Join Matindale-Hubbell Connected

Search Results (2289)

Documents on security

View Page: Prev  1  2  3  4  5  6  7  8  9  10  Next  >>
Show: results per page
Sort by:
Sponsored Results

HTMLCommentaries of the Law That Regulates Protection of Persons That Need Especial Security in El Salvador
Roberto Molina Mendoza; Benjamín Valdez & Asociados Abogados y Notarios;
Legal Alert/Article
April 23, 2012, previously published on May 2011
Secutiry law in El Salvador


HTMLGovernment Announces Creation of New Independent Border Control Agency
Fragomen Del Rey Bernsen Loewy LLP;
Legal Alert/Article
February 28, 2012, previously published on February 22, 2012
In early March 2012, the UK will create the UK Border Force, a new agency that will assume responsibility for border controls and inspections services at UK ports of entry. The new agency will operate independently of the UK Border Agency (UKBA) and its operations will be subject to separate...


HTMLIn Federal Court Lawsuit Alleging False Arrest of Armed Private Security Guard, Recent Holding Finds Material Facts Preclude Application of Qualified Immunity
John C. Connell, Carlton L. Johnson, Jeffrey M. Scott; Archer Greiner A Professional Corporation;
Legal Alert/Article
January 27, 2012, previously published on January 23, 2012
On December 14, 2011, the District Court for the District of New Jersey issued a decision in Thomas v. Delaware River Port Authority et al., Civ. No. 10-5514 (JS). The court denied the individual defendant's motion for summary judgment based on qualified immunity due to what the court found to be...


HTMLGSA Requires IT Contractors to Create and Implement IT Security Plans: This May Only Be the Beginning
Andrew E. Bigart, Dismas Locaria, Rebecca E. Pearson; Venable LLP;
Legal Alert/Article
January 23, 2012, previously published on January 2012
On January 6, 2012, the General Services Administration (“GSA”) issued a final rule (77 Fed. Reg. 749 (Jan. 6, 2012)) requiring all prime- and sub-contractors providing the GSA with information technology (“IT”) supplies, services, or systems to submit an IT security plan...


HTMLBringing Document Authentication into the 21st Century
Fragomen Del Rey Bernsen Loewy LLP;
Legal Alert/Article
January 17, 2012, previously published on January 11, 2012
On Wednesday, January 4th, the U.S. Customs and Border Protection (CBP) issued a rather unusual press release. Essentially the CBP labeled reports in a Canadian newspaper that someone had gotten into the United States by presenting only a digital image of his passport as “categorically...


HTMLIntroduction of Relevant Regulations on the Share Transfer of Insiders of Publicly Offered Companies
Grace Chou; Lee Tsai Partners;
Legal Alert/Article
November 7, 2011, previously published by In addition, Subparagraph 2 of Paragraph 1 and Paragraph 2 of Article 178 of the Securities and Exchange Law provide that if the above-mentioned requirements are violated, the competent authority shall, in addition to imposing a fine of NT$240,000 to NT$2,400,000, demand the violators to rectify within a specified period.  In case of their failure to rectify, such demand requesting rectification within a specified period may be made consecutively along with the imposition of a fine of NT$480,000 to NT$4,800,000 each time until rectification is made.
Introduction of Relevant Regulations on the Share Transfer of Insiders of Publicly Offered Companies


HTMLFederal Agencies Experience Sharp Rise in Security Incidents
Kathryn L. Ossian; Miller, Canfield, Paddock and Stone, P.L.C.;
Legal Alert/Article
October 18, 2011, previously published on October 18, 2011
We've all heard about security breaches occurring in the private sector. The public sector is also subject to security threats, as evidenced by a new report to Congress by the Government Accountability Office (GAO). From September 2010 through October 2011, the GAO conducted an audit of 24 major...


Adobe PDFProposed Federal Cybersecurity Legislation: A New Landscape for Regulation of Data Security and Security Breach Notifications
Marcus A. Asner, James D. Flynn, Ronald D. Lee, Nancy L. Perkins; Arnold & Porter LLP;
Legal Alert/Article
October 6, 2011, previously published on October 2011
Recent high-profile data security breaches at the International Monetary Fund, Pentagon and US Senate, and companies like Google, Sony, and RSA—to name a few—have elevated concerns about vulnerabilities in the nation’s cybersecurity in both the public and private sectors....


HTMLCyber Security of Consumers’ Financial Information
Dru Roscoe; Cole Scott Kissane P.A.;
Legal Alert/Article
September 28, 2011, previously published on September 27, 2011
With the rapid growth of the use of technology in business comes great risk to consumers private information, and a concomitant risk to many of the businesses that are charged with the protection of that private information. In recent years, the Federal Government has enacted regulations, albeit...


HTMLFCC Issues Additional Information Regarding November 9, 2011 Nationwide EAS Test and Extends Cap Compliance Deadline until June 30, 2012
Lerman Senter PLLC;
Legal Alert/Article
September 26, 2011, previously published on September 21, 2011
The FCC’s Public Safety and Homeland Security Bureau (“Public Safety Bureau”) has issued additional information about the first nationwide test of the Emergency Alert System (“EAS”), which will occur at 2:00 p.m. EST on November 9, 2011 and last for approximately three...


View Page: Prev  1  2  3  4  5  6  7  8  9  10  Next  >>