The IoT’s growing range of services and functionalities pose new security and privacy threats. Laws are being adopted, “best” practices updated. But AI data inference and facial recognition technologies using freely available information sidestep network security measures and anonymized data, making “consent” and willful disclosure beside the point. It is up to the public to decide what to do. But first it must exercise its right to know. Can it?
Takeaway Before a data breach occurs, businesses should have in place: Operations and forensics plans Communications strategy; and If disclosure not mandated, think twice before going public Data Breach Laws With some important exceptions, there is no federal law which requires that data breaches be publicly disclosed. Breaches involving health information are covered by a… Read more »
When you check a stockbroker’s background, his co-workers’ records may tell as much about his potential for future misconduct as his own history. Does this have any relevance to business transactions… What’s behind the sales numbers of the company you just bought? Social network analytics identifies hidden networks and traces unknown links among individuals and… Read more »
Takeaway Even if your company isn’t located in the U.S. and you sell or distribute U.S. trademarked products which are unlicensed only outside the U.S… You may still be subject to infringement claims if your activities impact the U.S. business of trademark holders. Brand Buccaneer or Robin Hood? Back in 2011, Vancouver, B.C.- based Pirate Joe’s… Read more »
Takeaways Before using a copyrighted meme for marketing confirm that you have an appropriate license from the copyright holder, unless your use of the meme comes under the “Fair Use” doctrine. A Privacy or Publicly Rights Release may be required. If your website hosting service receives a Take Down Notice: confirm copyright ownership; compare dollar… Read more »
Bounties and Fines Whistleblowing has become a fact of life for business. And whistleblowing enforcement is a top U.S. Securities and Exchange Commission priority, with a growing number high profile, “send-a-message” cases. The SEC whistleblower program, launched in 2011 as part of Wall Street reform legislation, has expanded rapidly, taking off in 2016. To date,… Read more »
The Illinois Attorney General sued the Jimmy John’s fast food franchisor earlier this month , seeking a declaratory judgment that Jimmy John’s non-compete covenants violate the state’s Consumer Fraud and Deceptive Business Practices Act. All employees, including sandwich makers and delivery drivers, are barred from working at any business that earns more than 10% of its revenue from selling submarine and other… Read more »
The Cybersecurity Information Act of 2015 The Cybersecurity Information Sharing Act of 2015 (CISA) was adopted to encourage voluntary sharing: (i) among private sector businesses; and (ii) between businesses and public entities, and the federal government, of information about cybersecurity threats, and the development of defensive measures. Information sharing by companies conflicts with the goal of… Read more »
Tevislaw has high standards, a commitment to excellence and a passion for helping clients succeed. Our commitment to serving client needs has resulted in enduring relationships and a record of high achievement. The consistently high quality and efficacy of our work across a range of practices has been recognized. We are committed to achieving innovative and business minded results for our clients for competitive fees. This is Tevislaw.