We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance

Results: 1-10 of 24,337

FTC’s hammer gets bigger with LabMD case
  • Jackson Lewis PC
  • USA
  • January 26 2015

The on-going fight to hammer out the extent of the Federal Trade Commission’s authority to bring regulatory enforcement actions in data breach cases

Enforcement without regulation: seven things that you should know about the FTC’s section 5 authority and protected health information
  • Dinsmore & Shohl LLP
  • USA
  • May 6 2015

If you or a client deals with protected health information (PHI), you will want to know the following seven things about section 5 of the Federal

FTC tracks down tech company with settlement over retail tracking
  • Manatt Phelps & Phillips LLP
  • USA
  • May 7 2015

A company making use of tracking technology reached a settlement agreement with the Federal Trade Commission after the agency charged that Nomi

SEC issues cybersecurity guidance for registered investment advisers and registered funds
  • McCarthy Tétrault LLP
  • USA
  • May 5 2015

Continuing its emphasis on the importance of cybersecurity, the U.S. Securities and Exchange Commission (SEC) recently recommended measures that

U.S. Department of Justice releases report identifying “best practices” for victim response and reporting of cyber incidents
  • Haynes and Boone LLP
  • USA
  • May 5 2015

Last week the U.S. Department of Justice's Cybersecurity Unit ("DOJ") issued guidance to organizations concerning preparing for, responding to, and

Broad interpretation of 28 U.S.C. 1920 with respect to some e-discovery costs.
  • Jenner & Block
  • USA
  • April 30 2015

In Colosi v. Jones Lang LaSalle Americas, Inc., No. 11-cv-824, 2015 WL 1186765 (6th Cir. Mar. 17, 2015), the Sixth Circuit held that 28 U.S.C. §

Spotlight on vendor management: “brother’s keeper” enforcement pattern becoming the norm
  • BuckleySandler LLP
  • USA
  • May 5 2015

Two regulatory enforcement matters announced in April offer a view into the current mindset of regulators in the ever-evolving world of vendor

DOJ issues new cyberattack response playbook
  • Steptoe & Johnson LLP
  • USA
  • May 2 2015

The U.S. Department of Justice has released a helpful set of "best practices" for planning for and responding to cyberattacks. The guidance - drafted

Electronic signaturessame as paper in North Carolina
  • Smith Debnam Narron Drake Saintsing & Myers LLP
  • USA
  • May 7 2015

Although electronic signatures have maintained an "equivalent to paper signature" status in North Carolina since 1998, their current use in commerce

A primer on FTC expectations for your partner and vendor relationships: enforcement shows you are your brother’s keeper
  • Wilmer Cutler Pickering Hale and Dorr LLP
  • USA
  • May 4 2015

With all of the privacy and data security enforcement actions brought by the Federal Trade Commission in recent years, and with all of the guidance