We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance

Results: 11-20 of 38,068

Don’t get locked out: is ransomware a threat to your business?
  • Carlton Fields
  • USA
  • September 28 2015

Ransomware is a type of malware that locks access to a computer and its drives. Many forms of ransomware take complete control of the computer system

Much Needed Meat on Security Requirement Bones: Report from California’s Attorney General
  • FisherBroyles LLP
  • USA
  • March 3 2016

There is no shortage of admonitions for business people to maintain 'proper' information security practice. However, much of this guidance stops

Have DoD contractors and subcontractors been drafted? Once voluntary Defense Industrial Base CSIA regulations now mandatory and aligned with new DFARS cybersecurity rules
  • Sheppard Mullin Richter & Hampton LLP
  • USA
  • October 5 2015

When last we left the Department of Defense, it had issued a rather wide-reaching interim DFARS rule addressing cybersecurity practices, data

Identity theft through breach of third-party vendor systems on the rise
  • Roetzel & Andress
  • USA
  • May 15 2015

Many companies outsource portions of their business activity to outside vendors, including tasks such as payroll, mail-order or online purchasing

FTC, state regulators, and apple weigh in on radioshack customer data sale
  • Davis Wright Tremaine LLP
  • USA
  • May 19 2015

RadioShack filed for Chapter 11 bankruptcy in Delaware Bankruptcy Court in February, seeking a court-supervised sale of $1.2 billion in assets

CBA denies cyber insurance claim
  • Mintz Levin Cohn Ferris Glovsky and Popeo PC
  • USA
  • May 19 2015

Cyber security, and cyber insurance, have dominated the industry headlines for several years now, but even as companies, brokers and

Nevada expands definition of personal information in data security statute
  • Alston & Bird LLP
  • USA
  • May 19 2015

On May 13, Nevada Governor Brian Sandoval signed Assembly Bill 179, which expands the definition of personal information for purposes of Nevada's

To err is human; to indemnify, divine?: human foibles in the cloud
  • Baker & Hostetler LLP
  • USA
  • May 19 2015

BakerHostetler's inaugural Data Security Incident Response Report (the "Report") concluded that employee negligence and theft were two of the top

Cyber insurance: why you should require certain vendors to have it
  • Taft Stettinius & Hollister LLP
  • USA
  • May 20 2015

One way to protect your business from financial loss, reputational damage, and the expense of regulatory scrutiny in the event of a data breach is to

判決後の保全の負担につき判断されコンピューター の破棄が認められた事例
  • Jenner & Block LLP
  • USA
  • April 1 2015

Lord Abbett Municipal Income Fund, Inc. v. Asami No. C-12- 03694 (N.D. Cal. Oct. 29, 2014)において当事者は関連 するデータを含む可能性のある159のコンピューター