We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance



Results: 1-10 of 75

Why Data Security Is So Hard (and what to do about it)
  • Jeffer Mangels Butler & Mitchell LLP
  • USA
  • August 3 2017

It’s ironic: when global threats are in the news every day, their ubiquity makes them easy to ignore. Whether they be political threats, climate


Hotel Cybersecurity: Protecting your guests and your property from vendor data breaches
  • Jeffer Mangels Butler & Mitchell LLP
  • USA
  • July 19 2017

Hotels rely on third-party vendors to help run their properties efficiently, and often must give them access to sensitive guest data. This leaves


Beyond Breach Notification
  • Jeffer Mangels Butler & Mitchell LLP
  • USA
  • July 7 2017

Ever since California adopted the nation’s first breach notification law in 2002, companies that have suffered a data breach have focused on whether


Middle-Market Companies Require a Customized Approach for Successful Cybersecurity
  • Jeffer Mangels Butler & Mitchell LLP
  • USA
  • June 26 2017

Middle-market companies have cultures, goals and business needs that are distinct from larger firms, and nowhere is that more true than with


District Court Orders Search of Inventors Emails and Finds That Discovery Is Proportional to Needs of Case Because Search Terms Would Be Used
  • Jeffer Mangels Butler & Mitchell LLP
  • USA
  • April 26 2017

In this patent infringement action, T-Mobile sought email discovery from seventeen named inventors of the asserted patents and the licensing


Cybersecurity Lawyer Beyond Tabletop Exercises: Running a Data Breach Drill
  • Jeffer Mangels Butler & Mitchell LLP
  • USA
  • April 20 2017

You spent valuable time and resources crafting a cybersecurity breach action plan. You’ve assembled a multidisciplinary response team. You’ve


Unwired v. Apple: District Court Sanctions Unwired for Failing to Produce Supplemental Information after Remand
  • Jeffer Mangels Butler & Mitchell LLP
  • USA
  • April 19 2017

During this patent infringement action, Apple filed a motion for discovery sanctions based on a failure to produce documents after a remand. The


District Court Denies Ex Parte Motion to Compel Third Party to Produce Documents Where Plaintiff Waited too Long to File Motion
  • Jeffer Mangels Butler & Mitchell LLP
  • USA
  • March 30 2017

The plaintiff Alexsam, Inc. ("Alexsam") filed an ex parte application to compel compliance with a subpoena to produce documents against a third party


Cybersecurity Programs and the FTC - Staying out of Harm’s Way
  • Jeffer Mangels Butler & Mitchell LLP
  • USA
  • March 28 2017

While there is no nationwide cybersecurity program, the Federal Trade Commission has brought more than 50 actions claiming that the cybersecurity


Professional Service Firms Ignore Cybersecurity at Their Peril
  • Jeffer Mangels Butler & Mitchell LLP
  • USA
  • March 21 2017

Cybersecurity horror stories tend to focus on government agencies, retail outlets, health care institutions, and other companies serving consumers