General Business Science, Computers & Technology

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

Five Social Media Law Issues To Discuss With Your Clients

The explosive growth of social media has clients facing legal questions that didn’t even exist a few short years ago. Helping your clients navigate this muddled legal landscape will have them clicking “like” in no...more

King Drug Co. of Florence, Inc. v. SmithKline Beecham Corp. (3rd Cir. 2015)

Ever since the Supreme Court's decision in FTC v. Actavis in 2013, courts (predominantly district courts) have grappled with the scope of the decision. It was evident that the presence of a large cash payment from the...more

New Case Highlights Deep Hole in Cyber Insurance Policies

Insurance policies covering data breach liability began appearing roughly ten years ago. We noted then a troublesome provision in some forms that seemed to exclude coverage for the insured’s failure to maintain data security...more

New York BitLicense Rules Have Far-Reaching Effects on Virtual Currency Businesses

The final rules’ significant operational requirements for licensees could prove to be expensive and substantial barriers to entry for small businesses interested in engaging in virtual currency business activities in New...more

Considerations in Drafting Limitations of Liability for Data Breaches

Until very recently, it was considered matter of course in a services agreement for any data disclosure or loss, regardless of cause, to be excluded from any and all limitations of the vendor’s liability. However, as data...more

Delaware Enacts Online Privacy Law – Website Operators Will Need to Comply

Online businesses take note. Delaware may finally have an online privacy law. On June 25, 2015, the Delaware General Assembly passed SS1 for SB68, known as the “Delaware Online Privacy and Protection Act.” If signed by the...more

Guiding Opinions to Promote Healthy and Rapid Development of Cross-Border E-Commerce

The Chinese e-commerce industry is rapidly expanding, and the nation is the world’s second largest online retail market. The business-to-consumer industry in particular is expected to see record growth in the next few years....more

OSHA Clarifies RAGAGEP Definition and Abandons Use of "Commercial Grade" in PSM Standard

On June 9, 2015, the U.S. Department of Labor’s Occupational Safety and Health Administration (“OSHA”) published two interpretations related to process safety management (“PSM”). In this publication, OSHA defined the term...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

Visa And MasterCard: Card Issuers May Disclose Breached Merchant Names

Credit union and other card issuers got clarification from Visa and MasterCard this month on when they are contractually permitted to disclose the identities of merchants involved in data breaches. In substantially similar...more

The EU’s S-L-O-W March Towards a Uniform Data Protection Regime

The European Union (EU), comprised of 28 member states, currently has a patchwork of privacy and data protection laws, based on the EU’s 1995 Data Protection Directive. This mix of laws has led to inconsistent data...more

Litigation Alert: Even Spider-Man Can't Defeat Ban on Post-Patent Expiration Royalties

Fifty years ago, in Brulotte v. Thys Co., the U.S. Supreme Court held that “a patentee’s use of a royalty agreement that projects beyond the expiration date of the patent is unlawful per se.” 379 U.S. 29, 32 (1964). On June...more

Proposed Change to Export Controls Would Allow Use of the Cloud for Encrypted Data

On June 3, 2015 the State Department’s Directorate of Defense Trade Controls (DDTC) and the Commerce Department’s Bureau of Industry and Security (BIS) published proposed regulations which would change the definition of the...more

Nevada and Wyoming Expand Breach Notification Laws to Protect Account Credentials

On July 1, 2015, both Nevada and Wyoming’s breach notification law amendments come into force, expanding the definition of Personal Information (“PI”) to include account credentials such as a username or email address. With...more

Canada’s New Privacy Laws Will Require Breach Notice and Affect Private Sector Operations in Canada

It has been a long time coming, but this week the Personal Information Protection and Electronic Documents Act (“PIPEDA”) received a make-over, including new data breach notification provisions, with the enactment of the...more

Expanded HSR Antitrust Reporting for Pharma Licensing Deals Is Here to Stay

On June 9, 2015, the U.S. Court of Appeals for the D.C. Circuit, in its ruling in Pharm. Research & Mfrs. of Am. v. FTC, upheld the FTC's expansion of HSR reporting requirements for pharmaceutical companies, and solidified...more

"The Fracturing of Global FRAND Patent Licensing"

Standard essential patent (SEP) owners have long licensed their patent portfolios, including both SEPs and non-SEPs, on a global basis. But recent divergence, including in China and other jurisdictions, regarding what royalty...more

Have You Agreed Not to Export Software? Yes!

Do you think of yourself as a potential software exporter? If you're reading this article, chances are you purchased software online from Amazon or Apple, and by doing so you agreed not to export software. As a condition of...more

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

RadioShack’s Consumer Data: A Highly Scrutinized Asset

Following the Texas Attorney General’s objection to the sale of RadioShack Corporation’s consumer data as an asset in its bankruptcy, 37 other state attorneys general and a large number of other consumer protection entities...more

IT Project Disputes Management - Managing the Cloudy Skies

In this issue: - Overview of Presentation - Prevention is better than cure - Fix problems in the design phase - Early diagnosis and treatment of problems - So what do you do? - Areas of major...more

Medicaid managed care proposed rule expands program integrity obligations

On June 1, 2015, the US Centers for Medicare & Medicaid Services (“CMS”) published its proposed rule on Medicaid managed care (CMS-2390-P). As noted in our two earlier advisories, which provided an overview of the proposed...more

Cyber Security - Risk Management and Mitigation

In This Issue: - Agenda - Current Threat Environment - Current Threat Environment - Strategic Importance - Asian Data Privacy Regimes At-A-Glance - Data Protection: Regional temp - Asia-Pacific...more

Digital Privacy Act Modernizes PIPEDA

On June 18, 2015, significant portions of the Digital Privacy Act received Royal Assent. This Act, amends the Personal Information Protection and Electronic Documents Act (PIPEDA), and brings important certainty to how...more

Expanded FTC Premerger Notification Rules Specific to the Pharmaceutical Industry are Upheld by the D.C. Circuit

The D.C. Circuit recently affirmed a lower court’s decision upholding regulations adopted by the Federal Trade Commission (FTC) requiring a Hart Scott Rodino (HSR) Act premerger notification filing for transfers of patent...more

3,865 Results
|
View per page
Page: of 155

Follow General Business Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×