Science, Computers & Technology Communications & Media Business Organization

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Will Heartbleed Affect Data Breach Insurance Coverage?

Although it is a widespread exploit that has been undetected for two years, whether or not a CGL policy covers data breaches allowed by Heartbleed should turn, simply, on whether the policy covers data breach at all...more

The Heartbleed Lesson for All Companies? Manage the Risk...

Threats to data privacy are not going away, but establishing appropriate security measures up-front, performing regular stress-tests on a security system, putting in place procedures to address a data breach and implementing...more

First Glance: Legal Implications of the Heartbleed OpenSSL Bug?

The vulnerability caused by the Heartbleed bug circumvents the purpose of OpenSSL: encryption. Therefore, the conclusion would appear to be that any data breach during the time of OpenSSL vulnerability would be reportable...more

Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin [Video]

Attorney Jeff Moerdler, head of Mintz Levin's Real Estate and Communications practices in New York, talks about the factors businesses need to consider when selecting a data network facility. ...more

Employer Social Media Policies – Interview with Mitch Danzig, Member, Member, Mintz Levin [Video]

Mitch Danzig, Member of Mintz Levin's Employment, Labor & Benefits Practice, discusses the importance of having a social media policy that is structured in accordance with the recent NLRB rulings. ...more

Jason Maloni on Data Security [Video]

In this LEVICK Daily video interview, LEVICK Senior Vice President Jason Maloni discusses the key forensic and communications challenges that accompany instances of data loss and...more

Opt-in not an option: How to comply with the new anti-spam law

Canada’s new anti-spam law (the CASL) is expected to come into force later this year. This Act is designed to create a safer online environment for individuals and businesses in Canada. From a business perspective, it will...more

New anti-spam laws target a safer online world

It is expected that Canada's new Anti-Spam Legislation (CASL) will come into force later this year, and with it will come significant changes for how businesses and individuals may send people "commercial electronic messages"...more

Free e-Book of Legal Audit: Internet & Cyber Laws for Website | Checklist: Do’s & Don’ts while doing Web (Internet) Based Business

Introduction With the ever changing advent of Internet law, it is very crucial to ensure the legal compliance of a website and get it audited from an internet lawyer. Various components of a website, including, Terms and...more

Taking On The Internet For Your Client's Reputation

My cell phone rings at 6:30 on a Friday evening. It's the CEO of a client company and she is panicked. Hysterical. It turns out she was doing some "old-fashioned" investigating by performing Google searches on herself and the...more

Seed Financing Survey 2012 Internet/Digital Media and Software Industries

In early 2011 we published our first Seed Financing Survey (for 2010) in recognition of the growing importance of seed financing to entrepreneurs and the venture capital environment, especially in the internet/digital media...more

Levick Weekly - March 8, 2013: Corporate Humor; Context Is Key

In This Issue: - Corporate Humor Context is Key - Cyber Security - Technology’s Impact on Reputation - Blogs Worth Following - LEVICK In the News - Excerpt from Corporate Humor, Context is...more

High Anxiety: Five Basic Worries For Every Corporate Board

Life is full of anxieties. We all know that. Some suffer worse anxieties than others. As I often say, anxiety comes and goes. Anxiety cannot be measured but is something that everyone experiences on their own terms....more

Data Breach: Who's Gonna Get It?

The message–that’s what I’m talking about–who’s gonna get the message sent to them first? Data breaches, hacking, and privacy are one of the biggest news stories since 2011 and there is no sign that will be changing...more

SEC's New Position on Voting Buttons Necessitates Changes to Online and Telephone Proxy Solicitation

The SEC recently informed service providers in the proxy distribution industry of a new interpretive position regarding the use of voting buttons. According to the new SEC staff position, service providers must present...more

Lessons Learned in 2012

As one calendar year ends and the next begins, it is natural to look back to take an inventory of lessons learned and to look forward in an attempt to implement such lessons. The year 2012 certainly had its fair share of...more

Cyber-attacks Projected to Spike in 2013: Are Companies Prepared?

Cyber-attacks against U.S. companies have been skyrocketing in recent years, with 2011 seeing an increase of nearly 44 percent according to the National Security Agency. While many businesses have implemented and continue to...more

Who’s Liable For Vendor’s CAN-SPAM Violation?

The CAN-SPAM act sets legal rules for commercial E-Mail and includes various provisions that apply to “any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial...more

Social Media And The Boardroom

The Conference Board and the Stanford University’s Rock Center for Corporate Governance recently published its 2012 Social Media Survey, entitled “What Do Corporate Directors and Senior Managers Know about Social Media?” What...more

[Infographic] The Growing Impact of Social Media

Infographic: The Growing Impact of Social Media Social media sites are transforming not only the daily lives of consumers, but also how companies interact with consumers. As with the Internet boom during the mid-to-late...more

Technology is Not a Substitute for Critical Thinking

Technology is central to our daily lives. We rely on it. We embrace it. Many of us can’t live without it. Businesses employ new technology, often as early adopters, in an attempt to increase productivity, stay ahead of the...more

Apple Shareholders Request Information From Board on Privacy/Security Risk

This week, Apple shareholders requested that its Board of Directors publish a report explaining how the board oversees privacy and data security risks. The proposal was prompted by concern that recent issues such as the...more

Chinese Contracting Best Practices

There are many risks involved in dealing with Chinese companies. We previously discussed The Importance Of China Due Diligence And Corporate Seals. And we asked the probing question: Is The Era Of Cheap Goods From China...more

Getting the Deal Through – e-Commerce 2013

"Reproduced with permission from Law Business Research. This article was first published in Getting the Deal Through - e-Commerce 2013 (published in July 2012; contributing editor: Robert Bond of Speechly Bircham LLP)....more

Ifrah Law Partner Michelle Cohen: Don’t Consider Yourself Immune to Data Breaches

Michelle Cohen recently joined Ifrah Law as a partner. Here is an edited transcript of a recent interview with Ms. Cohen. Question: What are some of your legal experiences and strengths that you’d like to...more

49 Results
|
View per page
Page: of 2

Follow Science, Computers & Technology Updates on: