Qatar Laws and Headlines:
- Hamad International Airport: Opened in April 2014 to accommodate 30 million passengers initially. The 60,000-sq.m. facility is expected to handle 8,700 passengers per hour.
The Article 29 Data Protection Working Party (Working Party) sent a letter to the Council of Europe discussing its first assessment of several cybercrime scenarios presented at the 2014 Cybercrime@Octopus conference...more
FBI Director Comey delivered a keynote speech at the annual International Conference on Cyber Security this past Wednesday at Fordham University. In his speech, Director Comey discussed a number of organizational changes over...more
Cybersecurity breaches made headlines in 2014, but how troubling is it? Very, according to findings recently published by PricewaterhouseCoopers LLP (PwC).
According to PwC’s research, global cybersecurity incidents...more
Symantec Corporation, the data security software provider, filed a motion to quash the plaintiffs’ third-party subpoena in the consolidated class action over Target Corporation’s massive customer data breach in late 2013. ...more
On December 4, Assistant AG Leslie Caldwell delivered remarks at the Cybercrime 2020 Symposium regarding the DOJ’s recent efforts to fight cybercrime. Specifically, Caldwell noted the DOJ’s Criminal Division is (i) increasing...more
IN THIS ISSUE:
BSA/AML & OFAC | Virtual Currency & Payment Systems | FCPA & Anti-Corruption | Criminal Enforcement.
Here is an unnerving warning from FireEye, a cybersecurity firm, discussed in this article from MarketWatch, regarding a sophisticated, native-English-speaking group, designated FIN4, that has targeted almost 100 public...more
Increased cybercrimes and data security threats have recently made headline news with reports of massive data security breaches at major U.S. companies, including Target and more recently, The Home Depot. Risks of data...more
On November 3, a large financial services company announced the rollout of its Token Service (Service) for online, mobile app, and in-store mobile purchases. The Service is designed to increase security and reduce...more
The Internet of Things is expected to lead to 50 billion connected devices by 2020 collecting and exchanging personal data about their users, their lives, their preferences and tastes. This will lead not only to relevant data...more
The federal government must publish new procedures 90 days after the 2014 Intelligence Authorization Act is signed. These procedures will become effective upon publication.
Intelligence community contractors will be...more
In this article, I delve into the views and opinions of a chief technology officer of a telecommunications company to understand important steps a company can take to combat hackers and cyber-criminals....more
As April comes to a close, it’s time once again for Verizon Enterprise Solutions’ Data Breach Investigations Report to remind us just how important data security is to the corporate world.
Released Wednesday, the report,...more
Today, most of the scams reported in the news that are targeted against businesses seem to have gone high tech and usually involve illegal hacking into a company’s computer network. However, some fraud still occurs the old...more
Recently, several large retailers, including Target and Neiman Marcus, announced that hackers had compromised credit card and other personal consumer data. At Target, 40 million debt and credit cards were impacted and the...more
In light of recent, well-publicized, data security breaches at major retailers and social media company Snapchat, legislators are renewing the call for new federal laws that would strengthen data security and notification...more
This week, the U.S. Court of Appeals for the Ninth Circuit ruled that there is no cause of action for contributory cybersquatting under the Anticybersquatting Consumer Protection Act ("ACPA"), 15 U.S.C. § 1125(d). See...more
Justin Cornish is counsel in the Latham & Watkins Outsourcing and Technology Transactions Practice. He is a frequent speaker on the topic of data protection and privacy laws. With IT spending in the Middle East projected to...more
We are delighted to present you the second edition of Spotlight on Belgium, DLA Piper Belgium’s quarterly newsletter which aims to inform you about current legal developments that could affect your business.
On Tuesday, May 28, 2013, the Department of Justice (DOJ) announced the unsealing of an indictment against Liberty Reserve, S.A. (Liberty Reserve) in the Southern District of New York for operating a $6 billion money...more
With the occurrence of near daily threats against the nation’s critical infrastructure (CI), cybersecurity continues to be a constant concern of owners and operators of CI, Congress and the Obama Administration. Responses to...more
From a Maine nonprofit group's leak of confidential data in February, to the May 9 discovery that a worldwide gang of criminals stole $45 million by hacking into a database of prepaid debit cards, information security...more
Assuring cybersecurity has become a necessity for businesses across all industries. Cybercrime — with over $1 trillion in annual profits — is now the most lucrative illegal global business. Any business with computers and...more
Bitcoin – it sounds like a token you might use to play skeeball at a beachside arcade. It is actually a relatively new, virtual online “currency” being used for payments across the Internet. While some observers have noted...more
Back to Top