Privacy Business Torts

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

North Carolina Business Court Revisits When Customer-Related Information is a Trade Secret

The North Carolina Business Court recently revisited the question of when a business’s customer-related information can be considered trade secrets. In Southern Fastening Systems, Inc. v. Grabber Construction Products, Inc.,...more

That is SO last week - June 2015 #2

Over the past couple of weeks, payroll giant ADP and successful HR startup Zenefits got into what The Starr Conspiracy has called a “kerfuffle” over Zenefits’ use of ADP’s employer data and millions of employees’ personal...more

[Webinar] Cyber Threats and the Crown Jewels: Practical Steps to Protect Corporate Assets - June 24, 9 a.m. EDT

Information security is a growing concern for companies and legal teams around the world. The rising tide of cybersecurity issues and insider threats pose great risks to a company’s crown jewels: its intellectual property....more

Pennsylvania Court Refuses to Create a Duty of Care to Protect Confidential Personal Data

On May 28, 2015, Judge R. Stanton Wettick, Jr. refused to create a new cause of action sounding in negligence allowing a claim for damages resulting from improper disclosure of confidential personal and financial...more

Should We Hack Back?

“No,” says U.S. Assistant Attorney General Leslie R. Caldwell. At the most recent Cybersecurity Law Institute held at Georgetown University Law Center in late May, the head of the U.S. Department of Justice’s (DOJ) Criminal...more

Tinker, Tailor, Who’s the Spy? How to Safeguard Your Company From the Insider Hack

The headlines are full of data breach attacks — millions of credit card numbers stolen, healthcare information hacked — all of it feeding the thriving cyber-crime economy. More often than not, the bad actors lurk outside the...more

International Fraud & Asset Tracing (3rd Edition), Hong Kong

In this Guide: - Introduction - Managing the Internal Investigation - Disclosure from Third Parties - Steps to Preserve Assets/Documents - Civil Proceedings - Anti-Bribery/Anti-Corruption...more

Record penalty against payday lender

As previously reported, on 26 August 2014, the Federal Court determined that The Cash Store Pty Ltd (in liquidation), a payday lender, and Assistive Finance Australia Pty Ltd, a loan funder, committed seven separate breaches...more

Cybersecurity Risks Are Higher than Ever and Are Proving Costly

Cybersecurity is an increasing concern for companies. Last April, the UK Department for Business, Innovation & Skills (BIS) published the 2014 information security breaches survey: technical report. The report comprises the...more

Issuer Banks’ Claims in Target Data Breach Litigation Survive Motion to Dismiss

Federal District Judge Paul Magnuson has ruled that banks that issued credit and debit cards to customers whose data was stolen in the December 2013 Target data breach could continue to litigate claims against Target for...more

Increasing Risks of Fraud; Compliance Failures; A Willingness to be Unethical

Cyber security, corruption and unethical behavior pose significant risks for business enterprises, according to a new survey by EY titled “Overcoming Compliance Fatigue’. At the same time business organizations may be...more

Disappearing Act Fails – Maryland Attorney General and FTC “snap” back at Snapchat

Recently, the Maryland Attorney General’s Office announced that it reached a settlement with Snapchat, Inc. over alleged deceptive trade practices in violation of Maryland law and violations of federal laws that are intended...more

Fraudulent use of a service by hackers – a lesson for service providers

A recent case contains some salutary lessons for service providers concerning liability for fraudulent use of their services. It appears that unless the contract has clear terms to the contrary then the service provider, not...more

Shareholder Derivative Suit against Wyndham Worldwide Implicates D&O Coverage

A shareholder of Wyndham Worldwide Corp. (“Wyndham”) recently filed a derivative action against Wyndham’s board of directors arising out of three high profile data breaches occurring from 2008 to 2010. Dennis Palkon filed...more

Shareholder derivative action against Wyndham Worldwide directors for data breaches

Hot on the heels of our recently released publication, ‘Cyber risks and the impact on company directors’, it has been revealed that a shareholder has commenced a derivative action in the district of New Jersey (USA) against...more

Cyber Risks for the Boardroom Part 2: Why Corporate Directors Should be Concerned About Data Security Breaches

All this week, we are featuring a series “Cyber Risks – Director Liability and Potential Gaps in D&O Coverage” Part 2 of 5: Why Directors Should Be Concerned...more

An Overview of the 2014 Class Action Survey [Video]

To read the full 2014 Class Action Survey report, please visit ClassActionSurvey.com. Fifty-two percent of major companies are currently engaged in class action litigation. This percentage has remained fairly consistent...more

Are Confidential Witness Reforms Looming On The Horizon? Can The Plaintiff’s Bar Stop Them?

A decision is expected shortly in the highly publicized so-called confidential witness “scandal” involving the Robbins Geller Rudman & Dowd law firm. Judge Suzanne B. Conlon of the United States District Court, Northern...more

On the 11th Day of Privacy, class counsel served on me……

. . . a data breach class action. Hackers and plaintiffs’ lawyers could combine to make 2014 the year when class actions concerning theft of sensitive information proliferate. On this 11th Day of Privacy, we look...more

Board Oversight of Cyber Security and Cyber-Security Disclosures: Answers to Some of the Key Questions

Cyber security is top of mind for companies, and cyber-security oversight is top of mind for corporate directors. I recently co-moderated a panel discussion for directors on board oversight of cyber security and...more

Privacy Causes of Action

An outline of privacy law that cites to potential causes of action, whether common law or statutory, with a focus on New York law....more

Three Steps That Allow Companies to Use the Computer Fraud and Abuse Act for Misuse of Computers and Information – Even in the...

Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable...more

Taking Legal Control Of The Company Social Media Account

What happens when the employee who set up the company’s LinkedIn account leaves? ...more

Right Of Privacy Claim Survives Summary Judgment Based On Oral Disclosure in Workplace

In Ignat v. Yum! Brands (March 18, 2013) an employee claimed a violation of her right of privacy when her supervisor publicly disclosed to coworkers her bipolar condition. The trial court granted summary judgment to the...more

If my picture has been attributed to someone else’s bad conduct incorrectly, do I have a defamation claim/case?

If your picture has appeared in a publication and you are concerned about the message being incorrect or defamatory; or if there is some other possible defamatory publication recently made about you, you will want to read...more

103 Results
|
View per page
Page: of 5

Follow Privacy Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×