We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance



Results: 1-10 of 1,436

Global brand and content protection: developments and emerging technologies
  • Venable LLP
  • Global, USA
  • April 27 2016

Counterfeiting, piracy and IP infringement have assumed epidemic proportions, largely due to technological advances and globalisation. The Internet's


URS versus UDRP proceedings - choosing the right forum
  • Lewis Roca Rothgerber
  • Global, USA
  • February 4 2016

In 2013 the Internet Corporation for Assigned Names and Numbers (ICANN) contracted with third-party service providers to adjudicate 'clear and


Cybersecurity and Data Breaches: How In-House Counsel Can Engage the Board
  • Association of Corporate Counsel
  • Global, USA
  • January 19 2016

The legal department’s role in protecting a company’s valuable information, and preventing damage to its competitive positioning, stock price, and shareholder value


Cyber Security - new technologies; new risks
  • King & Wood Mallesons
  • China, Global, United Kingdom, USA
  • January 13 2016

Companies across the globe and in all industries have invested heavily in new technologies for doing business creating dynamic, exciting and ever


Global Payments Newsletter - December 2015 & January 2016 Issue
  • Hogan Lovells
  • United Kingdom, USA, Estonia, European Union, France, Global, Hong Kong, Poland
  • January 12 2016

On 16 November 2015, HM Treasury published a summary of responses received to its consultation on implementing the Payment Accounts Directive


Bridging the Weeks by Gary DeWaal: November 23 - December 4 and 7, 2015 (Insider Trading in Futures; Newer, Tougher AML Requirements; New CCO Obligations; Possible Bitcoin Fraud)
  • Katten Muchin Rosenman LLP
  • Canada, European Union, Global, USA
  • December 6 2015

Compliance officers may be in the bullseye again as a result of new regulatory proposals introduced during the prior two weeks by the New York State


Cyber security - new technologies; new risks
  • King & Wood Mallesons
  • Global, United Kingdom, USA
  • November 9 2015

Companies in every country and every industry have invested heavily in the constantly expanding and evolving technologies available for doing business


Cloud computing and data sovereignty - blog
  • Kemp IT Law
  • European Union, Global, United Kingdom, USA
  • November 3 2015

2 November was the second great, if less well known, British legal Birthday of 2015, the 250th anniversary of Lord Camden’s judgment in Entick v


Online health care, consumer data, cybersecurity risks, accounting fraud, patents Expect Focus Vol. II, Spring 2015
  • Carlton Fields
  • Global, USA
  • June 17 2015

Large-scale data breaches have become increasingly common, bringing with them not only bad press and loss of customer goodwill


2014 privacy year in review
  • Winston & Strawn LLP
  • Global, USA
  • January 27 2015

The definition of what constitutes "personal information" varies depending on the law in question. This can be confusing - and complicated - when