We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance

Results: 1-10 of 13,905

Network interference - a legal guide to the commercial risks and rewards of the social media phenomenon
  • Reed Smith LLP
  • European Union, Global, United Kingdom, USA
  • April 22 2014

Social media is a revolution in the way in which corporations communicate with consumers. This White Paper will help you to maximise the huge

Cyber Security Quarterly Round-Up - July 2016
  • Herbert Smith Freehills LLP
  • Australia, European Union, United Kingdom, USA
  • July 20 2016

Cyber security affects all businesses and industries and is a Board level agenda item. Our quarterly eBulletin provides a round-up of best practice

New Ruling by U. S. Supreme Court Will Make it More Difficult to Recover Damages for a Data Breach
  • Jaffe Raitt Heuer & Weiss PC
  • USA
  • July 13 2016

The United States Supreme Court recently issued its opinion in a case known as Spokeo v. Robins, _U.S._, 136 S.Ct. 1540 (2016), holding that a

Limitations on liability exceptions for gross negligence and willful misconduct and the implications for outsourcing agreements
  • Mayer Brown LLP
  • USA
  • August 12 2013

In outsourcing agreements, parties typically limit their liability to each other. The parties often exclude from those limitations on liability

Why the Ninth Circuit’s “Password Sharing” Decision is Relevant for All Employers
  • Kane Russell Coleman & Logan PC
  • USA
  • July 12 2016

Last week, the Ninth Circuit Court of Appeals handed down an important decision for employers under the Computer Fraud and Abuse Act (CFAA) in U.S. v

Security Interest v. License Agreement: Low Tech Precautions for the High Tech Investment
  • Dorsey & Whitney LLP
  • USA
  • July 19 2016

In this exciting age of startups, the market is brimming with opportunities for individuals and entities alike to invest in emerging companies

District Court: No Warrant Needed to Deploy Malware on Computers
  • Montgomery McCracken Walker & Rhoads LLP
  • USA
  • July 18 2016

In a controversial decision, the Eastern District of Virginia ruled last month that the government does not need a warrant to deploy malware that

Private Fund ReportSummary of Key DevelopmentsSpring 2016
  • Paul Hastings LLP
  • European Union, United Kingdom, USA
  • July 14 2016

This continues to be a time of rapid change for the private fund industry, as the Securities and Exchange Commission (the "SEC"), the Commodity

Cloud privacy - significant developments
  • King & Wood Mallesons
  • European Union, USA
  • July 18 2016

Both of these developments concern the circumstances in which US law enforcement and national security agencies should be entitled to obtain access

Federal Contracting - What tech companies need to know
  • Dentons
  • USA
  • July 19 2016

When negotiating the terms and conditions of a technology contract with the US government (the Government), the predominant business issues are the