Meighan O'Reardon

Meighan O'Reardon

Pillsbury Winthrop Shaw Pittman LLP

Contact  |  View Bio  |  RSS

Latest Publications

Share:

Have You Thought About Your Online Terms of Use Recently?

Nearly every website, app or online service posts a set of Terms of Use outlining company policies for users (sometimes called Terms of Service) (“Terms”), but many companies do not know if their Terms are enforceable in...more

8/10/2015 - Arbitration Browsewrap Agreement Clickwrap Agreements Copyright Infringement Intellectual Property Protection Internet Mobile Apps Online Safety for Children Privacy Policy Terms of Service Terms of Use Websites

EU Cybersecurity Regulations - The Costs of Financial Market Infrastructure Resiliency

Any company that uses information technology is a potential target for data theft, advanced malware and other cyber threats. Cyber threats have emerged as a growing systemic risk particularly to the financial sector in which...more

1/28/2015

BYOD: No Such Thing as a Free Lunch

It seems intuitive that, by and large, employees prefer to use their own mobile devices, carrying only a single device for personal and work purposes, and having choice over the device to be used (please don't take away my...more

9/5/2014 - Bring Your Own Device Cell Phones Mobile Devices Reimbursements

How Significant is the Wyndham Case to the US Cybersecurity Legal Landscape?

The security community has been abuzz this week with the US. District Court of New Jersey's April 7 ruling in Federal Trade Commission v. Wyndham Worldwide Corporation, et al. Wyndham had asserted in a motion to dismiss that...more

4/16/2014 - Cybersecurity Enforcement Actions FTC Hotels Personally Identifiable Information Wyndham

Remain Vigilant: Managing Cybersecurity Risks in Third-Party Outsourcing Relationships

Managing third-party suppliers presents significant compliance challenges that often span an organization, raising legal, insurance, human resources and technology concerns, to name just a few. Corporations will continue to...more

3/5/2014 - Cybersecurity Cybersecurity Framework Information Technology Outsourcing Outsourcing Third-Party Relationships

National Cybersecurity Framework Released - Has Your Organization Considered the Implications?

On February 12, 2014, the National Institute of Standards and Technology ("NIST") released the final version of its Framework for Improving Critical Infrastructure Cybersecurity (the "Cybersecurity Framework" or "Framework")...more

2/20/2014 - Critical Infrastructure Sectors Cybersecurity Cybersecurity Framework NIST

New Binding Corporate Rules Now Available for Data Processors

In a further push towards “privacy by design,” the Article 29 Working Party, which is made up of representatives from the various EU data protection authorities, has recently approved the use of Binding Corporate Rules...more

1/28/2013 - Binding Corporate Rules Data Processors Data Protection EU European Commission International Data Transfers

7 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×