Search Results (813)
Documents on Internet Law, Communications & Media
Show: results per page
|7 Tactics for Winning the Cyber War, Part 2: Know Your Role|
Richik Sarkar; McDonald Hopkins LLC;
October 30, 2015, previously published on September 2, 2015As a director or member of the board, it is important that you understand how cybersecurity issues affect your usual fiduciary duties. And it’s equally important that you understand what the potential liabilities are. Courts and regulators today are employing stringent standards and analyzing...
|Irish High Court Quashes Irish Data Protection Commission Original Schrems’ Decision|
Mintz Levin Cohn Ferris Glovsky Popeo P.C.;
October 23, 2015, previously published on October 20, 2015The Irish High Court today has ordered the Irish Data Protection Commissioner (DPC) to investigate Facebook’s European data privacy practices, bringing Max Schrems’ three-year fight full circle. The Court today quashed the original DPC refusal to examine Schrems’ complaint that...
|New Maine Social Media Privacy Law Takes Effect October 15, 2015|
David P. Mason; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
October 20, 2015, previously published on October 9, 2015Maine has become the latest state to restrict employers’ ability to access social media accounts of employees and applicants. A new Maine statute, which will go into effect on October 15, 2015, prohibits a broad range of employer conduct.
|Third Circuit Holds FTC Has Authority to Regulate Cybersecurity under Unfairness Prong of 15 U.S.C. § 45(a)|
Melissa K. Ventrone, Aleksandra M. S. Vold; Wilson Elser Moskowitz Edelman & Dicker LLP;
September 2, 2015, previously published on September 1, 2015The Third Circuit recently issued its highly anticipated ruling in the Federal Trade Commission v. Wyndham Worldwide Corp., Case. No. 14-3514, holding that the FTC has authority to regulate the cybersecurity practices of companies under the “unfair” prong of section 5 of the FTC Act. In...
|5 Deadly Sins Cyber Criminals Know About Law Firm Security|
Brent Cantrell, Fred Cobb, Justin Joy, William Kunkel; Lewis, Thomason, King, Krieg & Waldrop, P.C.;
September 2, 2015, previously published on August 2015Nearly every day we hear news of some new, large-scale cyber hack. For instance, the recent OPM database hack compromised personal information for over 21 million past and current federal employees and contractors. This attack, along with those on Target, Home Depot and several large insurance...
|Third Circuit Affirms the FTC's Authority to Regulate and Enforce Data Security|
Richard J. Johnson, Todd S. McClelland, Daniel J. McLoon, Michael G. Morgan, Jeffrey Rabkin; Jones Day;
September 1, 2015, previously published on August 2015In FTC v. Wyndham Worldwide Corp., No 14-3514, -- F.3d-- (3d Cir. Aug. 24, 2015), the Third Circuit issued an important decision affirming a United States District Court of New Jersey ruling that the Federal Trade Commission ("FTC") has authority under Section 5 of the Federal Trade...
|U.S. Court of Appeals Upholds FTC’s Authority to Regulate Cybersecurity|
Sutherland Asbill Brennan LLP;
August 25, 2015, previously published on August 24, 2015Today, the United States Court of Appeals for Third Circuit issued its opinion in FTC v. Wyndham Worldwide Corp. upholding the authority of the Federal Trade Commission to regulate corporate cybersecurity under Section 5(a) of the Federal Trade Commission Act, which prohibits businesses from...
|NAIC CyberSecurity Task Force To Review Federal Financial Institutions Examination Council's (FFIEC) Cyber-Assessment Tool|
G. Donovan Brown; Colodny Fass, P.A.;
August 12, 2015, previously published on August 10, 2015The National Association of Insurance Commissioners ("NAIC") Cybersecurity Task Force will discuss the Federal Financial Institutions Examination Council ("FFIEC") Cybersecurity Assessment Tool ("CAT") as part of its Summer 2015 National Meeting agenda (Twitter Hashtag...
|Post/Tweet/Pin/Snap/Share/Etc. with Confidence: Crafting Social Media Policies to Survive Consumer and Regulatory Scrutiny|
Nathan A. Cardon, Tracy P. Marshall, Sheila A. Millar; Keller and Heckman LLP;
July 16, 2015, previously published on July 14, 2015It is a common refrain in advertising that you have to go where the eyeballs are. These days, many advertisers have concluded that the eyeballs are in and on social media- whether on desktop computers, tablets, or mobile devices like smartphones and smart watches so thats where many are spending an...
|U.S. Supreme Court Upholds Privacy Rights for Los Angeles Hotel Operators|
Michael C. Douglass; Wilson Elser Moskowitz Edelman & Dicker LLP;
July 15, 2015, previously published on July 13, 2015In a win for privacy advocates, the U.S. Supreme Court ruled that a City of Los Angeles municipal ordinance permitting warrantless police searches of hotel registries is unconstitutional. The subject ordinance (Los Angeles Municipal Code section 41.49 3(a)) required hotel operators to hand over...