Latest Publications

Share:

Have You Thought About Your Online Terms of Use Recently?

Nearly every website, app or online service posts a set of Terms of Use outlining company policies for users (sometimes called Terms of Service) (“Terms”), but many companies do not know if their Terms are enforceable in...more

EU Cybersecurity Regulations - The Costs of Financial Market Infrastructure Resiliency

Any company that uses information technology is a potential target for data theft, advanced malware and other cyber threats. Cyber threats have emerged as a growing systemic risk particularly to the financial sector in which...more

1/28/2015

BYOD: No Such Thing as a Free Lunch

It seems intuitive that, by and large, employees prefer to use their own mobile devices, carrying only a single device for personal and work purposes, and having choice over the device to be used (please don't take away my...more

How Significant is the Wyndham Case to the US Cybersecurity Legal Landscape?

The security community has been abuzz this week with the US. District Court of New Jersey's April 7 ruling in Federal Trade Commission v. Wyndham Worldwide Corporation, et al. Wyndham had asserted in a motion to dismiss that...more

Remain Vigilant: Managing Cybersecurity Risks in Third-Party Outsourcing Relationships

Managing third-party suppliers presents significant compliance challenges that often span an organization, raising legal, insurance, human resources and technology concerns, to name just a few. Corporations will continue to...more

National Cybersecurity Framework Released - Has Your Organization Considered the Implications?

On February 12, 2014, the National Institute of Standards and Technology ("NIST") released the final version of its Framework for Improving Critical Infrastructure Cybersecurity (the "Cybersecurity Framework" or "Framework")...more

New Binding Corporate Rules Now Available for Data Processors

In a further push towards “privacy by design,” the Article 29 Working Party, which is made up of representatives from the various EU data protection authorities, has recently approved the use of Binding Corporate Rules...more

7 Results
/
View per page
Page: of 1

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.