We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.
In cooperation with Association of Corporate Counsel
  Request new password

Search results

Order by most recent / most popular / relevance

Results: 1-10 of 29

Five key steps to developing an information security program

  • Foley Hoag LLP
  • -
  • USA
  • -
  • July 17 2009

Information security the discipline of protecting information found in paper documents, electronic files and emails has become increasingly important in business

Goldman Sachs programmer arrested for transfer of top secret source code for Goldman's automated trading system

  • Foley Hoag LLP
  • -
  • USA
  • -
  • July 9 2009

On July 3, 2009, FBI arrested Sergey Aleynikov, a Goldman Sachs programmer, as he disembarked at Newark airport on charges that he violated the Electronic Espionage Act (18 U.S.C. sec. 1832) when he sent company data to an overseas document server

FTC announces delay in red flags enforcement until November 1, 2009

  • Foley Hoag LLP
  • -
  • USA
  • -
  • July 29 2009

Amidst calls from the legal community, the Federal Trade Commission's (FTC) announced this morning that it was delaying enforcement of the FTC's Red Flag Rules until November 1, 2009

Incident of the week: Seattle man sentenced to three years in prison for using peer-to-peer software to steal financial records, commit identity theft

  • Foley Hoag LLP
  • -
  • USA
  • -
  • August 13 2009

Yesterday, Frederick Eugene Wood of Seattle was sentenced to 39 months in prison for using LimeWire peer-to-peer (P2P) software to obtain Social Security numbers, bank and financial records and tax returns, which he then used to commit identity theft

Social networking sites used as command and control structure for botnets

  • Foley Hoag LLP
  • -
  • USA
  • -
  • August 28 2009

Are you having trouble making sense of social networking sites like Twitter?

Massachusetts regulators propose amendments to information security regulations, delay enforcement until March 1, 2010

  • Foley Hoag LLP
  • -
  • USA
  • -
  • August 18 2009

On Monday, August 17, 2009, the Massachusetts Office of Consumer Affairs and Business Regulation (OCABR) indicated that it will be modifying some provisions of the strict Massachusetts information security regulations first promulgated last year, 201 CMR 17

Declassified documents show FBI expanding data mining efforts over 1.5 billion personal records (and counting)

  • Foley Hoag LLP
  • -
  • USA
  • -
  • September 24 2009

Declassified documents obtained (but not published) by WIRED Magazine indicate that the FBI has been hard at work expanding a database of Americans' personal and financial information

Massachusetts holds public hearing on information security regulations -- regulators contemplating additional revisions in final rulemaking

  • Foley Hoag LLP
  • -
  • USA
  • -
  • September 22 2009

This morning, the Massachusetts Office of Consumer Affairs and Business Regulations (OCABR) held a public hearing in connection with its promulgation of revisions to the Commonwealth's information privacy regulations, 201 CMR 17.00

Incident of the week: Russian company proves that WiFiwireless networks no longer secure

  • Foley Hoag LLP
  • -
  • Global, USA
  • -
  • October 15 2009

ElcomSoft Co. Ltd., a Moscow-based "password recovery" company, has announced that its software can make an encrypted wireless network accessible using only a PC and the innovative computing power of consumer graphics cards from Nvidia

Accountants ask court to exempt them from Red Flags Rules

  • Foley Hoag LLP
  • -
  • USA
  • -
  • January 12 2010

Last week the American Institute of Certified Public Accountants (AICPA) filed papers seeking summary judgment in the lawsuit filed against the Federal Trade Commission (FTC) to exempt accountants from the FTC's Red Flags Rules