Mondaq USA: Privacy
Reed Smith
In a decision that underscores the importance of carefully considering company computer-use policies and permissions, the United States District Court for the Middle District of Florida held last month that a company could not maintain a Computer Fraud and Abuse Act ..
Brown Smith Wallace
It's no secret that even companies that take the proper precautions against data breaches can still be hacked and have to face the consequences...
McGuireWoods LLP
Hotels possess a treasure trove of private information about their guests.
McGuireWoods LLP
Here are four points to keep in mind with respect to limitations of liability for data breaches when your company is negotiating with a vendor.
Patterson Belknap Webb & Tyler LLP
A recent discovery ruling in the Target Corp. data breach litigation has raised the stakes for corpora­tions and their officers and directors when faced with a cyberattack.
Ice Miller LLP
OPM is the central human resources planner for the Federal Government. Among other things, it assists Federal agencies in hiring new employees, and provides Federal investigative services for background checks.
Holland & Knight
Today, the Federal Financial Institutions Examination Council released a Cybersecurity Assessment Tool to assist organizations in identifying cyber risks and assessing their cybersecurity preparedness.
Foley & Lardner
OPM officials were quick to identify aging legacy systems as the main culprit behind the massive data theft.
WilmerHale
On June 30, the Federal Trade Commission (FTC) issued its first guidance document as part of its Start with Security initiative.
Sheppard Mullin Richter & Hampton
On June 19, 2015, the National Institute of Standards and Technology published the final version of guidance for federal agencies to ensure sensitive information remains confidential when stored outside of federal systems.
Partridge & Garcia P.C.
Illinois is joining several other states in passing legislation that would dramatically increase the potential liability for marketers in the event of a data breach.
Hogan Lovells US LLP
The U.S. Federal Communications Commission's Public Safety and Homeland Security Bureau requested public input on a recent report on Cybersecurity Risk Management and Best Practices.
BakerHostetler
On June 18, 2015, the Canadian Minister of Industry announced that the Digital Privacy Act, which amends Canada's foundational Personal Information Protection and Electronic Documents Act, has received royal assent and is now law.
Fox Rothschild LLP
With data breaches being the quickly trending "flavor of the month" criminal activity, it's no shock that on June 4, 2015 yet another system was hit.
Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.
NTIA's multistakeholder process began in December 2013 as a means of developing a voluntary, enforceable code of conduct to apply the White House's Consumer Privacy Bill of Rights to facial recognition technologies.
Foley & Lardner
As previously discussed on this blog, cybersecurity is an issue that should be top-of-mind for all companies, including automotive companies.
Holland & Knight
Today's marketplace is a hotbed for technological innovation and business-minded entrepreneurs to launch a startup company.
Foley & Lardner
Cybersecurity is an issue that should be top-of-mind for all companies. But there are three misconceptions about cybersecurity that can put companies at significant risk.
Fox Rothschild LLP
With data breaches being the quickly trending "flavor of the month" criminal activity, it's no shock that on June 4, 2015 yet another system was hit.
Reed Smith
Mississippi Attorney General (AG) Jim Hood is the president of the National Association of Attorneys General (NAAG), the professional association for the AGs of all 50 states, DC and the U.S. territories
Latest Video
Most Popular Recent Articles
Sheppard Mullin Richter & Hampton
Unless you've been living in the 18th century you are aware that the records of approximately 4 million current and former federal employees were compromised as a result of a recently disclosed network breach...
Orrick
There are too many differences between cyber policies to cover in one blog post, and the market, still in its youth, is rapidly evolving.
Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.
In the previous Congress, we saw a burst of policy and industry attention to telehealth as lawmakers and stakeholders alike recognized the cost, quality, and accessibility benefits of telehealth.
Foley Hoag LLP
Concluding our three-part analysis of the White House’s first Summit on Cybersecurity and Consumer Protection
Orrick
On Feb. 3, the Securities and Exchange Commission (SEC) and the Financial Industry Regulatory Authority (FINRA) each released reports regarding cybersecurity issues for brokerage and advisory firms...
Jones Day
The U.S. Department of State, Directorate of Defense Trade Controls ("DDTC") recently published proposed revisions to the International Traffic in Arms Regulations ("ITAR") to add or change a number of key definitions.
Klein Moynihan Turco LLP
Last month, a working group for the Internet Corporation for Assigned Names and Numbers ("ICANN") issued a report that contemplates whether the owners of certain commercial websites should be forbidden from using WHOIS proxy services to hide their identities.
Jones Day
Government contractors are in a difficult position when it comes to cybersecurity.
Reed Smith
In separate cases, one Illinois federal judge issued several rulings favorable to Telephone Consumer Protection Act (TCPA) plaintiffs on key issues.
Jones Day
In our last post we addressed cyber coverage for fines and penalties imposed by governmental authorities.
Article Search Using Filters
Related Topics
Mondaq Advice Center (MACs)
Popular Authors
Popular Contributors
Tools
Font Size:
Translation
Channels
Mondaq on Twitter
Partners