Showing 11 posts in Technology.
Cybersecurity Month Serves as Reminder to Take Proactive Steps
Whether you are the CEO of a big corporation working in the office six days a week or an analyst working remotely from home entering data, everyone is at risk of a cyber-attack. Despite the fact that all organizations, regardless of size, are at risk, few have preventative measures in place, or have even planned for how they would respond in the event of an attack. Read More ›
Categories: Criminal, Cybersecurity, Technology
Cybersecurity Impact on Small Businesses in Wake of Colonial Pipeline
In the wake of the Colonial Pipeline ransomware attack, cyber attacks such as ransomware and phishing continue to be a major threat for all businesses, large or small. Even with precautions in place, it is not a matter of "if" but "when" a business will experience an attack. In the case of Colonial Pipeline, the hackers not only demanded and received millions from Colonial Pipeline in May 2021, but the resulting ransomware attack forced the company into a fuel distribution shutdown, making headlines across the country and causing gas shortages on the east coast. The attack also compromised thousands of individuals' personal information. Read More ›
Categories: Cybersecurity, Did you Know?, News, Technology
Virtual Panel: TikTok, WeChat & More: Talking Tech and IP in The U.S. & China
The U.S. and China compete for global dominance in the areas of tech and innovation; however, in an era of global firms and global citizens they must also learn to cooperate. Read More ›
Categories: Compliance, Intellectual Property, Technology
Children's Online Privacy Protection Act: Are You Compliant?
The Children’s Online Privacy Protection Act (“COPPA”) was enacted in 1998 and was created to address concerns with the online collection of children’s personal information. Recently, the Federal Trade Commission (“FTC”) has announced several large fines for companies not in compliance. Read More ›
Categories: Compliance, Liability, Privacy, Technology
Pros and Cons of Software as a Service ("SaaS")
Today, the use of software as a service ("SaaS") is widespread and the cybersecurity considerations are an afterthought. Read More ›
Categories: Cloud Computing, Cybersecurity, Did you Know?, IT Contracts, Technology
Big Hollywood Studios Win Injunction Against Streamer VidAngel in Copyright Infringement Case
A big legal battle has been brewing between upstart video streamer VidAngel and Hollywood heavyweights Disney, Warner Bros., and 20th Century Fox. So far, the studios have scored a clean knockdown, if not a knockout.
VidAngel describes itself as a family-friendly video streamer that allows users the ability to filter language, nudity and violence from movies and TV shows. Its business model involves selling new movies to customers for $20, allowing customers to select which snippets of content to edit out, and then buying movies back for $19. The price VidAngel will pay to buy back the content diminishes by a dollar for each day the buyer keeps it. In other words, VidAngel does not license the movies from the studios who hold the copyrights to the content like, for example, Netflix does.
The big studios took notice, and in June filed suit, alleging that VidAngel was operating as an “unlicensed [video on demand] streaming service.” Among other claims, the studios requested that the court grant an injunction blocking VidAngel from continuing to stream films. VidAngel fired back with counterclaims alleging antitrust violations by the studios. Read More ›
Categories: Copyright, Intellectual Property, Technology
5 Tips for Investigating and Purchasing Cyber Insurance
In 2016 Lansing, MI's Board of Water and Light fell victim to a cyber-attack that resulted in $2.4 million in costs, including a $25,000 ransom paid to the perpetrators. In the aftermath of the breach, BWL announced that it was filing for a $1.9 million insurance claim under its cyber insurance policy, including $2 million in covered losses, less a $10,000 deductible.
There is a lot at stake for businesses when it comes to cyber-crime, which is why more and more businesses are investigating and purchasing cyber insurance to hedge against the risks associated with cyber security and data privacy. Read More ›
Categories: Intellectual Property, News, Privacy, Technology
Assembling Your Company's Data Breach Response Plan
No matter how carefully, thoughtfully and diligently a company works to prevent it, data breaches happen. Company management, IT teams and outside consultants can do everything right and still end up dealing with a breach. That means that knowing how to best respond when (not if) a breach happens should be part of every company’s data protection strategy.
We recommend that every company assemble a security breach team, consisting of individuals inside and outside of the organization who possess different skill sets. This may include technology officers, as well as staff from IT, human resources, communications, legal departments, outside counsel, and outside vendors. The composition of the team will depend on the type and size of the organization, but each member should be in a position and have skills that enable the organization to quickly and properly respond to an incident. The team must also be equipped, authorized and empowered to evaluate and immediately react to an incident once it has occurred. Read More ›
Lawsuits Encouraged by Sixth Circuit Decision Where Customer and Employee Sensitive Data Breached
A recent decision by the U.S. Court of Appeals for the Sixth Circuit (the “Sixth Circuit”) may make it easier for plaintiffs to bring costly lawsuits against companies that allow sensitive data to fall into the wrong hands. Most troubling from a company's perspective, the Sixth Circuit used language that some states legally require in data breach notification letters to justify allowing the case to move forward. Read more about this case here.
Categories: Employment, News, Technology
Deadline for EHR Attestation Fast Approaching
As noted in our September 2011 article, it is time for hospitals and physicians to start using electronic health records ("EHR"). It is particularly important if hospitals or physicians want to take advantage of the 2011 Medicare incentive payments, since important deadlines are quickly approaching. Read More ›
Categories: Technology
Categories
- Labor Relations
- Compliance
- Domain Name Registration
- Financing
- Social Media
- Chapter 11
- Privacy
- Alerts and Updates
- Startup
- Trade Secrets
- Insurance
- Entity Selection, Organization & Planning
- Sales Tax
- Lawsuit
- News
- Mergers & Acquisitions
- Trademarks
- Personal Publicity Rights
- Distribution
- Crowdfunding
- Patents
- Contracts
- Employment
- IT Contracts
- Cloud Computing
- Employee Benefits
- Venture Capital/Funding
- Tax Disputes
- Did you Know?
- E-Commerce
- Inspirational
- Estate Planning
- Department of Labor
- Tax
- Digital Assets
- Hospice
- Legislative Updates
- Cybersecurity
- Hospitals
- Sales/Disputes
- Regulations
- Entity Planning
- Intellectual Property
- Retirement
- Licensing
- Electronic Health Records
- HIPAA
- Copyright
- Technology
- Liability
- Fraud & Abuse
- Criminal