Search
Searching Content indexed under IT and Internet by Sandra Jeskie ordered by Published Date Descending.
Links to Result pages
 
1  
 
Title
Country
Organisation
Author
Date
1
Pa. Supreme Court Rules Employers Have Legal Duty To Protect Employees' Personal Information From Data Breaches
In doing so, the Court made clear that the criminal acts of third parties who may breach a computer system do not alleviate the legal duty on a business to protect such information.
United States
3 Dec 2018
2
What The Recent Cyberattack Means And Ways Businesses Can Protect Themselves
Technology is advancing rapidly, and businesses no longer have the luxury to address cybersecurity at their convenience or engage in limited security initiatives.
United States
25 Oct 2016
3
FDA Releases Draft Guidances On What Constitute "Essentially Copies" Of Commercially Available Or Approved Drug Products
Online retailers across the United States have one more issue to consider as they prepare for the next sale: a growing number of lawsuits under the New Jersey Truth-in-Consumer Contract, Warranty and Notice Act (TCCWNA) alleging that standard online terms of service agreements on websites violate the New Jersey bar on deceptive notices.
United States
5 Aug 2016
4
Seller Beware: Recent Lawsuits Under N.J. Truth-in-Consumer Contract, Warranty and Notice Act Target E-Commerce Businesses
Businesses that violate the New Jersey Truth-in-Consumer Contract, Warranty and Notice Act are liable to aggrieved consumers for $100, actual damages, or both, as well as reasonable attorneys' fees and court costs.
United States
4 Aug 2016
5
The Third Circuit Confirms That The FTC Has Authority To Regulate Cybersecurity Practices Under The Unfairness Prong Of The FTC Act And Does Not Have Provide Specific Cybersecurity Standards For Businesses To Follow
In 2008 and 2009, hackers successfully accessed Wyndham's computer systems and stole personal and financial information for over 619,000 consumers in three different attacks that led to over $10.6 million in fraudulent charges.
United States
25 Aug 2015
6
President Obama Signs Executive Order To Block Property Of Those Engaging In Malicious Cyber-Enabled Activities
The Executive Order (E.O.) contains traditional blocking language, including the prohibition relating to donations and other assistance to "blocked persons."
United States
7 Apr 2015
7
Apps Gone Wild: Is There Anything They Can't Do?
There now are hundreds of all sorts of apps that can be downloaded and implemented on a smart phone.
United States
11 Apr 2013
8
Pa. District Court Awards $367,000 In E-discovery Costs To Prevailing Defendants
In Race Tires America, Inc. v. Hoosier Racing Tire Corp., the U.S. District Court for the Western District of Pennsylvania held that the two prevailing defendants may recover e-discovery costs because such costs are the modern-day equivalent of duplication costs.
United States
10 Jun 2011
9
Data Security Compliance Deadlines Are Quickly Approaching
Many businesses may assume that their data-security compliance is appropriately handled with software and firewalls by their information technology departments. Other businesses may assume they do not need to comply because they do not collect consumer data. Such assumptions can lead to significant legal exposure.
United States
17 Feb 2010
10
Massachusetts Modifies Its New Information Security Rules For Businesses And Extends The Compliance Deadline Again
The Massachusetts Office of Consumer Affairs and Business Regulation issued a press release on August 17, 2009, extending the deadline for compliance with the state's new information security regulations from January 1, 2010, to March 1, 2010, and updating the regulations to implement a more risk-based approach.
United States
20 Aug 2009
11
FTC Extends Compliance Deadline Again For "Red Flag" Identity Theft Rules
The Federal Trade Commission ("FTC") announced on July 29, 2009, that the agency would once again delay enforcement of the "Red Flags Rule"—this time until November 1, 2009.
United States
14 Aug 2009
12
“Red Flag” Identity Theft Rules Apply To Unsuspecting Businesses; FTC Extends Compliance Deadline Again
The Federal Trade Commission announced on April 30, 2009, that the agency would once again delay enforcement of the "Red Flags Rule," this time from May 1 to August 1, 2009.
United States
6 May 2009
13
Massachusetts Extends Compliance Deadline On New Information Security Rules Applying To Unsuspecting Businesses
The Massachusetts Office of Consumer Affairs and Business Regulation has extended the deadline for compliance with the state's new information security regulations from January 1, 2009, to May 1, 2009.
United States
19 Nov 2008
14
ICANN Releases Draft Applicant Guidebook for New Generic Top-Level Domains
The Internet Corporation for Assigned Names and Numbers ("ICANN"), the organization that is responsible for the allocation of Internet domain names and IP addresses, released draft policy documents regarding a new program that will permit organizations to create and operate generic top-level domains ("TLDs").
United States
3 Nov 2008
15
"Red Flag" Identity Theft Rules Apply to Unsuspecting Businesses; FTC Extends Compliance Deadline
The FTC recently announced that it would push back the compliance date for its recent "red flag" rules from November 1, 2008 to May 1, 2009.
United States
31 Oct 2008
16
California Court Orders Preservation of RAM Data
In early June, the federal court for the Central District of California, in Columbia Pictures Indus. v. Bunnell, Case No. CV 06-1093, issued a ruling requiring a company to store its random access memory ("RAM") data. The ruling came during ongoing litigation stemming from a lawsuit filed by the Motion Picture Association of America ("MPAA"), alleging claims of contributory copyright infringement against TorrentSpy, a popular free file sharing service.
United States
3 Jul 2007
Links to Result pages
 
1