News & Analysis as of

General Business Communications & Media Science, Computers & Technology

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.

Municipalities Under Connecticut's New Cybersecurity Strategy

by Murtha Cullina on

On July 10, 2017, Governor Dannel Malloy, along with Chief Information Officer Mark Raymond and Chief Cybersecurity Risk Officer Arthur House, released Connecticut’s initial Cybersecurity Strategy. The goal of the...more

US FCC Allocates 5 GHz of Contiguous Spectrum for Next Generation Vehicular Radar

by Hogan Lovells on

On July 13, the United States (“US”) Federal Communications Commission (“FCC”) issued a decision allocating a contiguous 5 GHz band of radio frequency spectrum for vehicular radar operations. The decision implemented in the...more

VTech Escapes Class Action Case Over Breach of 11 Million Toy Users’ Information

In November 2015, VTech Electonics North America LLC (VTech) announced that an unauthorized party infiltrated its network and gained access to the personal information of 5 million adults and 6.5 million children through its...more

Ransomware is taking the world by storm; does insurance respond?

On June 27, 2017, the world had its second major ransomware attack in two months, and experts are predicting more to come. The first, named WannaCry, began May 12, and quickly spread to over 400,000 machines, the vast...more

How Connected Cars and Autonomous Vehicles Will Change and Shape the Future of How We Move

by Hogan Lovells on

In this hoganlovells.com interview, Hogan Lovells partner Lance Bultena talks about the impact connected cars and autonomous vehicles (AVs) will have on America’s infrastructure and environment; the services associated with...more

The Remedy for the New Cyber Threat Posing Major Coverage Problems: “Fake President” E-mails

by Nossaman LLP on

In the last few weeks, we have seen yet another widespread ransomware attack that hit nearly one hundred companies around the world. It reminded me of a recent request from a client, made just after news broke of the...more

Changing Cybersecurity Threats in the Context of the Internet of Things: Don’t Blink or You’ll Miss It

by Hogan Lovells on

In this hoganlovells.com interview, Washington, D.C.-based Hogan Lovells senior associate Paul Otto talks about security issues created by the exponential growth of the Internet of Things (IoT). ...more

Rules Are Made to Be ...Reformed: FTC Announces Regulatory Reform Measures

by Kelley Drye & Warren LLP on

As part of the FTC’s ongoing review of the needs, costs, and benefits of regulations, the agency recently announced it is reviewing the following rules: The Picture Tube Rule requires manufacturers to base screen size...more

Petya Global Ransomware Attack Shows Why Businesses Should Prepare for Loss or Unwanted Encryption of Key Data

by Lathrop Gage on

What is it? This new variation of Petya (“Little Peter” in Russian) is more robust ransomware than last month’s North Korean WannaCry ransomware. It has no kill switch, and it encrypts entire hard drives, not just individual...more

Second Circuit Says No to Unilateral Revocation of TCPA Consent to Contact, Citing Contract Principles

by Hinshaw & Culbertson LLP on

The Second Circuit Court of Appeals has split with the Third Circuit, the Eleventh Circuit, and the Federal Communications Commission (FCC), and utilized contract principles to hold that a consumer may not necessarily have...more

Online Trade Under Antitrust Scrutiny in EC's E-Commerce Sector Inquiry Final Report

by Jones Day on

On May 10, 2017, the European Commission published its long-awaited Final Report on the 2015 E-commerce Sector Inquiry ("Report"). The Report highlights the Commission's enforcement priorities in the online markets for...more

Could Your Website Be Collecting Information from Kids? Federal Trade Commission Issues 6-Step Plan for Complying with the...

by Balch & Bingham LLP on

This month, the Federal Trade Commission (FTC) issued guidance for businesses operating websites and online services looking to comply with the Children’s Online Privacy Protection Act (“COPPA”). COPPA addresses the...more

Federal Court in Florida Rules that a Grocery Store Must Make its Website Accessible

by Conn Maciel Carey LLP on

Our retail and hospitality clients often ask whether the Americans with Disabilities Act (“ADA”) requires their websites to be accessible for individuals with disabilities. Unfortunately, as we have previously explained,...more

AICPA Releases Cybersecurity Risk Management Reporting Fact Sheet for CPAs Without a Key Recommendation

The American Institute of CPAs (AICPA), has released a risk management reporting framework that is intended to “establish a common, underlying language for Cybersecurity risk management reporting—almost akin to US GAAP or...more

The EU’s New General Data Privacy Regulation (GDPR) – Global Companies New Compliance Test

by Michael Volkov on

Global companies face a daunting array of risks – anti-corruption, trade compliance, antitrust, and money laundering are just a few. The European Union, however, has escalated the data privacy issue right into the corporate...more

MarkIt to Market® | May 2017

The May 2017 issue of Sterne Kessler's MarkIt to Market® discusses social media influencers' disclosure of material connections, business transfer clauses, and lists the new gTLD Sunrise periods. Please see full Newsletter...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

When it comes to the big (tech) 5, investors are cheering on their massive gains even as they nervously look around the corner for the dreaded market correction....more

What's next for robo-advice? The SFC consults on the proposed guidelines on online distribution and advisory platforms

by Hogan Lovells on

With the rapid development of technology, there is an increasing trend of intermediaries providing investment services and distributing investment products over the internet. Whilst the Securities and Futures Commission...more

Court Applies Work Product Protection to Breach Investigation Reports

One of the most significant questions in data security law is whether reports created by forensic firms investigating data breaches at the direction of counsel are protected from discovery in civil class action lawsuits. ...more

Record-Setting Target Settlement Changes Expectations for Institutional Data Security

On May 24, 47 state attorneys general settled with Target for $18.5 million regarding its 2013 data breach. The implications of the agreement may be more far-reaching than many companies realize. The fact that nearly all...more

Privacy Tip #90 – Payment Card Breaches - Both Sides of the Story

We hear daily about another payment card breach at a retail store, restaurant chain or hotel line. The response to a payment card breach differs from company to company. I get a lot of questions about payment card breaches...more

Corporate E-Note - May 2017

by Burr & Forman on

Starting on Friday, May 12th, computers in countries around the world have fallen victim to the latest ransomware attack. As of May 15th, it is estimated that more than 150 countries have infected systems, totaling over...more

Best Practices for Using Third-Party Content on Your Company’s Website

Does your company’s website include or link to third-party content? If so, there are potential legal issues that may arise under copyright law and website terms of use that can be minimized or avoided by implementing some...more

SEC Urges Investment Firms to Better Prepare for Ransomware Attacks

by Nossaman LLP on

On May 17, 2017, the SEC’s Office of Compliance Inspection and Examination (“OCIE”) issued a risk alert urging broker-dealers, investment advisors and investment companies to safeguard themselves against ransomware in light...more

Rite Aid’s Online Store Breached

Rite Aid has admitted that its online eCommerce platform was accessed by unauthorized individual(s) from January 30, 2017, through April 11, 2017, and their customers’ names, addresses and payment card information, including...more

745 Results
|
View per page
Page: of 30
Cybersecurity

Follow General Business Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.