Firm: All
Practice Industry: Government & Public Sector, Healthcare & Pharmaceuticals, Technology
Region: All
Country/ State: All
Tag: All
Dykema | April 2020

On March 27, 2020, the U.S. Court of Appeals for the District of Columbia addressed the question of discovery costs in a long-running False Claims Act case,U.S. ex rel. Barko v. Halliburton (No. 19-7064, March 2020) (“Barko”). In Barko, a former employee claimed that an affiliate of Halliburton, Kellogg Brown & Root Services (KBR), inflated costs and received kickbacks from subcontractors during the Iraq war during the early to mid-2000s ...

The state of emergency in the Czech Republic was extended until May 17, 2020. What does this mean?   At its meeting held on 28 April 2020, the Chamber of Deputies decided to extend the state of emergency until 17 May 2020. By Resolution No. 194 (published in the Collection of Laws under No ...

A primer on burgeoning crypto-asset regulation in Cyprus In Cyprus, the Prevention and Suppression of Money Laundering and Terrorist Financing Law, L188(I)/2007 (the “AML Law”) was amended earlier this year through L13(I)/2021 (the “Amending Law”), in order to harmonise domestic legislation with the provisions of the 4th and 5th AML Directives (Directives (EU) 2015/849 and 2018/843) ...

When was the last time when you or someone you know shared a bad experience or a complaint about a person in Facebook or Twitter?  A good bet is that a longer time has passed than if this question was asked a year ago.  The reason for this is probably Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, which President Noynoy Aquino signed into law on September 12, 2012. A ...

On February 1, 2016, the Federal Deposit Insurance Corporation (“FDIC”) published the Winter 2015 issue of Supervisory Insights. Not surprisingly, the first article dealt with the most important issue facing the financial industry today – cybersecurity ...

With only four months left before most changes to the federal Standards for Safeguarding Customer Information (“Safeguards Rule”) – a component of the Gramm-Leach Bliley Act (“GLBA”) that provides for the protection of consumers’ privacy and personal information – take effect, the Federal Student Aid Office is focused squarely on postsecondary educational institutions and third-party servicers, according to its recent announcement ...

as published in West Virginia Banker magazine, Fall 2022 A recent survey by PricewaterhouseCoopers (“PwC”) revealed that U.S. executives now consider cyberattacks the number one risk their companies face. Concerns about cybersecurity have moved beyond the Chief Information Security Officer (“CISO”) to the entire C-suite and corporate boards ...

The onslaught of ransomware attacks by cybercriminals increases unabated every year, affecting everyone from mom and pop shops on Main Street to corporate lions of Wall Street. Hackers infiltrate an organization's computer network through social engineering tactics like phishing emails or by exploiting network security weaknesses, allowing vital digital information to be hijacked and held for ransom ...

Lavery Lawyers | October 2022

While the Canadian government has said it intends to pass legislation dealing with cybersecurity (see Bill C-26 to enact the Critical Cyber Systems Protection Act), many companies have already taken significant steps to protect their IT infrastructure. However, the Internet of Things is too often overlooked in this process. This is in spite of the fact that many devices are directly connected to the most important IT infrastructure for businesses ...

Carey | March 2020

COVID-19 and the restrictions to freedom of movement this sanitary emergency has entailed have substantially accelerated the implementation of telework by companies in Chile and worldwide ...

Carey | May 2023

The latest reforms to Law No. 19,496 Consumer Protection Act, introduced mainly by the "Pro-Consumer" Law and the E-Commerce Regulation, will force companies to be more vigilant in the 2023 version of CyberDay. During the event, which will be held from May 29th to 31st, the National Consumer Service ("SERNAC") will be supervising that companies comply with their e-commerce obligations ...

What it’s aboutThe Cybercrime Prevention Act (Republic Act No. 10175) penalizes “cybercrimes”— acts that fall into any of these major categories:a) offenses against the confidentiality, integrity and availability of computer data and systems (e.g., illegal access, data interference);b) computer-related offenses (e.g., computer-related forgery and fraud);c) content-related offenses (e.g ...

ENSafrica | March 2019

The implementation of cybercrime legislation is a pressing issue given that South Africa has one of the highest numbers of cybercrime victims in the world. In addition, a number of unsuspecting individuals and organisations alike fell prey to the scourge of cyber scams which seemed to spike quite rapidly in the past year. The Cybercrime Bill was adopted by the Portfolio Committee for Justice and Correctional Services in November 2018 and sent to the National Assembly for debate ...

Shoosmiths LLP | September 2020

Sadly, bullying and harassment in the workplace is nothing new. Indeed, a 2020 study found that 15% of people surveyed had been a victim of workplace bullying. Conversely, cyberbullying in the workplace is a relatively new phenomenon but it’s on the rise. What exactly is cyberbullying? Simply put, cyberbullying is any bullying, harassment or victimisation that involves a computer, phone or tablet ...

Deacons | December 2014

Nowadays, we live in an information age (also known as the computer age, digital age or new media age) and the advancement of technologies has facilitated information flow and communication through social media. On one hand, people have easy and quick access to others’ information, enabling interaction with one another. However, the free flow of information and wide participation in social media networks also exposes a person to various risks or dangers ...

Shoosmiths LLP | February 2022

German fuel distributor Mabanaft and its related company Oiltanking Deutschland recently suffered a substantial cyber-attack causing significant disruption to their business operations. In response they declared force majeure on a number of their contracts ...

When you hear the word cyberattack you think of attacks on banks, large box stores, or medical facilities. You should add the construction industry to that list because it is the third most common target for cyberattacks. These types of attacks are only increasing because bad actors have created processes that have streamlined how they attack businesses. They like to attack the construction industry because large sums of money are being transferred in and out of bank accounts via wire transfers ...

Dinsmore & Shohl LLP | September 2017

The Health Insurance Portability and Accountability Act (“HIPAA”) contains minimum security standards that Covered Entities and Business Associates must employ to safeguard protected health information (“PHI”).  As part of HIPAA’s security standards, Business Associates are obligated to report all security incidents to the Covered Entity ...

"The Package” The day begins like any other. Your client opens for business at 9:00 a.m. All employees are at their desks as customers begin calling, emailing, and walking in with various questions and needs. Except this time, when the employees attempt to access customer records from your client’s computer network, they immediately notice something is wrong. None of the customer files will open. The data is a garbled mess ...

dots