We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance



Results: 1-10 of 1,012

Strategies for businesses protecting electronic data within California
  • Nossaman LLP
  • USA
  • June 10 2015

Data security is top-of-mind in today's corporate world. According to The Ponemon Institute's 2015 Cost of Data Breach Study, the average total cost


MoFo Global Procurement Quarterly: Winter 2015
  • Morrison & Foerster LLP
  • European Union, Germany, USA
  • February 17 2015

In Spring 2014, the German Federal Ministry of the Interior (“BMI”) issued a decree directed to its awarding authority that quickly became Known as


International news: focus on compliance - winter 2014
  • McDermott Will & Emery
  • China, European Union, Germany, Global, USA
  • December 2 2014

As regulatory oversight of companiesfrom Sarbanes Oxley and the Dodd-Frank Act to the Foreign Corrupt Practices Act (FCPA) and the UK Bribery


State AGs in the news
  • Dickstein Shapiro LLP
  • USA
  • June 5 2014

Incumbent AG Luther Strange (R) and Joe Hubbard (D) received their respective party's nomination after both ran unopposed in the primary. California


State AGs in the news
  • Dickstein Shapiro LLP
  • USA
  • May 15 2014

Bernard Nash and Milton A. Marquis Hot News Blog Post: Think You're Not a Holder of Unclaimed Property? Think Again! All 50 states have unclaimed


MoFo Tech - SpringSummer 2014
  • Morrison & Foerster LLP
  • USA
  • April 30 2014

America's shale gas revolution is making waves in transportation technology. Currently, only 1 percent of all natural-gas-fueled vehicles worldwide


Can your company's computer use policy form the basis for a civil claim?
  • Quarles & Brady LLP
  • USA
  • October 29 2013

Can your company's computer use policy form the basis for a civil claim under the Computer Fraud and Abuse Act? In a recent opinion, the Southern


Financial services report, fall 2013
  • Morrison & Foerster LLP
  • USA
  • September 16 2013

On July 31, 2013, the U.S. District Court For the District of Columbia issued a Sharply worded opinion holding the Federal


An employee is stealing company documentsthat can’t be protected activity, right?
  • Seyfarth Shaw LLP
  • USA
  • July 3 2013

A supervisor discovers that an employee has recently downloaded thousands of pages of confidential Company billing and financial information, and


Different strokes: interpreting Computer Fraud and Abuse Act
  • Morvillo Abramowitz Grand Iason & Anello PC
  • USA
  • September 4 2012

Originally enacted in 1984 to address the growing problem of computer hacking, the Computer Fraud and Abuse Act has been used to prosecute a wide variety of behavior, such as the violation of a non-compete agreement by a former employee, the leak of classified government materials, and cyber-bullying