We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance

Results: 1-10 of 33,431

Best practices to assure data security
  • Nossaman LLP
  • USA
  • June 4 2015

There are three principal statutes available to California businesses to remediate breaches of data security. The statutes are the federal Computer

Would you buy back your hacked data?
  • Wortzmans
  • USA
  • January 13 2016

We have known for a long time that preventing a cyber-breach is nearly impossible. Unfortunately, many organizations cannot even tell they have been

FTC and Seven International Partners Launch New Initiative to Boost Cooperation in Protecting Consumer Privacy
  • Venable LLP
  • Global, USA
  • November 30 2015

On October 25, 2015, Federal Trade Commission ("FTC") Chairwoman Edith Ramirez signed a Memorandum of Understanding ("MOU") with the seven other

Avoid Two Common Information Security Misconceptions
  • Foley & Lardner LLP
  • USA
  • January 14 2016

Foley Partner Michael Overly reinforces that information security is much more than a privacy-related matter and explains why denial-of-service

OFAC Formally Implements Cyber Sanctions Regime
  • Steptoe & Johnson LLP
  • USA
  • January 9 2016

On December 31, 2015, the U.S. Treasury Department, Office of Foreign Assets Control (OFAC) issued the Cyber-Related Sanctions Regulations to formally

DHS seeks feedback on cybersecurity information sharing organizations
  • Steptoe & Johnson LLP
  • USA
  • May 30 2015

The Department of Homeland Security is seeking feedback from the public on the formation of Information Sharing and Analysis Organizations (ISAOs) to

Trustworthy Accountability Group (“TAG”) launches Brand Integrity Program Against Piracy
  • Venable LLP
  • USA
  • June 5 2015

The Trustworthy Accountability Group ("TAG") has launched its Brand Integrity Program Against Piracy. This voluntary program is intended to enhance

Should we hack back?
  • McDermott Will & Emery
  • USA
  • June 4 2015

"No," says U.S. Assistant Attorney General Leslie R. Caldwell. At the most recent Cybersecurity Law Institute held at Georgetown University Law

Cheating spouses beware that GPS device your spouse put in your glove compartment isn’t an actionable invasion of your privacy
  • Porzio Bromberg & Newman PC
  • USA
  • July 13 2011

The plaintiff, a Gloucester County Sherriff’s Officer, married his wife in 2000

Connecticut may require businesses to offer identity theft protection services following a data breach
  • Jackson Lewis PC
  • USA
  • June 3 2015

Following other states that have toughened their data breach notification laws, Connecticut is about to amend its law to require that businesses