News & Analysis as of

General Business Science, Computers & Technology Communications & Media

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.

District Courts Buck Trend on Fidelity Coverage for Social Engineering and Business Email Compromise Schemes

by Carlton Fields on

The FBI continues to warn that losses are on the rise from business email compromise (BEC) or “social engineering” schemes, which the Bureau describes as: Carried out by transnational criminal organizations that employ...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

Somehow, despite months of high-profile sideshows, the business of Uber must go on, and right now that means a tough call for the board. It’s currently considering three investment offers, including one from SoftBank, to buy...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

The Labor Department has proposed (in a District of Minnesota court filing, at least) an 18-month delay in the retirement-adviser fiduciary duty rule compliance deadline. Experts suggest that a significantly revised rule is...more

Apple Removes VPN Apps from China App Store

by Fisher Phillips on

Apple’s removal of VPN apps from its app store in China could signal a difficult road ahead for companies doing business there. In March 2017, we posted a summary of China’s new cyber security law (Law) that went into effect...more

A “palliative” approach to insolvency in the retail world?

by Morrison & Foerster LLP on

The retail sector is in the midst of a deeply disruptive shift as online shopping increasingly puts its long-term future in peril. Howard Morris, head of the business restructuring and insolvency group at Morrison & Foerster...more

News from AGG's Retail Industry Team - Summer Edition

Title III of the Americans with Disabilities Act (ADA) provides “[n]o individual shall be discriminated against on the basis of disability in the full and equal enjoyment of the goods, services, facilities, privileges,...more

Forging ahead: US M&A H1 2017: Overview: Consumer consolidation drives top end deals

by White & Case LLP on

Following a host of mega-deals, and with the US$13.5 billion megadeal between technology giant Amazon and high-end grocery chain Whole Foods recently grabbing headlines, the consumer sector delivered its highest half-year...more

The Data Report Episode 10: Ideas Have Potential, Information Has Value

by Bilzin Sumberg on

Module Three: Small Businesses & Start-ups (Part I) This episode of The Data Report highlights strategies for protecting a small business's assets along every stage of its growth. Litigation attorney Jay Ward discusses the...more

Connected Cars: Internet of Things Webinar Update

by Hogan Lovells on

On July 26th, Hogan Lovells hosted another installment in its 2017 webinar series on emerging issues involving the Internet of Things (IoT). This webinar focused on potential legal issues with connected vehicles and smart...more

The FTC and Industry Propose Best Practices for IoT Security Updates

by Hogan Lovells on

How do you ensure that an Internet-connected sensor or device—often inexpensive and designed for lifespans of up to 20 years or more—can be secured against not only the intrusions of today but also those of the future? This...more

The Data Report Episode 00: Welcome to The Data Report

by Bilzin Sumberg on

Welcome to The Data Report, a weekly podcast series featuring legal and business development insights on data security, information management, and the law. While there is no shortage of voices discussing data security, very...more

FBI Issues Warning about Internet-Connected Toys

We previously reported about the microphone and video capabilities of Echo technology. The FBI is also concerned about this technology being used in toys that are connected to the Internet....more

Protecting Communications From PR Privilege Issues

by Pepper Hamilton LLP on

Two recent cases in state appellate court show the risks of sharing privileged communications with public relations consultants. But they also provide practical guidance on how to protect the confidentiality of...more

Municipalities Under Connecticut's New Cybersecurity Strategy

by Murtha Cullina on

On July 10, 2017, Governor Dannel Malloy, along with Chief Information Officer Mark Raymond and Chief Cybersecurity Risk Officer Arthur House, released Connecticut’s initial Cybersecurity Strategy. The goal of the...more

US FCC Allocates 5 GHz of Contiguous Spectrum for Next Generation Vehicular Radar

by Hogan Lovells on

On July 13, the United States (“US”) Federal Communications Commission (“FCC”) issued a decision allocating a contiguous 5 GHz band of radio frequency spectrum for vehicular radar operations. The decision implemented in the...more

VTech Escapes Class Action Case Over Breach of 11 Million Toy Users’ Information

In November 2015, VTech Electonics North America LLC (VTech) announced that an unauthorized party infiltrated its network and gained access to the personal information of 5 million adults and 6.5 million children through its...more

Ransomware is taking the world by storm; does insurance respond?

On June 27, 2017, the world had its second major ransomware attack in two months, and experts are predicting more to come. The first, named WannaCry, began May 12, and quickly spread to over 400,000 machines, the vast...more

How Connected Cars and Autonomous Vehicles Will Change and Shape the Future of How We Move

by Hogan Lovells on

In this hoganlovells.com interview, Hogan Lovells partner Lance Bultena talks about the impact connected cars and autonomous vehicles (AVs) will have on America’s infrastructure and environment; the services associated with...more

The Remedy for the New Cyber Threat Posing Major Coverage Problems: “Fake President” E-mails

by Nossaman LLP on

In the last few weeks, we have seen yet another widespread ransomware attack that hit nearly one hundred companies around the world. It reminded me of a recent request from a client, made just after news broke of the...more

Changing Cybersecurity Threats in the Context of the Internet of Things: Don’t Blink or You’ll Miss It

by Hogan Lovells on

In this hoganlovells.com interview, Washington, D.C.-based Hogan Lovells senior associate Paul Otto talks about security issues created by the exponential growth of the Internet of Things (IoT). ...more

Rules Are Made to Be ...Reformed: FTC Announces Regulatory Reform Measures

by Kelley Drye & Warren LLP on

As part of the FTC’s ongoing review of the needs, costs, and benefits of regulations, the agency recently announced it is reviewing the following rules: The Picture Tube Rule requires manufacturers to base screen size...more

Petya Global Ransomware Attack Shows Why Businesses Should Prepare for Loss or Unwanted Encryption of Key Data

by Lathrop Gage on

What is it? This new variation of Petya (“Little Peter” in Russian) is more robust ransomware than last month’s North Korean WannaCry ransomware. It has no kill switch, and it encrypts entire hard drives, not just individual...more

Second Circuit Says No to Unilateral Revocation of TCPA Consent to Contact, Citing Contract Principles

by Hinshaw & Culbertson LLP on

The Second Circuit Court of Appeals has split with the Third Circuit, the Eleventh Circuit, and the Federal Communications Commission (FCC), and utilized contract principles to hold that a consumer may not necessarily have...more

Online Trade Under Antitrust Scrutiny in EC's E-Commerce Sector Inquiry Final Report

by Jones Day on

On May 10, 2017, the European Commission published its long-awaited Final Report on the 2015 E-commerce Sector Inquiry ("Report"). The Report highlights the Commission's enforcement priorities in the online markets for...more

Could Your Website Be Collecting Information from Kids? Federal Trade Commission Issues 6-Step Plan for Complying with the...

by Balch & Bingham LLP on

This month, the Federal Trade Commission (FTC) issued guidance for businesses operating websites and online services looking to comply with the Children’s Online Privacy Protection Act (“COPPA”). COPPA addresses the...more

752 Results
|
View per page
Page: of 31
Cybersecurity

Follow General Business Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.