Search Results (2320)
Documents on security
Show: results per page
|Payment and Calculation of Securities Transaction Taxes or Income Taxes for the Trading Of Equity Securities of Companies Limited by Shares in the ROC|
Lorrain Lai; Lee Tsai Partners Attorneys-at-Law;
July 13, 2012Payment and calculation of securities transaction taxes or income taxes for the trading of equity securities of companies limited by shares in the ROC
|Commentaries of the Law That Regulates Protection of Persons That Need Especial Security in El Salvador|
Roberto Molina Mendoza; Benjamín Valdez & Asociados Abogados y Notarios;
April 23, 2012, previously published on May 2011Secutiry law in El Salvador
|Government Announces Creation of New Independent Border Control Agency|
Fragomen Del Rey Bernsen Loewy LLP;
February 28, 2012, previously published on February 22, 2012In early March 2012, the UK will create the UK Border Force, a new agency that will assume responsibility for border controls and inspections services at UK ports of entry. The new agency will operate independently of the UK Border Agency (UKBA) and its operations will be subject to separate...
|In Federal Court Lawsuit Alleging False Arrest of Armed Private Security Guard, Recent Holding Finds Material Facts Preclude Application of Qualified Immunity|
John C. Connell, Carlton L. Johnson, Jeffrey M. Scott; Archer Greiner A Professional Corporation;
January 27, 2012, previously published on January 23, 2012On December 14, 2011, the District Court for the District of New Jersey issued a decision in Thomas v. Delaware River Port Authority et al., Civ. No. 10-5514 (JS). The court denied the individual defendant's motion for summary judgment based on qualified immunity due to what the court found to be...
|GSA Requires IT Contractors to Create and Implement IT Security Plans: This May Only Be the Beginning|
Andrew E. Bigart, Dismas Locaria, Rebecca E. Pearson; Venable LLP;
January 23, 2012, previously published on January 2012On January 6, 2012, the General Services Administration (“GSA”) issued a final rule (77 Fed. Reg. 749 (Jan. 6, 2012)) requiring all prime- and sub-contractors providing the GSA with information technology (“IT”) supplies, services, or systems to submit an IT security plan...
|Bringing Document Authentication into the 21st Century|
Fragomen Del Rey Bernsen Loewy LLP;
January 17, 2012, previously published on January 11, 2012 On Wednesday, January 4th, the U.S. Customs and Border Protection (CBP) issued a rather unusual press release. Essentially the CBP labeled reports in a Canadian newspaper that someone had gotten into the United States by presenting only a digital image of his passport as “categorically...
|Introduction of Relevant Regulations on the Share Transfer of Insiders of Publicly Offered Companies|
Grace Chou; Lee Tsai Partners;
November 7, 2011, previously published by In addition, Subparagraph 2 of Paragraph 1 and Paragraph 2 of Article 178 of the Securities and Exchange Law provide that if the above-mentioned requirements are violated, the competent authority shall, in addition to imposing a fine of NT$240,000 to NT$2,400,000, demand the violators to rectify within a specified period. In case of their failure to rectify, such demand requesting rectification within a specified period may be made consecutively along with the imposition of a fine of NT$480,000 to NT$4,800,000 each time until rectification is made.Introduction of Relevant Regulations on the Share Transfer of Insiders of Publicly Offered Companies
|Federal Agencies Experience Sharp Rise in Security Incidents|
Kathryn L. Ossian; Miller, Canfield, Paddock and Stone, P.L.C.;
October 18, 2011, previously published on October 18, 2011We've all heard about security breaches occurring in the private sector. The public sector is also subject to security threats, as evidenced by a new report to Congress by the Government Accountability Office (GAO). From September 2010 through October 2011, the GAO conducted an audit of 24 major...
|Proposed Federal Cybersecurity Legislation: A New Landscape for Regulation of Data Security and Security Breach Notifications|
Marcus A. Asner, James D. Flynn, Ronald D. Lee, Nancy L. Perkins; Arnold & Porter LLP;
October 6, 2011, previously published on October 2011Recent high-profile data security breaches at the International Monetary Fund, Pentagon and US Senate, and companies like Google, Sony, and RSA—to name a few—have elevated concerns about vulnerabilities in the nation’s cybersecurity in both the public and private sectors....
|Cyber Security of Consumers’ Financial Information|
Dru Roscoe; Cole Scott Kissane P.A.;
September 28, 2011, previously published on September 27, 2011With the rapid growth of the use of technology in business comes great risk to consumers private information, and a concomitant risk to many of the businesses that are charged with the protection of that private information. In recent years, the Federal Government has enacted regulations, albeit...