We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.
In cooperation with Association of Corporate Counsel
  Request new password

Search results

Order by most recent / most popular / relevance

Results: 11-20 of 542

Litigation hold notices in light of Apple v. Samsung

  • Hunton & Williams LLP
  • -
  • USA
  • -
  • August 6 2012

On July 25, 2012, in the case of Apple Inc. v. Samsung Electronics Co., LTD., et al., the Magistrate Judge, Paul S. Grewal, for the Northern District of California, San Jose Division, issued an order granting Apple’s motion for an adverse inference jury instruction based on the court’s finding that Samsung did not suspend its automatic biweekly destruction of emails from its email system, that Samsung failed to issue sufficiently distributed litigation hold notices after it admitted the litigation was “reasonably foreseeable” and failed to follow up on such hold notices, and that Samsung failed to monitor its employees in their preservation efforts, to ensure compliance with the hold notices

NIST releases update on implementation of cybersecurity framework

  • Hunton & Williams LLP
  • -
  • USA
  • -
  • December 9 2014

On December 5, 2014, the National Institute of Standards and Technology ("NIST") released an update on the implementation of the Framework for

Vermont Attorney General reaches settlement with Aaron’s franchisee over unlawful debt collection practices

  • Hunton & Williams LLP
  • -
  • USA
  • -
  • September 12 2014

On September 8, Vermont Attorney General William Sorrell announced that SEIAaron's, Inc. has entered into an assurance of discontinuance, which

ENISA issues report on implementation of Privacy and Data Protection by Design

  • Hunton & Williams LLP
  • -
  • USA
  • -
  • January 22 2015

On January 12, 2015, the European Union Agency for Network and Information Security (“ENISA”) published a report on Privacy and Data Protection by

Another California-based mobile app developer settles with New Jersey AG’s office over child privacy violation allegations

  • Hunton & Williams LLP
  • -
  • USA
  • -
  • December 3 2013

On November 22, 2013, New Jersey's Acting Attorney General announced that the State had entered into a settlement agreement with Dokogeo, Inc

New means of communication: employee text messaging presents unique employment issues

  • Hunton & Williams LLP
  • -
  • USA
  • -
  • December 22 2009

The Supreme Court last week agreed to decide whether a California police department violated the privacy rights of an employee police officer by reading sexually-explicit text messages on the officer’s employer-issued pager

United States submits request to participate in APEC Cross-Border Privacy Rules system

  • Hunton & Williams LLP
  • -
  • Asia-Pacific, USA
  • -
  • May 30 2012

On May 26, 2012, the United States government submitted its request to participate in the APEC Cross-Border Privacy Rules (“CBPRs”) system

Cloud computing: what to ask when the clouds roll in

  • Hunton & Williams LLP
  • -
  • USA
  • -
  • June 5 2008

The name derives from the common representation in technical architectural diagrams of internet network resources as a “cloud.”

Department of Commerce highlights the benefits, oversight and enforcement of the Safe Harbor Frameworks

  • Hunton & Williams LLP
  • -
  • European Union, Switzerland, USA
  • -
  • January 21 2014

In January 2014, the Department of Commerce's International Trade Administration ("ITA") posted a Key Points document to provide additional

Nevada updates encryption law and mandates PCI DSS compliance

  • Hunton & Williams LLP
  • -
  • USA
  • -
  • June 17 2009

As of January 1, 2010, Nevada law will require businesses to use encryption when data storage devices that contain personal information are moved beyond the physical or logical controls of the business, in addition to continuing to require that personal information be encrypted if it is transferred outside the secure system of the business