TECHNOLOGY, OUTSOURCING, AND COMMERCIAL TRANSACTIONS
NEWS FOR LAWYERS AND SOURCING PROFESSIONALS
According to a recent Everest Group report , large application outsourcing in the banking sector is surging to record levels.
Most website and mobile application operators are aware of the Children’s Online Privacy Protection Act (COPPA), but did you know that California has enacted additional data privacy protection measures for minors?
The American Civil Liberties Union (ACLU) recently filed an action in the US District Court for the District of Columbia challenging the constitutionality of the Computer Fraud and Abuse Act (CFAA).
When we last discussed the application of Title III of the Americans with Disabilities Act (ADA) to websites ( see our April 2015 post ), the US Department of Justice (DOJ) appeared primed to propose the Web Content Accessibility Guidelines (WCAG) 2.0, Level AA as the standard required for public accommodations in the private/non-government sector.
The Federal Trade Commission (FTC) recently issued an enforcement policy statement and accompanying guidance addressing deceptively formatted “native advertising” in digital media.
On August 11, 2015, in Elizabeth Starkey v. G. Adventures, Inc.
The article “ Data Transfers ” by of counsel Dr. Axel Spies provides some additional color on the hot topic of international data transfers.
Although sending a takedown request for the unauthorized use of copyrighted content on the Internet under the Digital Millennium Copyright Act (DMCA) may appear simple, the US Court of Appeals for the Ninth Circuit recently sent a strong reminder that it is far from a simple process.
The October 6 LawFlash “ ECJ Rules EU-US Safe Harbor Programme Is Invalid ” by Morgan Lewis partners Stephanie A. Blair and Pulina Whitaker and of counsel Dr. Axel Spies discusses the European Court of Justice (ECJ) ruling in the landmark case Maximillian Schrems v. Data Protection Commissioner (case C-362/14).
The Morgan Lewis Data Breach Checklist is a practical tool that can be used as a guide in developing your incident response plan and as part of your data security and security breach response policies and procedures.