News & Analysis as of

FDA Releases First Wholesaler and 3PL Facility Licensure Data to the Public

Last week FDA took another important step in implementing the complex and interlocking provisions of the Drug Supply Chain Security Act (DSCSA). We have previously discussed the new Federal drug traceability requirements and...more

Re-use of Public Sector Information Regulations 2015 finally in force

On 18 July 2015, the Re-use of Public Sector Information Regulations 2015 (SI 2015/1415) (‘the New Regulations’) came into force, replacing the 2005 Regulations of the same name (SI 2005/1515)....more

OIG Report Finds CMS’s MIDAS System Needs Improvement in Information Security Controls

On September 14, 2015, the OIG released a Public Summary Report finding that although CMS had implemented controls to secure the Multidimensional Insurance Data Analytics System (MIDAS) and consumer personally identifiable...more

District Court Rules That Smartphone Passcodes Are Testimonial; Protected by Fifth Amendment

In Securities and Exchange Commission v. Huang, the district court held that the Fifth Amendment protected two former employees against having to disclose their personal passcodes for company-issued smartphones to government...more

FERC Shares Best Practices for Stakeholder Outreach in Gas Project Permitting

The dramatic increase in domestic energy production over the past several years has resulted in the involvement of the Federal Energy Regulatory Commission (FERC) in a wide range of interactions with the public and other...more

California Federal Courts Reiterate: Unless Computer Hacked, Computer Fraud and Abuse Act Permits Misuse Of Electronic Information

In United States v. Nosal, 676 F.3d 854 (9th Cir. 2012) (en banc), the court held that the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, prohibits unlawful access to a computer but not unauthorized use of computerized...more

Fox News Network, LLC v. TVEyes, Inc. - USDC, S.D. New York, August 25, 2015

Fox News Network brought a copyright infringement suit against TVEyes Inc., a company that records virtually all radio and television broadcasts and transforms their content into a searchable database for its subscribers...more

Copyright Fair Use: 1 Win, 1 Maybe and Two Losses for TVEyes

On August 25, 2015, the Southern District of New York held that the archiving function of a media monitoring service was protected by fair use and that the e-mailing feature could qualify for fair use if certain protective...more

A Preview of the CFAA Arguments in United States v. Nosal, Part II: Could “Phishing” be a Factor?

Oral arguments for the next round in United States v. Nosal have been set for October 20, 2015 at the Ninth Circuit in San Francisco. So we figured it may be a good time to review both sides’ arguments related to the...more

OIG adds four new projects to work plan

Since our last blog post about the OIG’s work plan, the work plan has been updated as of August 7, 2015 to add four new projects. A newly added ongoing project is a “Security Control Review of the CFPB’s SQL Environment.” (An...more

Something Else to Complain About: CFPB to Share Monthly "Snapshot" of Consumer Complaints

Why it matters - Already unhappy with the Consumer Financial Protection Bureau's (CFPB) creation of a public database of complaints featuring consumer narratives, financial institutions now have even more to worry about:...more

Getting a Handle on In-House E-Discovery Data Management

Many legal professionals are starting to embrace the notion that e-discovery is a business process, which can be measured, managed and optimized. The greatest progress is being seen with “left-side” e-discovery activities,...more

"City of Chicago Expands Tax Reach to Internet Services"

On June 9, 2015, the city of Chicago released two rulings that significantly expand the city’s 9 percent gross receipt tax to charges for cloud computing and other services delivered over the Internet. The first ruling (City...more

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

Russia’s data localization requirement will take effect September 1

Russia’s much publicized changes to its data protection rules come into force as of September 1, 2015. These changes are broadly, and vaguely, written and apply to almost anyone handling the personal data of Russian...more

U.S. State Department Consular System Technical Issues Cause Visa Issuance Delays

Action Item: Employers who have foreign national workers with pending visa applications at U.S. consulates, or are travelling to apply for visas, will likely see delays in the workers’ return because of technical problems...more

Never Tick Off a Redbird

At a Press Conference today, Satan officially announced that Hell has frozen over. He made this stunning announcement after the New York Times (NYT) reported that the baseball team with the most World Series wins in the...more

Russia Bulletin - April 2015

Russia is in the midst of strategically overhauling its economy, seeking to modernize its business methods, “de-offshore” business interests and impose stricter constraints on foreign investors and multinationals operating...more

What Oklahoma's amended Uniform Controlled Dangerous Substances Act means for prescribing medical providers

Last Friday, Oklahoma Governor Fallin signed House Bill 1948 into law, amending the Uniform Controlled Dangerous Substances Act. The new law, which goes into effect on November 1, 2015, enhances access to Oklahoma’s...more

Data for the Taking: Using Website Terms and Conditions to Combat Web Scraping

Is it stealing to take data without permission from a public website, or is it simply making use of resources that are made available to you? “Web scraping” or “screen scraping” is the practice of extracting large amounts of...more

Governor’s Council recommending mandatory use of SCRIPTS program

Prescription drug abuse is epidemic across the nation, and South Carolina has not been immune. According to a 2013 report from the State’s Inspector General, South Carolina ranked 23rd per in per capita opioid painkiller...more

Blog: CMS Launches New Search Tool for Open Payments Database; Announces Disputed Payments Reporting Deadline

As we discussed here, the launch of the Centers for Medicare and Medicaid Services (CMS) Open Payments database on September 30, 2014 was met with a high level of criticism from industry, health care professionals, the media...more

Another Step in the Long March from Campbell v. Acuff-Rose toward Fair Use Free-for-All?

TVEyes is a media-monitoring subscription service that “records the entire content of television and radio broadcasts and creates a searchable database of that content.” This service allows subscribers to search keywords or...more

IP Rights In Data Handbook - Protecting and exploiting IP in data, big data and databases internationally

In the era of Big Data, no ambitious business can afford to live without a strategy for the acquisition, protection and exploitation of the data upon which it depends. The laws enabling data to be protected and exploited are...more

Microsoft Ordered to Hand Over Data to the U.S. Government

In April, Microsoft tried to quash a search warrant from law enforcement agents in the United States (U.S.) that asked the technology company to produce the contents of one of its customer’s emails stored on a server located...more

65 Results
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.