News & Analysis as of

Science, Computers & Technology General Business

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Court Holds Crime Policy Covers Business Compromise Email Loss

The “business compromise email” is what the FBI calls the “$5 billion scam,” but apparently an insurance company did not agree with an insured company that they had been the victim of a crime....more

An Ounce Of Data Breach Prevention…Address Attorney-Client Privilege In Your Breach Planning

by Jackson Lewis P.C. on

Data breach “horror” stories have become a new staple in today’s business environment. The frequency of attacks which threaten (or compromise) the security of business networks and information systems continually increases —...more

FBI Issues Warning about Internet-Connected Toys

We previously reported about the microphone and video capabilities of Echo technology. The FBI is also concerned about this technology being used in toys that are connected to the Internet....more

FTC Chronicle: “Lessons Learned” from the Agency’s Data Breach Investigations

The Federal Trade Commission (FTC) – often criticized for not providing clear guidance as to what the agency considers reasonable data security – announced on Friday that it would publish a weekly blog discussing “lessons...more

Protecting Communications From PR Privilege Issues

by Pepper Hamilton LLP on

Two recent cases in state appellate court show the risks of sharing privileged communications with public relations consultants. But they also provide practical guidance on how to protect the confidentiality of...more

House Panel Approves Sweeping Proposal On Autonomous Vehicles, Putting Innovation Above Regulation

by Buchalter on

On July 19, 2017, a U.S. House panel took a significant step to clear the way for autonomous vehicles by approving a proposal allowing automakers to deploy up to 100,000 self-driving vehicles without meeting existing safety...more

Channel Disruption & the Future of Food: Radical Change and New Consumer Channels

by Davis Wright Tremaine LLP on

With the recent announcement that Amazon is buying Whole Foods, issues of channel disruption — that is, the ways consumers purchase food — have been on the forefront of people’s minds. On June 1, at DWT’s annual food and...more

Is Your Website Accessible to Disabled Users? If Not, Courts Say You Could Be Violating the ADA

by Jaburg Wilk on

Yes, seriously. This is no longer a remote threat cautioned by overzealous lawyers. This is now a real threat that business owners should address now. If you own and/or operate a business, and the business has a website that...more

[Webinar] Post-Sales Restrictions After Impression Products v. Lexmark - August 2nd, 10:00am PT

The United States Supreme Court recently decided that a patent owner’s authorized sale of a patented item exhausts all patent rights to that item in Impression Products v. Lexmark International. Although this forecloses...more

Municipalities Under Connecticut's New Cybersecurity Strategy

by Murtha Cullina on

On July 10, 2017, Governor Dannel Malloy, along with Chief Information Officer Mark Raymond and Chief Cybersecurity Risk Officer Arthur House, released Connecticut’s initial Cybersecurity Strategy. The goal of the...more

US Supreme Court Says No to Post-Sale Restrictions Under Patent Law

by Latham & Watkins LLP on

The Court also holds that patent exhaustion applies to both foreign and domestic sales in a historic decision. Key Points: ..Patent rights are exhausted by sale even if the patentee purports to impose post-sale...more

Trademarks and Unfair Competition

by K&L Gates LLP on

It is my pleasure to present the second issue of our bulletin this year, which contains interesting and important information on trademarks, unfair competition and, in this issue, personal data. There have been big changes in...more

US FCC Allocates 5 GHz of Contiguous Spectrum for Next Generation Vehicular Radar

by Hogan Lovells on

On July 13, the United States (“US”) Federal Communications Commission (“FCC”) issued a decision allocating a contiguous 5 GHz band of radio frequency spectrum for vehicular radar operations. The decision implemented in the...more

Deeper Dive: Application of Work-Product Doctrine to Forensic Investigations

by BakerHostetler on

In a recent post, we addressed the role a forensic investigation plays in a company’s response to a data security incident. We noted that to maximize the likelihood that a forensic firm’s work will be covered by the...more

You Can Dance If You Want To

In borrowing a page from the '80s band "Men Without Hats," on June 12, 2017, the U.S. Supreme Court brought greater certainty for both biosimilar applicants and originator companies. In Sandoz Inc. v. Amgen Inc., the Supreme...more

What To Look For In Strong Computer Fraud & Social Engineering Insurance

by GB&A Insurance on

Cyber security has been the talk of the town for quite a while now. Organizations today flooded with statistics and mentions of the importance of proper security measures and cyber liability programs. Some companies...more

National Association of Corporate Directors Updates Cyber-Risk Oversight Handbook

by Hogan Lovells on

Earlier this year, the National Association of Corporate Directors (NACD) released an updated version of its Director’s Handbook on Cyber-Risk Oversight (Handbook). The updates add 16 pages of content to the previously...more

GDPR Update: Rights of the data subjects (Dutch)

by Dentons on

Monthly update AVGB: Rights of the parties involved: (erasure, limitation, objection and automated decision making) Introduction - Following our previous updates regarding the rights of those involved, we treat the...more

New General Data Protection Regulations in European Union Has Cybersecurity Consequences

by Bennett Jones LLP on

The European Union’s General Data Protection Regulation (GDPR) will come into force on May 25, 2018. This new regulation replaces the current data protection law (Directive 95/46/EC) substantially and will bring important...more

UK: The Biggest Shake Up of Employment Law in a Generation?

by Littler on

On July 11, 2017, the UK government published the Review of Modern Working Practices. The report was issued by Matthew Taylor, chief executive of the Royal Society of Arts and a former policy chief to Tony Blair. Current...more

Health Alert (Australia) 17 July 2017

by DLA Piper on

In This Issue: - Judgments; Legislation; and Reports. - Excerpts from Judgments: 26 June 2017 - Dr Praneal Dutt Sharma v Dr Phillip Segal and Dr Greg Chen [2017] NSWSC 867 - CONTRACT – commercial agreement...more

The Protection of Biometric Information

by Saul Ewing LLP on

As states develop new laws directed at the security of biometric identifiers, such as fingerprints and retina scans, institutions of higher education are likely to face a host of new compliance requirements and increased...more

Hurricane Cyber? Insurers Confront Unpredictable Data Breach Costs

by Fox Rothschild LLP on

Venerable insurer Lloyd’s of London says a global cyber attack on a major provider of cloud services could carry costs of up to $53 billion, reports Data Breach Today. That’s a hefty price tag that explains the rising...more

Defending Novel Theories In Data-Breach Litigation

by Ellis & Winters LLP on

The success of a data-breach lawsuit often turns on whether the plaintiff has standing to sue. Showing actual injury can be especially hard when the only alleged damage consists of a risk of future identity theft....more

NYDFS Updates FAQs to Clarify Cybersecurity Regulations

by Ballard Spahr LLP on

The New York Department of Financial Services (NYDFS) recently updated frequently asked questions (FAQs) about its cybersecurity regulations, 23 NYCRR 500, to address four new issues. NYDFS published its initial set of FAQs...more

6,313 Results
|
View per page
Page: of 253
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.