Items Tagged with "Legal"


A7290c5bd7bc2aaa7ea2b6c957ef639b

California AG Releases Mobile App Guidelines; Industry Responds

January 24, 2013 Added by:David Navetta

The guidelines separately address app developers, app platform providers, mobile ad networks, operating system providers, and mobile carriers. A coalition of advertising and marketing industry groups recently responded, criticizing the guidelines...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Warrantless Surveillance 101: Introducing EFF's New NSA Domestic Spying Guide

December 06, 2012 Added by:Electronic Frontier Foundation

On December 14th, we hope that the Northern District of California federal court will agree with us that our case challenging illegal domestic spying should move forward. Warrantless wiretapping isn't a state secret—it's a clear violation of FISA, other laws, and the Constitution...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

TPP: Why it Matters in the USA

December 04, 2012 Added by:Electronic Frontier Foundation

We live in an interconnected world, and America's actions on the world stage affect us strongly here at home. Take action now to demand that the U.S. government open up the TPP drafts to the public, and that the government negotiate for your interests - not the entertainment companies'...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Beacon Events Compliance Conference in Beijing – I Wish I Could Be There

November 27, 2012 Added by:Thomas Fox

If you have not had the opportunity to attend a compliance-related conference tailored to the challenges of working in the Far East this would be the one for you. Even if you have attended such an event, this conference focuses on China and will give you insight into how to do business...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Trading Away our Digital Rights: More Nations Join TPP

November 23, 2012 Added by:Electronic Frontier Foundation

As TPP talks trudge along with ever more Pacific nations participating in the meetings, our alarm over its intellectual property (IP) provisions has only grown. The IP language in this intricate trade agreement would harm users’ digital rights in profound ways, such as pressuring ISPs to become Internet cops...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Suing our way to Better Security... Redux

November 14, 2012 Added by:Jayson Wylie

One of the latest publicly known Government Data Breaches has incurred yet another lawsuit for the people by the people’s lawyers. Monetary and punitive damages that can be incurred through Personal Identifiable Information (PII) loss resulting in fraud or victimization...

Comments  (0)

5029f8f9d65d988cb378fc0290f86cc4

From Trick or Treat through Thanksgiving: Examining the Past to Prepare for the Future

November 04, 2012 Added by:Mary Shaddock Jones

In my experience, companies need to be closely reviewing what little case law or factual allegations exist with regard to the FCPA so that they too know where to find any potential problems that may exist within their own company. There are only so many ways to hide the dollar...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Companies Must Consider Travel Providers’ Data Practices or Risk Being Harmed

November 04, 2012 Added by:David Navetta

A company responsible for handling billing and settlement for the International Air Transport Association (IATA) has been selling flight booking information about corporate travelers — on a travel agency level — to airlines, hotels and others...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Creation, Implementation and Administration of a Hotline

October 29, 2012 Added by:Thomas Fox

I recently saw a White Paper released through Compliance Week, where an un-named author posited that there are seven essential features to create an effective hotline. I found this article to be useful for a compliance practitioner to quickly review how his or her company might set up a hotline...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Fact Checking Obama's Misleading Answer About Warrantless Wiretapping

October 24, 2012 Added by:Electronic Frontier Foundation

Jon Stewart boldly went where no mainstream reporter has gone: asking President Obama why he embraced Bush’s warrantless wiretapping program after campaigning against it. While Stewart’s question was commendable, Obama’s answer was puzzling because it seems so obviously untrue...

Comments  (2)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Employers Must Consider Social Media Risks

October 17, 2012 Added by:David Navetta

One should assume that any information purportedly protected by privacy settings could still be viewed by strangers. And t is difficult to authenticate “friends” on a social network – they may be impersonators looking to scrape sensitive information from the ”private” online posts...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

James Bond at 50 – A Compliance Conversation in English and American

October 15, 2012 Added by:Thomas Fox

Maybe it’s just the difference in the two cultures; in the UK, they are trying figure out how and why compliance failures occurred and change the compliance culture so they can obey the law. In the US, businesses want to change the law so the conduct companies engage in will no longer violate the law...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

EFF Opposes Government's State Secrets Claim in Wiretapping Case

October 14, 2012 Added by:Electronic Frontier Foundation

EFF filed its latest brief in the Jewel v. NSA case, aiming to stop the government from engaging in mass warrantless collection of emails, phone calls, and customer records of ordinary Americans. The matter is set for hearing on December 14, 2012 in federal court in San Francisco...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Landmark Ruling: Insiders Aren't Hacking if You Gave them Access

October 08, 2012 Added by:Rafal Los

What happens if you go perusing through your corporate file-share lists, applications directories and such... and find some interesting stuff that you aren't technically supposed to have access to yet the controls in place have no problem giving you permission? Does anyone notice?

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

CEO Hubris and Compliance Catastrophes

October 08, 2012 Added by:Thomas Fox

Even in this age of documenting, checking, measuring, stress testing and reassessing every conceivable type of risk, what is the one which is never tested? She believes that the answer is “the chief executive gets so high on power that he or she losses the plot...”

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

New Book Details the NSA’s Warrantless Wiretapping Program

October 07, 2012 Added by:Electronic Frontier Foundation

Three more NSA whistleblowers, including William Binney a former high ranking official involved with the program during its infancy, also submitted affidavits laying out how the NSA illegally spied on Americans in the aftermath of 9/11...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »