Business Torts Privacy

Read Business Torts updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Increasing Risks of Fraud; Compliance Failures; A Willingness to be Unethical

Cyber security, corruption and unethical behavior pose significant risks for business enterprises, according to a new survey by EY titled “Overcoming Compliance Fatigue’. At the same time business organizations may be...more

Disappearing Act Fails – Maryland Attorney General and FTC “snap” back at Snapchat

Recently, the Maryland Attorney General’s Office announced that it reached a settlement with Snapchat, Inc. over alleged deceptive trade practices in violation of Maryland law and violations of federal laws that are intended...more

Fraudulent use of a service by hackers – a lesson for service providers

A recent case contains some salutary lessons for service providers concerning liability for fraudulent use of their services. It appears that unless the contract has clear terms to the contrary then the service provider, not...more

Shareholder Derivative Suit against Wyndham Worldwide Implicates D&O Coverage

A shareholder of Wyndham Worldwide Corp. (“Wyndham”) recently filed a derivative action against Wyndham’s board of directors arising out of three high profile data breaches occurring from 2008 to 2010. Dennis Palkon filed...more

Shareholder derivative action against Wyndham Worldwide directors for data breaches

Hot on the heels of our recently released publication, ‘Cyber risks and the impact on company directors’, it has been revealed that a shareholder has commenced a derivative action in the district of New Jersey (USA) against...more

Cyber Risks for the Boardroom Part 2: Why Corporate Directors Should be Concerned About Data Security Breaches

All this week, we are featuring a series “Cyber Risks – Director Liability and Potential Gaps in D&O Coverage” Part 2 of 5: Why Directors Should Be Concerned...more

An Overview of the 2014 Class Action Survey [Video]

To read the full 2014 Class Action Survey report, please visit ClassActionSurvey.com. Fifty-two percent of major companies are currently engaged in class action litigation. This percentage has remained fairly consistent...more

Are Confidential Witness Reforms Looming On The Horizon? Can The Plaintiff’s Bar Stop Them?

A decision is expected shortly in the highly publicized so-called confidential witness “scandal” involving the Robbins Geller Rudman & Dowd law firm. Judge Suzanne B. Conlon of the United States District Court, Northern...more

On the 11th Day of Privacy, class counsel served on me……

. . . a data breach class action. Hackers and plaintiffs’ lawyers could combine to make 2014 the year when class actions concerning theft of sensitive information proliferate. On this 11th Day of Privacy, we look...more

Board Oversight of Cyber Security and Cyber-Security Disclosures: Answers to Some of the Key Questions

Cyber security is top of mind for companies, and cyber-security oversight is top of mind for corporate directors. I recently co-moderated a panel discussion for directors on board oversight of cyber security and...more

Privacy Causes of Action

An outline of privacy law that cites to potential causes of action, whether common law or statutory, with a focus on New York law....more

Three Steps That Allow Companies to Use the Computer Fraud and Abuse Act for Misuse of Computers and Information – Even in the...

Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable...more

Taking Legal Control Of The Company Social Media Account

What happens when the employee who set up the company’s LinkedIn account leaves? ...more

Right Of Privacy Claim Survives Summary Judgment Based On Oral Disclosure in Workplace

In Ignat v. Yum! Brands (March 18, 2013) an employee claimed a violation of her right of privacy when her supervisor publicly disclosed to coworkers her bipolar condition. The trial court granted summary judgment to the...more

If my picture has been attributed to someone else’s bad conduct incorrectly, do I have a defamation claim/case?

If your picture has appeared in a publication and you are concerned about the message being incorrect or defamatory; or if there is some other possible defamatory publication recently made about you, you will want to read...more

Unique Privacy Concerns for Mobile Apps [Video]

With the rise of BaaS (or Backend as a service) platforms, it is easier than ever to create a mobile app on the fly. But Fenwick privacy co-chair Tyler Newby advises that companies should be aware of some important privacy...more

Laying Foundation for Meta Data and Websites

Lawsuits brought in the U.S. that result in judgments against Chinese companies often have problems with enforceability, unless the Chinese company has assets in the US or assets in another country that enforces US judgments....more

Who Owns an Employee’s LinkedIn Account?

LinkedIn is a social media site catering exclusively to professionals with 200 million registered users in 200 countries. For many businesses, marketing via social media is a critical component to success. Employees use...more

Safeguards against Data Security Breaches (Part One) [Video]

With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more

SEC v. Hackers: More Cybersecurity Enforcement On The Horizon?

Cybersecurity may be the SEC’s newest area for enforcement actions. While the SEC first released Disclosure Guidance concerning cybersecurity in 2011, the recent media attention surrounding significant cybersecurity breaches...more

Buying Competitor's Names As Keywords Does Not Violate Wisconsin's Privacy Law

A personal injury law firm can buy search terms using the names of a competing law firm’s partners without violating Wisconsin’s privacy laws because the use of the names is “non-visible,” an appellate court found. The...more

Missouri Uniform Trade Secrets Act Does Not Protect Customer Information Insufficiently Guarded or Which is not Truly "Trade...

In this case, a corporate successor, Central Trust Investment Company (hereafter also "Central Trust") sued the former employee (Kennedy) of its acquired company, Springfield Trust & Investment Company (hereafter also "STC"),...more

Three Key Data Retention Questions [Video]

Your company has been sued – what do you need to consider to comply with data preservation requirements? How do you address litigation holds, ediscovery and data retention? Robert Brownstone, litigation attorney and chair of...more

New Jersey's Medical Marijuana Law Impacts Employers

The New Jersey Compassionate Use Medical Marijuana Act raises a slew of issues for employers that have yet to be fully explored and resolved in litigation. New Jersey employers must have an ongoing relationship with an...more

Jurisdiction for an International Computer Fraud Lawsuit?

The proper jurisdiction for suing someone for engaging in computer fraud from a foreign country, directed at a company in the United States, is the place where the wrongfully accessed computer server is located if the...more

94 Results
|
View per page
Page: of 4

Follow Business Torts Updates on: