We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.
Results 1 to 5 of 14
Most popular |Most recent


Have you thought about your online Terms of Use recently?

USA - August 7 2015 Nearly every website, app or online service posts a set of Terms of Use outlining company policies for users (sometimes called Terms of Service)...


EU cybersecurity regulations - the costs of Financial Market Infrastructure resiliency

European Union - January 20 2015 Any company that uses information technology is a potential target for data theft, advanced malware and other cyber threats. Cyber threats have...

Tim Wright.


BYOD: no such thing as a free lunch

USA - September 4 2014 It seems intuitive that, by and large, employees prefer to use their own mobile devices, carrying only a single device for personal and work purposes...

Joshua B. Konvisser, David C. Johnson.


How significant is the Wyndham case to the US cybersecurity legal landscape?

USA - April 15 2014 The security community has been abuzz this week with the US. District Court of New Jersey's April 7 ruling in Federal Trade Commission v. Wyndham...


National Cybersecurity Framework released - has your organization considered the implications?

USA - February 19 2014 On February 12, 2014, the National Institute of Standards and Technology ("NIST") released the final version of its Framework for Improving Critical...