Top Three Cybersecurity Misconceptions
Technology in Healthcare
The Intersection of Cyber and D&O Coverage
Compiling Successful IP Solutions for Software Developers
Regan Miller, RPLU on Cyber Risk
BakerHostetler's Tanya Forsheit Discusses Cloud Computing
Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Until very recently, it was considered matter of course in a services agreement for any data disclosure or loss, regardless of cause, to be excluded from any and all limitations of the vendor’s liability. However, as data...more
Online businesses take note. Delaware may finally have an online privacy law. On June 25, 2015, the Delaware General Assembly passed SS1 for SB68, known as the “Delaware Online Privacy and Protection Act.” If signed by the...more
In this Presentation:
- Chocolate, Cookies, Coffee and Biscuits
- Privacy, Legislation, Underworld behaviour
- Even manufacturers have secrets to protect!
- Invention, 1%’ers and...more
Credit union and other card issuers got clarification from Visa and MasterCard this month on when they are contractually permitted to disclose the identities of merchants involved in data breaches. In substantially similar...more
The European Union (EU), comprised of 28 member states, currently has a patchwork of privacy and data protection laws, based on the EU’s 1995 Data Protection Directive. This mix of laws has led to inconsistent data...more
On July 1, 2015, both Nevada and Wyoming’s breach notification law amendments come into force, expanding the definition of Personal Information (“PI”) to include account credentials such as a username or email address. With...more
It has been a long time coming, but this week the Personal Information Protection and Electronic Documents Act (“PIPEDA”) received a make-over, including new data breach notification provisions, with the enactment of the...more
As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more
Following the Texas Attorney General’s objection to the sale of RadioShack Corporation’s consumer data as an asset in its bankruptcy, 37 other state attorneys general and a large number of other consumer protection entities...more
In This Issue:
- Current Threat Environment
- Current Threat Environment - Strategic Importance
- Asian Data Privacy Regimes At-A-Glance
- Data Protection: Regional temp
On June 18, 2015, significant portions of the Digital Privacy Act received Royal Assent. This Act, amends the Personal Information Protection and Electronic Documents Act (PIPEDA), and brings important certainty to how...more
It’s a familiar pattern. First, new risks inspire legislation and regulations that impose new penalties. Next, insurers and policyholders fight over whether the new liabilities are covered under traditional liability...more
As more and more companies of all sizes ranging across a wide spectrum of industries have been exposed to network and data security breaches in recent years, the market for insurance products dedicated to cover cyber risks...more
After lengthy debates, Bill S-4, the Digital Privacy Act? finally received royal assent on June 18, 2015, and is now law. The federal government introduced Bill S-4 on April 8, 2014, which marked the government’s third...more
To state the obvious (and this shows my age), we are way past George Orwell’s 1984. Yes, I know 30 years past it. But we are way past the privacy concerns expressed in Orwell’s book; we are in a new era where technology and...more
On 15 June 2015 the EU Council of Ministers (Council) reached a General Approach to the long-awaited draft Data Protection Regulation (DPR), bringing Europe one step closer to a single, harmonised set of data protection rules...more
EU Justice and Home Affairs ministers this week reached a general approach on the General Data Protection Regulation at their Council meeting.
This means that, more than three years after the Commission’s initial...more
In This Issue:
- SEC Proposes Changes to Reporting and Disclosure Obligations for Investment Companies and Advisers
- SEC Charges Hedge Fund Executives and External Auditor for Improper Disclosure of Expense...more
Almost all U.S states have laws about data security and what to do when there’s a data breach. California’s was the landmark law, first taking effect in 2003. Here is what California requires.
Who The Laws Apply To....more
On Feb. 3, the Securities and Exchange Commission (SEC) and the Financial Industry Regulatory Authority (FINRA) each released reports regarding cybersecurity issues for brokerage and advisory firms, both of which should be...more
At a Press Conference today, Satan officially announced that Hell has frozen over. He made this stunning announcement after the New York Times (NYT) reported that the baseball team with the most World Series wins in the...more
The United States editorial team is delighted to bring you the sixteenth edition of Law à la Mode, the quarterly legal magazine produced by DLA Piper's Fashion, Retail and Design Group.
In April 2014, we published an...more
In a world where the development of technology moves quickly and governments tend to move slowly, it is common for public policy to become out of sync with the realities of the market. In many cases, this proves to be a...more
Wondering about outsourcing your data to the U.S.? What follows is an update to one of our most popular posts: Outsourcing by Canadian Companies: Another Look at the USA PATRIOT Act, originally written in January 2013....more
For nearly a decade, the Connecticut Attorney General (“AG”) has requested or encouraged companies to provide at least two years of free credit monitoring to Connecticut residents following breaches involving information...more
Find a Science, Computers & Technology Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top