General Business Privacy Antitrust & Trade Regulation

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

First IoT Legal and Business Framework Webinar: Summary of Conclusions!

Thank you all for attending our webinar on the “Internet of Things Legal and Business Framework”. For those who could not attend, the main conclusions are summarized below...more

Dawn raids under scrutiny again by European Human Rights Court

ECtHR rules that French dawn raids in Vinci/GTM case breached fundamental rights - The European Court of Human Rights (the “ECtHR”) has ruled in the Vinci case that the circumstances surrounding the electronic removal of...more

Two Regulatory Crises

It strikes me that two civil regulators are facing dire attacks on aspects of their enforcement programs – both in different U.S. Courts of Appeals – at the same time. Both of these attacks arise out of generalized statutes...more

FTC Scrutinizes Two Companies For Falsely Reporting Compliance With E.U. Safe Harbor In Privacy Policies

On April 7, 2015, the Federal Trade Commission (“FTC”) announced that two companies have agreed to settle claims that the companies failed to update their privacy policies to reflect lapsed compliance with the U.S.-E.U. and...more

FTC Advises That Mergers Don’t Eliminate Privacy Promises of Acquired Companies

The FTC recently posted comments on its business blog about the responsibility of companies to comply with privacy representations made to prior customers on how the companies will collect, use or disclose personal...more

Net Neutrality: Fatal Regulation or Neutral Impact?

On February 26, 2015, the Federal Communications Commission (FCC) voted to adopt its Open Internet Order (Order). The Order reclassifies both wired and mobile “broadband Internet access service” as a “telecommunications...more

SIFMA Gets Its Cybersecurity-Antitrust Wish

I’m sure you remember SIFMA’s Principles for Effective Cybersecurity Regulatory Guidance, issued last October. I mean, you read about them right here. One of the principles was this: Principle 9: Information Sharing...more

Further encouragement for private enforcement of competition law: European Courts allow greater information about cartel conduct...

The details regarding cartel conduct contained in the decisions of the European Commission and national competition authorities are highly relevant to the follow-on cartel damages litigation that are now so common in Europe....more

Is Your Refrigerator Spying on You?

Door locks, cameras, fitness bracelets, home security, thermostats, refrigerators, utility meters, light bulbs, and cars. The list of the things and devices that can collect information about you and send it into the big...more

Energy & Commerce Subcommittee Holds Hearing on Data Security and Breach Notification; FTC Releases “Internet of Things” Report

Tuesday, the House Energy & Commerce Subcommittee on Commerce, Manufacturing, and Trade held its first hearing of the 114th Congress, entitled “What Are the Elements of Sound Data Breach Legislation?”...more

Navigating the Cyber Liability Storm - Part II

Franchisors are facing a precarious three-way intersection of increased accountability and regulation over consumer privacy, the growing volume and sophistication of cyber-attacks on consumer data, and the expanding...more

Navigating the Cyber Liability Storm Part I

Franchisors are facing a precarious three-way intersection of increased accountability and regulation over consumer privacy, the growing volume and sophistication of cyber-attacks on consumer data, and the expanding...more

Privacy Policies for Mobile Apps: One Size Does Not Fit All

Online privacy is a growing concern for us all. As a mobile app owner or developer, you must include a privacy policy in your app that details the information you collect from users and the manner in which that information is...more

Federal District Court Judge Orders Compulsory Mediation In FTC v. Wyndham Worldwide Corp.

In 2012, the FTC sued Wyndham and three of its subsidiaries after hackers broke into Wyndham’s corporate computer system as well as systems at several of its individual hotels from 2008 to early 2010, resulting in exposure of...more

Cybersecurity Lessons Learned From the FTC’s Enforcement History

In 2014, cybersecurity and data breach incidents regularly made the headlines, with the reported breaches becoming increasingly large and complex. As in the past, these data breaches have inevitably been followed by a flurry...more

Advertising Law - December 2014 #3

FCC Proposes Online Disclosures for Broadcast Contests - The Federal Communications Commission has proposed a rule change that would allow broadcast stations to disclose on the Internet the material terms for contests...more

Certifying privacy compliance: Is TRUSTe sufficiently trusty?

People concerned about privacy often ask, “Who can you trust?” And thus it’s worrisome when even a trusted intermediary — indeed, a privacy certification provider named for trust, TRUSTe — turns out to have a trustworthiness...more

Bankruptcy Sales of Personally Identifiable Information: Does it Satisfy the Privacy Policy?

Companies that are looking to sell, transfer or buy personally identifiable information (“PII”) via bankruptcy asset sales would be wise to confirm that such a transfer is consistent with the debtor’s privacy policy. If it...more

Corrective Action Earns Verizon End to FTC’s FiOS Router Investigation

Corrective action taken by Verizon Communications to fix security issues with its FiOS and DSL routers resulted in the FTC closing its investigation to determine whether Verizon’s distribution of the routers was an unfair or...more

DOJ Issues First Business Review Letter Following Agencies’ Joint Policy Statements on Cybersecurity

On October 2, 2014, the U.S. Department of Justice (DOJ) issued its first business review letter since issuing jointly with the Federal Trade Commission (FTC) the Agencies’ Antitrust Policy Statement on Sharing of...more

Civil Antitrust Attorneys Receive Wire-Tap Evidence

The Canada Supreme Court ruled earlier this month that civil antitrust plaintiffs may receive wire-tap evidence obtained in the criminal investigation into an alleged price-fixing scheme by several large gas companies. During...more

DOJ Will Not Challenge Cyber Security Data Sharing Platform

On October 2, 2014, the U.S. Department of Justice announced that a cyber intelligence data-sharing platform known as TruSTAR, developed by CyberPoint International, LLC, passed antitrust muster. The TruSTAR platform allows...more

Guide To Doing Business in Australia: Competition and Consumer Protection

COMPETITION AND CONSUMER PROTECTION - Australia has extensive competition and consumer laws dealing with, among other things, the promotion of competition and consumer protection. This section provides an introduction...more

COPPA Update: Ask and Ye Shall Receive…Actual Knowledge

Online services that ask for the age of users as part of the registration process will be deemed to have “actual knowledge” of that information. Whether or not one’s site is directed to children, a registration process that...more

Reasonable Doubt: Data Privacy, Cybersecurity, and the FTC

Today’s cybersecurity environment demands that every business establish effective corporate data privacy and consumer information security systems and practices. But, unfortunately, no single cybersecurity law exits to...more

212 Results
|
View per page
Page: of 9

Follow General Business Updates on:

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×