Login New User Mobile version
currentUrl = /publications

Publications

Search:
Select type:
Select topic:
Include archived articles
Total matching items found: 1121
Page:
    ...    8    9    10    11    12    [ 13 ]    14    15    16    17    ...    
1
When considering the issue of cybersecurity, businesses must be prepared for more than just external threats. A business’ own employees may be the greatest risk to its data or online assets (including its funds) being misused or misappropriated. Prudent businesses should implement proper cybersecurity measures to ensure their employees are not put in a position of opportunity or temptation to cause detriment to the business through their online dealings.
Topics: Cyberspace Law / E-Commerce / Internet Law,
1
Accompanying the trending of “Internet of Things” in the Big Data Era, individuals’ personal information security in China is calling for both legal protection and governmental regulation. This article introduces the present legal situation with respect to personal information protection in China and provides recommendations to business entities on personal information...
Topics: Cyberspace Law / E-Commerce / Internet Law,
1
This Article addresses cybersecurity threats that law firms with sophisticated commercial clients—particularly those with operations in the United States—should be aware of, with the goal of alerting legal counsel to issues that will help them most effectively serve their clients. By examining privacy law differences between particular jurisdictions, the fallout from recent data breaches, and...
Topics: Cyberspace Law / E-Commerce / Internet Law,
1
The Court of Justice of the European Union has declared the Safe Harbor Agreement between the EU and the U.S. invalid. Following this decision all known legal tools for the transfer of personal data between companies in EU member states and U.S. entities are under careful inspection of the European supervisory authorities for data protection. While the EU commission and the U.S. government have started to negotiate a way out of this dilemma...
Topics: Cyberspace Law / E-Commerce / Internet Law,
1
There is no single overarching legal cybersecurity framework in the United States. Instead, companies doing business in the United States must confront a patchwork quilt of cybersecurity regulations from multiple federal and state agencies and comply with a wide range of rules, regulations and guidance. Amid this chaotic environment, the Federal Trade Commission has emerged as the lead U.S....
Topics: Cyberspace Law / E-Commerce / Internet Law,
1
This Article discusses cyber attacks, focusing particularly on who bears their costs. The Article examines some of the potential losses due to a cyber attack, government regulation associated with cyber attacks, and the how insurance coverage (including cyber liability policies) plays a role in covering liability for such attacks.
Topics: Cyberspace Law / E-Commerce / Internet Law,
1
The material describes main problems of data protection and cyber security in Republic of Belarus.. It should be highlighted that there is not unified guidelines for cyber security in Belarus. Legislation in this sphere is fragmentary and focuses on the strengthening of the separate segments of cyber security, which will be reviewed in the article. Taken into account the abovementioned information, all methods and tools providing information security...
Topics: Cyberspace Law / E-Commerce / Internet Law,
1
Cyber security is the next “big thing” in IT. Devices and applications collect more and more user data. Considerable portion of that data falls under definition of personally identifiable information under Ukrainian laws and therefore require compliance with specific regulations. More importantly data protection itself might serve as well-defined marketing instrument since technologies are becoming more accessible and completion focus has shifted to creating unique user experience...
Topics: Cyberspace Law / E-Commerce / Internet Law,
1
The Court of Justice of the European Union has declared the fifteen-year old EU-US Safe Harbor framework invalid as a mechanism to legitimize the transfer of personal data from the European Union to the United States. This Article provides links to the ruling, press summary, as well as a potential permanent solution (Binding Corporate Rules). The Article also suggests immediate reasonable steps for corporations until a more permanent solution can be adopted.
Topics: Cyberspace Law / E-Commerce / Internet Law,
1
A cyber-attack on the electric power grid has the potential to cause blackouts over large geographical areas across the entire United States. Any company involved in the production, large-scale use or transmission of electricity (including Smart Grid) must understand cyber security regulations. The U.S. government has enacted mandatory cyber security laws and regulations specifically for the electric industry, the only sector that has mandatory cyber security standards.
Topics: Cyberspace Law / E-Commerce / Internet Law,
Page:
    ...    8    9    10    11    12    [ 13 ]    14    15    16    17    ...    
Version : 5.0.303