Cloud Computing

News & Analysis as of

Systema Software exposes information of 1.5 million on Amazon Web Service

Systema Software, which provides software solutions for claims management, is investigating a breach (although it was discovered, accessed and confirmed by an independent third party) involving information of 1.5 million...more

Clouding Up Trade Secret Protections

“The cloud” can refer to a lot of things, and is frequently a misunderstood concept. While cloud computing can encompass a number of Internet-based functions, in its simplest form, “the cloud” merely refers to the use of...more

TN Ethics Opinion Approves Lawyers’ Cloud Storage of Client Data

Tennessee has joined other states in formally approving lawyers’ cloud-storage of client-confidential data. The Board of Professional Responsibility (“BOPR”) held that lawyers ethically may use cloud storage for...more

Apple’s Liability for the Xcode Hack

I don’t think I’m going out on a limb by speculating that someone, somewhere is preparing a class-action suit based on the recently disclosed hack of Apple’s app ecosystem. How did it happen? In a nutshell, hackers were able...more

Forum Selection in Online Terms

Let’s say you’re a Canadian company doing business with a US supplier - which law should govern the contract? ‘Forum selection’ and ‘governing law’ refer to the practice of choosing the applicable law and venue for resolving...more

Don't Wait for It; Recent HIPAA Enforcement Action Signal More to Come in Phase 2 Audits

Officials at the U.S. Department of Health and Human Services Office of Civil Rights (HHS OCR) have recently selected a vendor to conduct the second wave of HIPAA audits. These so-called "Phase 2 Audits" are set to commence...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

Proposed Amendments Provide Data Security Standard Under ITAR and EAR

The Commerce and State Departments have issued long-awaited proposed regulations that provide data security standards for use in the transmission and storage of ITAR-controlled and EAR-controlled electronic data. If enacted...more

Interim rule requires Department of Defense contractors to report cyber breaches

Companies doing business with the U.S. Department of Defense are facing new requirements for reporting data security breaches and for acquiring cloud computing services. The Interim Rule, effective August 26, 2015, amends the...more

Strange Bedfellows: Technology Issues in Real Estate Transactions, Part 2

This blog is the second part of a two-part series on key contracting issues with technology service providers, and the focus is specifically geared toward companies doing business in the real estate industry. As noted in Part...more

Cloud Computing in Hong Kong

The Hong Kong Privacy Commissioner for Personal Data ("PCPD") recently published an information leaflet outlining the application of the Personal Data (Privacy) Ordinance (the "PDPO") for data users looking to engage cloud...more

eWorkplace Policies Restricting Employees’ Acceptable Use of Technology, Social Media & The Cloud

I. OVERVIEW – THE MODERN LANDSCAPE - A. Physical Conduct PLUS Digital Activity - Traditional concerns for employers have included: conduct leading to liability to third-parties; “frolic and detour” or other...more

St. Elizabeth’s Medical Center Pays $218,400 to Settle Alleged HIPAA Security Case Stemming from Use of Cloud-Based Document...

Alleged HIPAA Violations Resulted from Medical Center’s Failure to Risk Assess Internet-Based Document Sharing Application and Inadequate Breach Response. The US Department of Health and Human Services (HHS) Office for...more

DoD New Cyber Security Reporting Rules for Contractors

In a move that highlights the changing winds of federal cybersecurity policy, the Department of Defense (“DoD”) has issued an interim Rule (“Rule”) that imposes new security and reporting requirements on federal contractors,...more

DoD's New Cybersecurity and Cloud Standards and Reporting Requirements

The Department of Defense (DoD) released interim rules implementing provisions of the 2013 and 2015 National Defense Authorization Acts. The rules, released on Aug. 26, 2015, are effective immediately and establish the...more

The shifting sands of cybersecurity: DOD's interim rule further burdens contractors

The Department of Defense (DOD) earlier today issued an interim rule, effective immediately, that significantly increases existing cybersecurity requirements for DOD contractors. The requirements in the interim rule, have...more

DoD Addresses Cybersecurity Preparedness, Incident Reporting, and Cloud Computing Acquisitions with new DFARS interim rule

Announced and effective today, August 26, 2015, DoD has issued an interim rule that significantly expands existing DFARS provisions and clauses requiring contractors and subcontractors to report cyber incidents. The interim...more

New Guidance for Financial Institution Directors and Officers In Cybersecurity Preparedness

Earlier this summer, the Federal Financial Institutions Examination Council (FFIEC) released its highly anticipated Cybersecurity Assessment Tool (Assessment), which is designed to assist financial institutions in identifying...more

Delaware enacts a series of privacy laws

Delaware recently enacted four privacy laws–the Online and Personal Privacy Protection Act (DOPPA), the Student Data Privacy Protection Act (SDPPA) the Victim Online Privacy Act (VOPA) and the Employee/Applicant Protection...more

German Federal IT Committee Issues New Restrictions for Cloud Service Providers

Last month the German Federal Government IT Advisory Committee ("Federal IT Committee") issued new cloud computing service criteria for all prospective vendors to German Federal Agencies. Cloud services providers who offer,...more

The Windy City’s Taxes on Cloud Computing, Streaming Services

On August 7, the Chicago Department of Finance delayed the effective date of the imposition of the Personal Property Lease Transaction Tax (the Lease Tax) on cloud computing services from September 1, 2015, to January 1,...more

Social Media Week Part IV – Telling a Story About Honey

I continue my exploration of the use of social media in doing compliance by taking a look at a very innovative social media solution to a difficult compliance issue around, of all things, honey. This example shows how...more

Cybersecurity Update - July 2015

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

Taxing Cloud Computing: New York Gets It Half Right

The term “cloud computing” is broad enough to cover a vast array of transactions, all of which use the Internet in some fashion. Two of the most prevalent forms of cloud computing are “software as a service” (SaaS) and...more

Trade Secrets, Security, and Cloud Computing: Best Practices Now

As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more

196 Results
View per page
Page: of 8

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.