Business Torts Privacy

Read Business Torts updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Tinker, Tailor, Who’s the Spy? How to Safeguard Your Company From the Insider Hack

The headlines are full of data breach attacks — millions of credit card numbers stolen, healthcare information hacked — all of it feeding the thriving cyber-crime economy. More often than not, the bad actors lurk outside the...more

International Fraud & Asset Tracing (3rd Edition), Hong Kong

In this Guide: - Introduction - Managing the Internal Investigation - Disclosure from Third Parties - Steps to Preserve Assets/Documents - Civil Proceedings - Anti-Bribery/Anti-Corruption...more

Record penalty against payday lender

As previously reported, on 26 August 2014, the Federal Court determined that The Cash Store Pty Ltd (in liquidation), a payday lender, and Assistive Finance Australia Pty Ltd, a loan funder, committed seven separate breaches...more

Cybersecurity Risks Are Higher than Ever and Are Proving Costly

Cybersecurity is an increasing concern for companies. Last April, the UK Department for Business, Innovation & Skills (BIS) published the 2014 information security breaches survey: technical report. The report comprises the...more

Issuer Banks’ Claims in Target Data Breach Litigation Survive Motion to Dismiss

Federal District Judge Paul Magnuson has ruled that banks that issued credit and debit cards to customers whose data was stolen in the December 2013 Target data breach could continue to litigate claims against Target for...more

Increasing Risks of Fraud; Compliance Failures; A Willingness to be Unethical

Cyber security, corruption and unethical behavior pose significant risks for business enterprises, according to a new survey by EY titled “Overcoming Compliance Fatigue’. At the same time business organizations may be...more

Disappearing Act Fails – Maryland Attorney General and FTC “snap” back at Snapchat

Recently, the Maryland Attorney General’s Office announced that it reached a settlement with Snapchat, Inc. over alleged deceptive trade practices in violation of Maryland law and violations of federal laws that are intended...more

Fraudulent use of a service by hackers – a lesson for service providers

A recent case contains some salutary lessons for service providers concerning liability for fraudulent use of their services. It appears that unless the contract has clear terms to the contrary then the service provider, not...more

Shareholder Derivative Suit against Wyndham Worldwide Implicates D&O Coverage

A shareholder of Wyndham Worldwide Corp. (“Wyndham”) recently filed a derivative action against Wyndham’s board of directors arising out of three high profile data breaches occurring from 2008 to 2010. Dennis Palkon filed...more

Shareholder derivative action against Wyndham Worldwide directors for data breaches

Hot on the heels of our recently released publication, ‘Cyber risks and the impact on company directors’, it has been revealed that a shareholder has commenced a derivative action in the district of New Jersey (USA) against...more

Cyber Risks for the Boardroom Part 2: Why Corporate Directors Should be Concerned About Data Security Breaches

All this week, we are featuring a series “Cyber Risks – Director Liability and Potential Gaps in D&O Coverage” Part 2 of 5: Why Directors Should Be Concerned...more

An Overview of the 2014 Class Action Survey [Video]

To read the full 2014 Class Action Survey report, please visit ClassActionSurvey.com. Fifty-two percent of major companies are currently engaged in class action litigation. This percentage has remained fairly consistent...more

Are Confidential Witness Reforms Looming On The Horizon? Can The Plaintiff’s Bar Stop Them?

A decision is expected shortly in the highly publicized so-called confidential witness “scandal” involving the Robbins Geller Rudman & Dowd law firm. Judge Suzanne B. Conlon of the United States District Court, Northern...more

On the 11th Day of Privacy, class counsel served on me……

. . . a data breach class action. Hackers and plaintiffs’ lawyers could combine to make 2014 the year when class actions concerning theft of sensitive information proliferate. On this 11th Day of Privacy, we look...more

Board Oversight of Cyber Security and Cyber-Security Disclosures: Answers to Some of the Key Questions

Cyber security is top of mind for companies, and cyber-security oversight is top of mind for corporate directors. I recently co-moderated a panel discussion for directors on board oversight of cyber security and...more

Privacy Causes of Action

An outline of privacy law that cites to potential causes of action, whether common law or statutory, with a focus on New York law....more

Three Steps That Allow Companies to Use the Computer Fraud and Abuse Act for Misuse of Computers and Information – Even in the...

Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable...more

Taking Legal Control Of The Company Social Media Account

What happens when the employee who set up the company’s LinkedIn account leaves? ...more

Right Of Privacy Claim Survives Summary Judgment Based On Oral Disclosure in Workplace

In Ignat v. Yum! Brands (March 18, 2013) an employee claimed a violation of her right of privacy when her supervisor publicly disclosed to coworkers her bipolar condition. The trial court granted summary judgment to the...more

If my picture has been attributed to someone else’s bad conduct incorrectly, do I have a defamation claim/case?

If your picture has appeared in a publication and you are concerned about the message being incorrect or defamatory; or if there is some other possible defamatory publication recently made about you, you will want to read...more

Unique Privacy Concerns for Mobile Apps [Video]

With the rise of BaaS (or Backend as a service) platforms, it is easier than ever to create a mobile app on the fly. But Fenwick privacy co-chair Tyler Newby advises that companies should be aware of some important privacy...more

Laying Foundation for Meta Data and Websites

Lawsuits brought in the U.S. that result in judgments against Chinese companies often have problems with enforceability, unless the Chinese company has assets in the US or assets in another country that enforces US judgments....more

Who Owns an Employee’s LinkedIn Account?

LinkedIn is a social media site catering exclusively to professionals with 200 million registered users in 200 countries. For many businesses, marketing via social media is a critical component to success. Employees use...more

Safeguards against Data Security Breaches (Part One) [Video]

With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more

SEC v. Hackers: More Cybersecurity Enforcement On The Horizon?

Cybersecurity may be the SEC’s newest area for enforcement actions. While the SEC first released Disclosure Guidance concerning cybersecurity in 2011, the recent media attention surrounding significant cybersecurity breaches...more

98 Results
|
View per page
Page: of 4

Follow Business Torts Updates on:

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×