Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
On Sept. 9, 2015, Excellus BlueCross BlueShield announced a data breach that compromised about 10.5 million people's personal information, including Social Security numbers and medical and financial information. Excellus discovered the data breach during an investigation of its computer system. The breach had occurred on Dec. 23, 2013. A class action has already been filed, and Excellus is cooperating with the FBI.
One of the most interesting circumstances arising from the Excellus data breach is the “ho-hum” attitude with which most readers will greet it. Data breach has become a fact of corporate life. Phishing, malware, cyber extortion and hacking are now terms with which we are all familiar. Readers do not need another article to warn them of the dangers of data breach.
Federal courts have done little to protect corporate data breach victims. In Remijas v. Nieman Marcus Group, 794 F.3d 688 (7th Cir. 2015), for example, class action plaintiffs were not required to show that they incurred any direct damage as a result of identity theft. In Federal Trade Commission v. Wyndham Worldwide, 799 F.3d 236 (3d Cir. 2015), the court held that the FTC maintained enforcement power over data breaches and could find, as a basis of liability, that the company's internal privacy network was inferior to what was portrayed in its public statements. Finally, in the Target Corporation Customer Data Security Breach Litigation, Case No. 0:14-md-02522 (D. Minn.), the court certified a class action of banks and other credit card issuers for the damages that they incurred in replacing credit cards.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?
Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.