News & Analysis as of

General Business Science, Computers & Technology

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.

At A Glance: De-Identification, Anonymization, and Pseudonymization under the GDPR

by Bryan Cave on

De-identification of data refers to the process used to prevent personal identifiers—both direct and indirect—from being connected with information. The EU General Data Protection Regulation (“GDPR”), which will replace the...more

Mandatory Arbitration of Securities Disclosure Disputes Is a Bad Idea—For Defendants

SEC Commissioner Michael Piwowar recently said that the SEC is open to allowing companies that are going public to provide for mandatory shareholder arbitration in their corporate charters. Piwowar’s remarks have prompted a...more

Five Workforce Management Challenges in Unprecedented Times - Take 5 Newsletter - July 2017

by Epstein Becker & Green on

Employers across all industries are deep in the midst of exciting but unchartered and fluid times. Rapid and unforeseen technological advancements are largely responsible for this dynamic. And while there is a natural...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

The Fed’s Open Markets Committee meets today, and despite relatively robust economic numbers of late, the lack of oped-for inflation (among other things) is likely to keep the Fed from moving on interest rates again at this...more

Court Holds Crime Policy Covers Business Compromise Email Loss

The “business compromise email” is what the FBI calls the “$5 billion scam,” but apparently an insurance company did not agree with an insured company that they had been the victim of a crime....more

An Ounce Of Data Breach Prevention…Address Attorney-Client Privilege In Your Breach Planning

by Jackson Lewis P.C. on

Data breach “horror” stories have become a new staple in today’s business environment. The frequency of attacks which threaten (or compromise) the security of business networks and information systems continually increases —...more

FBI Issues Warning about Internet-Connected Toys

We previously reported about the microphone and video capabilities of Echo technology. The FBI is also concerned about this technology being used in toys that are connected to the Internet....more

FTC Chronicle: “Lessons Learned” from the Agency’s Data Breach Investigations

The Federal Trade Commission (FTC) – often criticized for not providing clear guidance as to what the agency considers reasonable data security – announced on Friday that it would publish a weekly blog discussing “lessons...more

Protecting Communications From PR Privilege Issues

by Pepper Hamilton LLP on

Two recent cases in state appellate court show the risks of sharing privileged communications with public relations consultants. But they also provide practical guidance on how to protect the confidentiality of...more

House Panel Approves Sweeping Proposal On Autonomous Vehicles, Putting Innovation Above Regulation

by Buchalter on

On July 19, 2017, a U.S. House panel took a significant step to clear the way for autonomous vehicles by approving a proposal allowing automakers to deploy up to 100,000 self-driving vehicles without meeting existing safety...more

Channel Disruption & the Future of Food: Radical Change and New Consumer Channels

by Davis Wright Tremaine LLP on

With the recent announcement that Amazon is buying Whole Foods, issues of channel disruption — that is, the ways consumers purchase food — have been on the forefront of people’s minds. On June 1, at DWT’s annual food and...more

Is Your Website Accessible to Disabled Users? If Not, Courts Say You Could Be Violating the ADA

by Jaburg Wilk on

Yes, seriously. This is no longer a remote threat cautioned by overzealous lawyers. This is now a real threat that business owners should address now. If you own and/or operate a business, and the business has a website that...more

[Webinar] Post-Sales Restrictions After Impression Products v. Lexmark - August 2nd, 10:00am PT

The United States Supreme Court recently decided that a patent owner’s authorized sale of a patented item exhausts all patent rights to that item in Impression Products v. Lexmark International. Although this forecloses...more

Municipalities Under Connecticut's New Cybersecurity Strategy

by Murtha Cullina on

On July 10, 2017, Governor Dannel Malloy, along with Chief Information Officer Mark Raymond and Chief Cybersecurity Risk Officer Arthur House, released Connecticut’s initial Cybersecurity Strategy. The goal of the...more

US Supreme Court Says No to Post-Sale Restrictions Under Patent Law

by Latham & Watkins LLP on

The Court also holds that patent exhaustion applies to both foreign and domestic sales in a historic decision. Key Points: ..Patent rights are exhausted by sale even if the patentee purports to impose post-sale...more

Trademarks and Unfair Competition

by K&L Gates LLP on

It is my pleasure to present the second issue of our bulletin this year, which contains interesting and important information on trademarks, unfair competition and, in this issue, personal data. There have been big changes in...more

US FCC Allocates 5 GHz of Contiguous Spectrum for Next Generation Vehicular Radar

by Hogan Lovells on

On July 13, the United States (“US”) Federal Communications Commission (“FCC”) issued a decision allocating a contiguous 5 GHz band of radio frequency spectrum for vehicular radar operations. The decision implemented in the...more

Deeper Dive: Application of Work-Product Doctrine to Forensic Investigations

by BakerHostetler on

In a recent post, we addressed the role a forensic investigation plays in a company’s response to a data security incident. We noted that to maximize the likelihood that a forensic firm’s work will be covered by the...more

You Can Dance If You Want To

In borrowing a page from the '80s band "Men Without Hats," on June 12, 2017, the U.S. Supreme Court brought greater certainty for both biosimilar applicants and originator companies. In Sandoz Inc. v. Amgen Inc., the Supreme...more

What To Look For In Strong Computer Fraud & Social Engineering Insurance

by GB&A Insurance on

Cyber security has been the talk of the town for quite a while now. Organizations today flooded with statistics and mentions of the importance of proper security measures and cyber liability programs. Some companies...more

National Association of Corporate Directors Updates Cyber-Risk Oversight Handbook

by Hogan Lovells on

Earlier this year, the National Association of Corporate Directors (NACD) released an updated version of its Director’s Handbook on Cyber-Risk Oversight (Handbook). The updates add 16 pages of content to the previously...more

GDPR Update: Rights of the data subjects (Dutch)

by Dentons on

Monthly update AVGB: Rights of the parties involved: (erasure, limitation, objection and automated decision making) Introduction - Following our previous updates regarding the rights of those involved, we treat the...more

New General Data Protection Regulations in European Union Has Cybersecurity Consequences

by Bennett Jones LLP on

The European Union’s General Data Protection Regulation (GDPR) will come into force on May 25, 2018. This new regulation replaces the current data protection law (Directive 95/46/EC) substantially and will bring important...more

UK: The Biggest Shake Up of Employment Law in a Generation?

by Littler on

On July 11, 2017, the UK government published the Review of Modern Working Practices. The report was issued by Matthew Taylor, chief executive of the Royal Society of Arts and a former policy chief to Tony Blair. Current...more

Health Alert (Australia) 17 July 2017

by DLA Piper on

In This Issue: - Judgments; Legislation; and Reports. - Excerpts from Judgments: 26 June 2017 - Dr Praneal Dutt Sharma v Dr Phillip Segal and Dr Greg Chen [2017] NSWSC 867 - CONTRACT – commercial agreement...more

6,317 Results
|
View per page
Page: of 253
Cybersecurity

Follow General Business Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.