News & Analysis as of

Science, Computers & Technology General Business

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Technology and Life Sciences IPO Survey - 2017 First Half

by Fenwick & West LLP on

This report analyzes key aspects of initial public offerings (IPOs) for technology and life sciences companies that went public in the first half of 2017. Downloading the full report will provide you access to a number of...more

Colorado District Court Dismisses Data Breach Class Action Against Noodles & Company

by Ballard Spahr LLP on

The U.S. District Court for the District of Colorado recently dismissed a proposed class action lawsuit filed by financial institutions relating to a 2016 data breach that involved hundreds of Noodles & Company (Noodles)...more

NJ Seeks to Protect Consumer Data with Personal Information Privacy and Protection Act

by Saul Ewing LLP on

A recently enacted New Jersey law restricts retailers from collecting and using personal information gleaned from driver’s licenses and other identification cards. The law, which will take effect October 1, 2017, is meant to...more

Blockchain and Digital Token Update: SEC Releases Investigative Report and Investor Bulletin

by Perkins Coie on

On July 25, 2017, the Securities and Exchange Commission (“SEC”) released groundbreaking materials relating to blockchain tokens. These materials provide significant and welcome insight to the SEC’s and its staff’s thinking...more

Hotel Cybersecurity: Protecting your guests and your property from vendor data breaches

July was another notable month for hotel data breaches – on a single day, several well-known hotel brands and managers, including Four Seasons, Trump Hotels, Hard Rock Hotels & Casinos and Loews Hotels all announced that...more

Oregon Expands Deceptive Trade Practices Act to Include Misrepresentations About PI Usage

by BakerHostetler on

Effective January 1, 2018, Oregon will join Pennsylvania and Nebraska in expanding its definition of deceptive trade practices to explicitly include a material misstatement regarding the use of personal information. House...more

2017 Mid-Year Global Cartel Enforcement Report

by Morgan Lewis on

Fines significantly down, several enforcement firsts and a strong pipeline of new, mainly domestic cartel cases around the world....more

Avoiding Management Struggles When it Comes to Data Breaches: Part 1

by Bryan Cave on

The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more

SEC Declares That Initial Coin Offerings (ICOs) May Be Securities; Finds DAO a Security

The SEC has opined that, depending on the facts and circumstances of each individual ICO, the virtual coins or tokens that are offered or sold may be securities. If they are securities, the offer and sale of these virtual...more

SEC Finds Initial Coin Offerings Can be Securities

The SEC issued an investigative report cautioning market participants that offers and sales of digital assets by “virtual” organizations are subject to the requirements of the federal securities laws. Such offers and sales,...more

Eleventh Circuit to Weigh in on ‘Business Email Compromise’ Coverage Under Fidelity Bond

by Carlton Fields on

Banks have historically been at the forefront of technological advances in commerce. So it should be no surprise that they and other financial institutions were also among the first to suffer losses related to computer fraud...more

Delaware Passes Law Permitting Companies to Use Blockchain Technology to Issue and Track Shares

by Allen & Overy LLP on

On Friday July 21, 2017, Delaware's Governor John Carney signed into law amendments to Delaware's General Corporation Law to account for the use of blockchain technology in corporate record-keeping. The legislation will be...more

How To Protect Your Company From Cyber Regulatory-Enforcement: Part 2

by GB&A Insurance on

Experiencing a security breach is a bit like being on the titanic and feeling the tremble from hitting an iceberg. The impact sparks immediate panic - you know something very bad has just happened but are unsure whether the...more

At A Glance: De-Identification, Anonymization, and Pseudonymization under the GDPR

by Bryan Cave on

De-identification of data refers to the process used to prevent personal identifiers—both direct and indirect—from being connected with information. The EU General Data Protection Regulation (“GDPR”), which will replace the...more

Mandatory Arbitration of Securities Disclosure Disputes Is a Bad Idea—For Defendants

SEC Commissioner Michael Piwowar recently said that the SEC is open to allowing companies that are going public to provide for mandatory shareholder arbitration in their corporate charters. Piwowar’s remarks have prompted a...more

Five Workforce Management Challenges in Unprecedented Times - Take 5 Newsletter - July 2017

by Epstein Becker & Green on

Employers across all industries are deep in the midst of exciting but unchartered and fluid times. Rapid and unforeseen technological advancements are largely responsible for this dynamic. And while there is a natural...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

The Fed’s Open Markets Committee meets today, and despite relatively robust economic numbers of late, the lack of oped-for inflation (among other things) is likely to keep the Fed from moving on interest rates again at this...more

Court Holds Crime Policy Covers Business Compromise Email Loss

The “business compromise email” is what the FBI calls the “$5 billion scam,” but apparently an insurance company did not agree with an insured company that they had been the victim of a crime....more

An Ounce Of Data Breach Prevention…Address Attorney-Client Privilege In Your Breach Planning

by Jackson Lewis P.C. on

Data breach “horror” stories have become a new staple in today’s business environment. The frequency of attacks which threaten (or compromise) the security of business networks and information systems continually increases —...more

FBI Issues Warning about Internet-Connected Toys

We previously reported about the microphone and video capabilities of Echo technology. The FBI is also concerned about this technology being used in toys that are connected to the Internet....more

FTC Chronicle: “Lessons Learned” from the Agency’s Data Breach Investigations

The Federal Trade Commission (FTC) – often criticized for not providing clear guidance as to what the agency considers reasonable data security – announced on Friday that it would publish a weekly blog discussing “lessons...more

Protecting Communications From PR Privilege Issues

by Pepper Hamilton LLP on

Two recent cases in state appellate court show the risks of sharing privileged communications with public relations consultants. But they also provide practical guidance on how to protect the confidentiality of...more

House Panel Approves Sweeping Proposal On Autonomous Vehicles, Putting Innovation Above Regulation

by Buchalter on

On July 19, 2017, a U.S. House panel took a significant step to clear the way for autonomous vehicles by approving a proposal allowing automakers to deploy up to 100,000 self-driving vehicles without meeting existing safety...more

Channel Disruption & the Future of Food: Radical Change and New Consumer Channels

by Davis Wright Tremaine LLP on

With the recent announcement that Amazon is buying Whole Foods, issues of channel disruption — that is, the ways consumers purchase food — have been on the forefront of people’s minds. On June 1, at DWT’s annual food and...more

Is Your Website Accessible to Disabled Users? If Not, Courts Say You Could Be Violating the ADA

by Jaburg Wilk on

Yes, seriously. This is no longer a remote threat cautioned by overzealous lawyers. This is now a real threat that business owners should address now. If you own and/or operate a business, and the business has a website that...more

6,326 Results
|
View per page
Page: of 254
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.