News & Analysis as of

Computer Servers

Warner Norcross + Judd

Managing the Impact of the CrowdStrike Outage

Warner Norcross + Judd on

The business world woke up Friday to yet another emergency. A CrowdStrike outage has caused computer shutdowns across the globe affecting businesses in every sector. More likely than not, your business is being affected by...more

Weintraub Tobin

No CTRL-ALT-DEL in the 9th Circuit for the Server Test

Weintraub Tobin on

It has been referred to as one of the top copyright cases to watch this year. This case, Alexis Hunley, et al v. Instagram, LLC, questioned the scope and validity of the Server Test, a copyright doctrine that was established...more

Davies Ward Phillips & Vineberg LLP

Ownership of Privileged Communications in M&A Transactions: Practical Takeaways and Recent Case Law

Traduction en cours. Can the buyer in a M&A transaction who takes possession of the seller’s or target company’s privileged communications on closing use those communications in a post-closing dispute against the seller?...more

Ankura

Advisory Note - ESXiArgs ransomware attack targets VMware ESXi servers

Ankura on

Are you using VMware ESXi servers? Why should you worry? Unpatched VMware ESXi servers are actively being attacked against a two-year-old remote code execution vulnerability to deploy a new ESXiArgs ransomware. ...more

Bennett Jones LLP

Regulatory Obligations Concerning the Disposal of Outdated Hard Drives and Servers

Bennett Jones LLP on

The disposal of hardware in the wrong manner can leave an organization offside its regulatory obligations under privacy legislation. Depending on the residence of the individuals or entities whose personal data is stored by...more

Ankura

Everything You Need To Know About India’s New Guidelines Related to Cyber Incident Reporting by CERT-In

Ankura on

On April 28, 2022, the Indian Computer Emergency Response Team (CERT-In), a functional organization under the Ministry of Electronics and Information Technology (MeitY), Government of India issued directions under sub-section...more

Foley & Lardner LLP

Digital Transformation: The Cloud Is More Than a Location

Foley & Lardner LLP on

What is the cloud? There are many differing (but also similar) answers to that question. Some consider the cloud a gateway to providing online access, while others consider it the relatively narrow provisioning of remote...more

Mintz - Intellectual Property Viewpoints

Custom Servers Pin Netflix In the Eastern District of Texas

Patent owners searching for an appropriate venue for cases against alleged infringers may be able to point to the activity of an infringer’s agents, based on a new decision from the Eastern District of Texas. In recommending...more

Robinson+Cole Data Privacy + Security Insider

NSA Issues New Warning About Four Critical Patches to Microsoft Exchange Servers

The National Security Agency (NSA) recently issued a warning to private industry about four zero-day vulnerabilities in Microsoft Exchange Server versions 2013, 2016, and 2019 used on-premises....more

McDermott Will & Emery

Presence of Servers Alone Does Not Establish Venue

McDermott Will & Emery on

The US Court of Appeals for the Federal Circuit has now held that a “place of business” for purposes of the patent venue statute requires an employee or agent of the defendant to be conducting business at that place. In light...more

Robinson+Cole Data Privacy + Security Insider

Iranian Cyber-Attacks and the End of Support for Windows 7 and Windows Server 2008

After the killing of Qassem Soleimani on January 3, 2020, by the U.S. government, the cybersecurity news industry has been abuzz about whether Iran will engage in cyber terrorism, and if so, to what degree, as part of its...more

McDermott Will & Emery

Still Open for Discussion: Venue Based on Presence of Servers

McDermott Will & Emery on

The US Court of Appeals for the Federal Circuit elected not to decide en banc whether servers or similar equipment in third-party facilities constitute a regular and established place of business under the patent venue...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2019 #3

Robinson & Cole LLP on

We predicted last year that hackers would become more malicious in the future, not only stealing and selling data for nefarious purposes, but actually destroying data and even systems. That reality hit email provider VFEmail...more

Robinson+Cole Data Privacy + Security Insider

Hack of Email Provider Destroys Servers and Two Decades of Data

We predicted last year that hackers would become more malicious in the future, not only stealing and selling data for nefarious purposes, but actually destroying data and even systems. ...more

Snell & Wilmer

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Snell & Wilmer on

Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more

Fisher Phillips

GDPR Compliance Collides with U.S. Law at Supreme Court

Fisher Phillips on

The EU’s General Data Protective Regulation (“GDPR”) has been a popular topic of late. Fisher Phillips’ Employment Privacy Blog has covered the evolution of this regulation, starting with the roll back of the previous “safe...more

K2 Integrity

Securing Your Home’s Digital Entry Points

K2 Integrity on

We’re all concerned with our home’s physical security, but so often we forget to pay the same amount of attention to our digital security. However, leaving your home’s digital entry points open is like leaving your front door...more

Farella Braun + Martel LLP

The Fourth Amendment Implications of Sharing Server Space

The prosecution of Martin Shkreli, whom the BBC has called “the most hated man in America,” reveals some important lessons about the Fourth Amendment protections against search and seizure in the digital corporate context:...more

Patterson Belknap Webb & Tyler LLP

China’s Controversial New Cybersecurity Law

Earlier today, the Chinese government in Beijing approved a sweeping new cybersecurity law aimed at centralizing control over computer networks operating within China’s borders. The new law is broadly drafted and...more

Robinson+Cole Data Privacy + Security Insider

Senate hearing reviews ransomware in a school system

On May 18, the Senate Judiciary Committee Subcommittee on Crime and Terrorism heard from Charles C. Hucks, the Executive Director of Technology for the Horry County, South Carolina, School System. The 52 schools and the...more

Davis Wright Tremaine LLP

FTC Settles with Router Manufacturer for Security Failure

As the number of smart devices in homes connected to the Internet continues to grow, the need to keep home networks secure becomes increasingly important. Device manufacturers that promise to secure these home networks,...more

Robinson+Cole Data Privacy + Security Insider

ASUS settles with FTC over insecure home routers

ASUS TeK Computer, Inc. (ASUS) has agreed to settle with the FTC over allegations that “critical security flaws in its routers put the home networks of hundreds of thousands of consumers at risk.” The FTC further alleges that...more

Morrison & Foerster LLP

The Russian Data Protection Authority, Roskomnadzor, Enforces New Russian Data Localization Law

On September 9, 2015, the Federal Service for Supervision of Communications, Information Technology and Mass Communications (the “Roskomnadzor”) reported on its website that it blocked an extensive online database of more...more

Pillsbury - Global Sourcing Practice

Cloud Computing: Not Always the Low Cost Alternative

There is no doubt cloud computing has delivered multiple benefits to the IT organization. However, without proper management and controls, these benefits could become a non-trivial expense to the organization. In a Wall...more

24 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide