & Dicker LLP;
September 2, 2015, previously published on September 1, 2015The Third Circuit recently issued its highly anticipated ruling in the Federal Trade Commission v. Wyndham Worldwide Corp., Case. No. 14-3514, holding that the FTC has authority to regulate the cybersecurity practices of companies under the “unfair” prong of section 5 of the FTC Act. In...
|The Ashley Madison Hack is More than Just Embarrassing|
McDonald Hopkins LLC;
August 25, 2015, previously published on August 21, 2015It was a bad week for people looking to cheat on their spouses - hackers publicly released the personal information of roughly 33 million users of the cheating site Ashley Madison. Aside from the obvious public embarrassment, many experts are saying the incident underscores the serious...
|Data Dump! AshleyMadison.com Fallout Deepens|
Wynter Lavier Deagle; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
August 20, 2015, previously published on August 20, 2015The Impact Team, the vigilante group behind the hacking of the infamous website AshleyMadison.com has followed through on its threat to leak the full database of the site’s users online. On Tuesday, August 18, 2015, an impressive 9.7 gigabytes of compressed data was posted to the dark web...
|Internet of Things and Cybersecurity|
Kevin L. LaRoche, Scott Widdowson; Borden Ladner Gervais LLP;
August 7, 2015, previously published on August 4, 2015The “Internet of Things” (IoT) is the developing web of objects embedded with microchips capable of allowing sending and receiving data, and so connecting them to the network we call the Internet. In an article in the Harvard Business Review late last year, Michael Porter and James...
|Getting Compliant With the EU Cookie Law|
Matthew D. Lawless, Diane D. Reynolds, Michael Wager; Taft Stettinius & Hollister LLP;
August 7, 2015, previously published on August 4, 2015Google recently sent out a letter to users of its AdSense, DoubleClick for Publishers, and DoubleClick Ad Exchange products.
|Germany Rushes to Adopt a New IT Security Act|
Wolfgang Büchner, Ted-Philip Kroke, Undine von Diemar; Jones Day;
July 31, 2015, previously published on July 2015The German Federal Council (Bundesrat) has approved the Act regarding Improved Security of Information Technology systems ("IT Security Act") on July 10, 2015 without seeing a need to defer it to the Reconciliation Committee (Vermittlungsschuss). Shortly before, on June 12, 2015, the...
|Appointing Legacy Contacts for Facebook|
Meredith Edwards Collins; Adams and Reese LLP;
July 31, 2015, previously published on July 7, 2015Earlier this year (Feb. 2015), Facebook announced a new feature that allows Facebook users to designate a legacy contact to manage their Facebook account when they pass away. According to facebook.com, a legacy contact is, "[s]omeone you choose to look after your account if it's...
|EU Data Privacy Update: European Council Approves Agreement To Data Privacy Reform|
Kenneth R. Florin, Ieuan Jolly, James D. Taylor; Loeb & Loeb LLP;
July 15, 2015, previously published on July 2015European regulators took another step forward on the protracted and procedurally involved path to EU-wide data privacy reform earlier this month when the European Council (the organization of the individual member states) agreed upon a "common approach" to data privacy regulation that...
|Digital Privacy Act - New Requirement for Valid Consent to Use Personal Information|
Bradley J. Freedman; Borden Ladner Gervais LLP;
July 3, 2015, previously published on June 25, 2015On June 18, 2015, the Canadian government enacted the Digital Privacy Act, which makes a number of important changes to the Personal Information Protection and Electronic Documents Act. One of the most significant changes is a new, additional requirement for “valid consent” to the...