- 321 Studios v. Metro Goldwyn Mayer Studios, Inc. (N.D. Cal. 2004)
a
- access control
- adequacy (class action certification)
- adequacy (EU Data Transfer)
- Adida, Ben (comments to U.S. Copyright Office)
- AGFA Monotype Corp. v. Adobe Systems, Inc. (N.D. Ill. 2005)
- Aguilar, Luis (Securities and Exchange Commission)
- Aikens v. Baltimore and Ohio R. Co. (1985)
- Alaska data security law
- Alberta (Canada) privacy and cybersecurity laws
- Albert, Kendra (Electronic Frontier Foundation)
- Allen v. Wright (1984)
- Allison v. Aetna, Inc. (E.D. Pa. 2010)
- All Writs Act
- Amburgy v. Express Scripts, Inc. (E.D. Mo. 2009)
- America Online, Inc. v. National Health Care Discount, Inc. (N.D. Iowa 2000)
- AmSouth Bancorporation v. Ritter (Del. 2006)
- Andersen Consulting LLP v. UOP (N.D. Ill. 1998)
- AOL
- APPI (Japan Act on the Protection of Personal Information)
- Apple-encryption dispute with FBI
- Argentina
- Arizona data breach notification laws
- Arkansas data breach notification laws
- Armerding, Taylor
- Army cybersecurity
- Article III standing in data breach litigation
- AtPac v. Aptitude Solutions, Inc. (E.D. Cal. 2010)
- attorney-client privilege
- audit logs
- Automated Indicator Sharing (AIS)
- autoposter
b
- Basu, Eric
- Berkshire Hathaway 10-K cybersecurity disclosures
- biometric data security and privacy laws
- biometric data (state data breach notification laws)
- birth date (state data breach notification laws)
- BJ’s Wholesale Club data breach
- Bohach v. City of Reno (D. Nev. 1996)
- Bork, Robert
- breach of contract
- breach of implied warranty
- Burrows v. Purchasing Power, LLC (S.D. Fla. 2012)
- business judgment rule
- Buzz (Google)
- Bring Your Own Device (BYOD)
c
- California data security, breach notice, and privacy laws
- California “eraser law”
- California Financial Information Privacy Act (SB-1)
- California Online Privacy Protection Act (CalOPPA)
- California Penal Code 502 (anti-hacking law)
- California Shine the Light Law
- Canada privacy and cybersecurity laws
- CAPTCHA
- Cardwell v. Lewis (1974)
- Caremark data breach
- Carver v. Allstate Insurance Co. (S.D. Ga. 1982)
- Caudle v. Towers, Perrin, Forster & Crosby, Inc. (S.D.N.Y. 2008)
- Cavallaro v. United States (1st Cir. 2002)
- Ceridian data breach
- Chamberlain Group v. Skylink Technologies (Fed. Cir. 2004)
- Chambers v. Maroney (1970)
- Children’s Online Privacy Protection Act (COPPA)
- China privacy and cybersecurity laws
- Cigarette Rule (FTC)
- Clapper v. Amnesty International USA (2013)
- class action certification
- classified information cybersecurity
- Commerce Department
- Committee on Foreign Investment in the United States (CFIUS)
- commonality (class action certification)
- Communications Assistance for Law Enforcement Act (CALEA)
- Comptroller of the Currency
- Computer Crimes and Intellectual Property Section, U.S. Justice Department
- Computer Fraud and Abuse Act (CFAA)
- civil actions
- criticisms
- full text
- definitions of “access without authorization” and “exceeding authorized access”
- origins
- Section (a)(1): hacking to commit espionage
- Section (a)(2): hacking to obtain information
- Section (a)(3): hacking a federal government computer
- Section (a)(4): hacking to commit fraud
- Section (a)(5): hacking to damage a computer
- Section (a)(6): trafficking in passwords
- Section (a)(7): threatening to damage or obtain information from a computer
- Connecticut data breach notification and security laws
- controlled unclassified information (CUI)
- Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act)
- CopyLeft
- Cousineau v. Microsoft Corporation (W.D. Wash. 2014)
- covered defense information
- Craigslist v. Naturemarket, Inc. (N.D. Cal. 2010)
- Creative Computing v. Getloaded.com LLC (9th Cir. 2004)
- Creative Hospitality Ventures, Inc. v. United States Liability Insurance Co. (11th Cir. 2011)
- critical infrastructure
- Cumis Insurance Society, Inc. v. BJ’s Wholesale Club, Inc. (Mass. 2009)
- Cuno, Inc. v. Pall Corp. (E.D.N.Y. 1988)
- Cybersecurity Act of 2015
- Cybersecurity Risk Information Sharing Program (CRISP)
d
- Davidson & Associates v. Jung (8th Cir. 2005)
- DeCSS
- Defend Trade Secrets Act of 2016
- Defense Department
- Delaware fiduciary duty laws
- Della Ratta v. Della Ratta (Fla. Dist. Ct. App. 2006)
- Department of Homeland Security
- Description of Business (Section 10-K disclosures)
- Digital Millennium Copyright Act (DMCA) Section 1201
- and the First Amendment
- full text
- origins
- penalties
- Section 1201(a)(1)
- Section 1201(a)(2)
- Section 1201(b)(1)
- Section 1201 exemptions
- digital signature (state data breach notification laws)
- Dish Network, LLC v. World Cable, Inc. (E.D.N.Y. 2012)
- Drew, Lori
- DSW, Inc. data breach
- Durflinger v. Artiles (10th Cir. 1984)
e
- Ebert v. C.R. Bard, Inc. (E.D. Pa. 2014)
- Economic Espionage Act
- civil actions: Defend Trade Secrets Act of 2016
- definition of ”knowingly”
- definition of “trade secret”
- origins
- Section 1831 (economic espionage)
- Section 1832 (theft of trade secrets)
- economic loss doctrine
- EF Cultural Travel BV v. Explorica, Inc. (1st Cir. 2001)
- EINSTEIN (Department of Homeland Security)
- Electronic Communications Privacy Act. see also national security letters; Pen Register Act; Stored Communications Act; Wiretap Act
- Electronic Frontier Foundation
- employment identification number (state data breach notification laws)
- encryption debate (FBI and Apple)
- Equifax
- European Union
- Executive Order 13556
- Experian
- export controls
f
- Facebook, Inc. v. ConnectU (N.D. Cal. 2007)
- Facebook, Inc. v. Power Ventures, Inc. (N.D. Cal. 2010)
- fairly traceable (Article III standing)
- FCC v. Fox Television Stations, Inc. (2012)
- Federal Bureau of Investigation
- Federal Communications Commission
- Federal Energy Regulatory Commission (FERC)
- Federal Information Processing Standards (FIPS) 200
- Federal Information Security Management Act (FISMA)
- Federal Trade Commission Act, Section 5
- Federal Trade Commission (FTC) data security enforcement
- Federal Trade Commission privacy enforcement
- Federal Trade Commission Safeguards Rule (GLBA)
- Felten v. Recording Industry Association of America (2001)
- Flagg v. City of Detroit (E.D. Mich. 2008)
- Food and Drug Administration
- Forbes v. Wells Fargo (D. Minn. 2006)
- Foreign Intelligence Surveillance Act (FISA)
- Fourth Amendment
- reasonable expectation of privacy
- reasonableness
- state action
- warrant requirement exceptions
- warrants
- Freedom Banc. Morg. Servs., Inc. v. O’Harra (S.D. Ohio 2012)
- FTC v. Sperry & Hutchinson Co. (1972)
- FTC v. TRW, Inc. (D.C. Cir. 1980)
- FTC v. Wyndham Worldwide Corp. (3d Cir. 2015)
g
- Galaria v. Nationwide Mut. Insurance Co. (S.D. Ohio 2014)
- Gelbard v. United States (1972)
- General Data Protection Regulation (European Union)
- Genesco v. Visa (M.D. Tenn. 2014)
- geolocation
- Georgia data breach notification and security laws
- Giordano v. Wachovia Sec. (D. N.J. 2006)
- Glider
- Goldman v. Metro. Life. Ins. Co. (N.Y. 2004)
- Google
- Gordon, Matthew
- GPS tracking
- Gramm-Leach-Bliley Act Privacy Rule
- Gramm-Leach-Bliley Act Safeguards Rule
- Green, Matthew D.
- Guernsey
h
- Hannaford Bros. Co. Customer Data Security Breach Litigation (D. Me. 2009)
- Healthcare Advocates, Inc. v. Harding, Earley, Follmer & Frailey (E.D. Pa. 2007)
- health insurance information (state data breach notification laws)
- Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule
- Health Insurance Portability and Accountability Act (HIPAA) Security Rule
- Heldenfels Bros. v. City of Corpus Christi (Tex. 1992)
- Hickman v. Taylor (1947)
- Hoffman, Patricia
- Home Depot data breach
- Huawai
i
- Ibrahim v. Department of Homeland Security (9th Cir. 2012)
- incident response plan
- injury in fact (Article III standing)
- Illinois Biometric Information Privacy Act
- Illinois v. Gates (1983)
- implied warranty of fitness for a particular purpose
- implied warranty of merchantability
- In re Anthem Data Breach Litigation (N.D. Cal. 2016)
- In re Cendant Corp. Securities Litigation (3d Cir. 2003)
- In re DoubleClick Inc. Privacy Litigation (S.D.N.Y. 2001)
- In re Heartland Payment Systems, Inc. Customer Data Security Breach Litigation (S.D. Tex. 2012)
- In re Hulu Privacy Litigation (N.D. Cal. 2012)
- In re Intuit Privacy Litigation (C.D. Cal. 2001)
- In re iPhone Application Litigation (N.D. Cal. 2012)
- In re Merrill Lynch & Co. (S.D.N.Y. 2011)
- In re Pharmatrak (1st Cir. 2003)
- In re San Juan Dupont Plaza Hotel Fire Litig. (1st Cir. 1988)
- In re Science Applications International Corp. (SAIC) Backup Tape Data Theft Litigation (D.D.C. 2014)
- In re Shell Oil Refinery (E.D. La. 1990)
- In re Sony Gaming Networks and Customer Data Security Breach Litigation (S.D. Cal. 2014)
- In re Walt Disney Co. Deriv. Litig. (Del. 2006)
- In re Zappos.com Customer Data Security Breach Litigation (D. Nev. 2013)
- insurance for cybersecurity
- Insurrection Act
- Interagency Guidelines (GLBA Safeguards Rules)
- International Airport Centers v. Citrin (7th Cir. 2006)
- In the Matter of Accretive Health (FTC 2014)
- In the Matter of ARCAnet (FTC 2011)
- In the Matter of Card Systems (FTC 2006)
- In the Matter of CBR Systems, Inc. (FTC 2013)
- In the Matter of Credit Karma (FTC 2014)
- In the Matter of Dave & Busters, Inc. (FTC 2010)
- In the Matter of Eli Lilly and Company (FTC 2002)
- In the Matter of Fandango, LLC (FTC 2014)
- In the Matter of Frankli’'s Budget Car Sales, Inc., also dba Franklin Toyota Scion (FTC 2012)
- In the Matter of GeneLink, Inc. (FTC 2014)
- In the Matter of Genica Corporation and Compgeeks.com and Geeks.com (FTC 2009)
- In the Matter of GMR Transcription Services, Inc. (FTC 2014)
- In the Matter of Henry Schein Practice Solutions (FTC 2016)
- In the Matter of HTC America, Inc. (FTC 2013)
- In the Matter of James B. Nutter & Co. (FTC 2009)
- In the Matter of LabMD Inc. (FTC 2015)
- In the Matter of Lookout Services (FTC 2011)
- In the Matter of MTS, Inc., d/b/a/ Tower Records/Books/Video and Tower Direct, LLC, Towerrecords.com (FTC 2004)
- In the Matter of Oracle Corporation (FTC 2016)
- In the Matter of Reed Elsevier Inc. and Seisint Inc. (FTC 2008)
- In the Matter of Rite Aid Corporation (FTC 2010)
- In the Matter of Trendnet (FTC 2014)
- In the Matter of Twitter, Inc. (FTC 2011)
- In the Matter of Upromise (FTC 2012)
- invasion of privacy by publication of private facts
- Israel
j
- Japan privacy and cybersecurity laws
k
- Katz v. Pershing (1st Cir. 2012)
- Katz v. United States
- Kaymark v. Bank of America, NA (3d Cir. 2015)
- Kerr, Orin
- Key v. DSW, Inc. (S.D. Ohio 2006)
- Kinder v. Meredith Corp. (E.D. Mich. 2014)
- Konop v. Hawaiin Airlines, Inc. (9th Cir. 2002)
- Krottner v. Starbucks Corp. (9th Cir. 2010)
l
- Lanier, Zach
- least privilege
- Lee, Robert M.
- legal duty (negligence)
- Legal proceedings (SEC 10-K disclosures)
- Lewert v. P.F. Chang’s China Bistro (7th Cir. 2016)
- Librarian of Congress
- LivePerson, Inc. v. 24/7 Customer, Inc. (S.D.N.Y. 2015)
- Louisiana Municipal Police v. Pyott (Del. Ct. Chancery 2012)
- Luis v. Zang (6th Cir. 2016)
- Lujan v. Defenders of Wildlife (1992)
- LVRC Holdings LLC v. Brekka (9th Cir. 2009)
m
- Management’s Discussion and Analysis of Financial Conditions and Results of Operations (Section 10-K Disclosures)
- Martin v. Bally's Park Place Hotel & Casino (3d Cir. 1993)
- Maryland v. King (2013)
- Massachusetts data security law
- Massachusetts v. Sheppard (1984)
- MCMIC Finance Corporation v. Artino (S.D. Iowa 2009)
- MDY Industries, LLC v. Blizzard Entertainment, Inc. (9th Cir. 2010)
- Medical information (state data breach notification laws)
- Meier, Megan
- Mexico cybersecurity and privacy laws
- Michigan Video Rental Privacy Act
- Microsoft
- mobile app privacy
- Mohawk Indus., Inc. v. Carpenter (2009)
- mother’s maiden name (state data breach notification laws)
- multifactor authentication
- MySpace
n
- National Archives and Records Administration (NARA)
- National Center for Missing and Exploited Children (NCMEC)
- National Cybersecurity and Communications Integration Center (NCCIC)
- National Cybersecurity Protection Advancement Act of 2015
- National Highway Traffic Safety Administration
- National Industrial Security Program Operating Manual (NISPOM)
- National Institute of Standards and Technology Cybersecurity Framework
- National Institute of Standards and Technology (NIST)
- National Protection and Programs Directorate (DHS)
- National Security Agency
- national security letters
- negligence
- negligent misrepresentation or omission
- Nevada data security laws
- New South Equipment Mats, LLC v. Keener (S.D. Miss. 2013)
- New York v. Belton (1981)
- New Zealand
- NIST Special Publication
- NNG, KFT v. Ava Enterprises, Inc. (C.D. Cal. 2015)
- non-testifying expert privilege
- nonliteral elements
- North American Electric Reliability Corp.
- North Dakota data breach notification law
- Nuclear Regulatory Commission
- numerosity (class action certification)
o
- O’Grady v. Superior Court (Cal. Ct. App. 2006)
- Obama, Barack
- Office of Cybersecurity and Communications (DHS)
- online account information (state data breach notification laws)
- Oregon data security law
p
- Palkon ex. Rel. Wyndham Worldwide Corp. (D. N.J. 2014)
- Paradigm Alliance v. Celeritas Technologies, LLC (D. Kan. 2008)
- passport number (state data breach notification laws)
- password complexity
- Payment Card Industry Data Security Standard (PCI DSS)
- Payton v. New York (1980)
- Pen Register Act
- Personal Information and Electronic Documents Act (PIPEDA)-Canada
- Peters, Justin
- phishing
- Pisciotta v. Old National Bancorp (7th Cir. 2007)
- Playdom (FTC COPPA settlement)
- PLS Financial Services (E.D. Ill.)
- Posse Comitatus Act
- PRISM
- privacy by design
- privacy laws
- Privacy Shield
- privilege for cybersecurity incidents
- Protecting Consumer Privacy in an Era of Rapid Change (FTC 2012)
- pseudonymization
- psychotherapist privilege
- Pulte Homes, Inc. v. Laborers' International Union of North America (6th Cir. 2011)
q
- Quebec (Canada) privacy law
r
- Raines v. Byrd (1997)
- RAM
- Randolph v. ING Life Ins. and Annuity Co. (D.D.C. 2007)
- ransomware
- Red Flags Rule
- redressability (Article III standing)
- Reilly v. Ceridian Corp. (3d Cir. 2011)
- Remijas v. Neiman Marcus Group, LLC (7th Cir. 2015)
- remote access
- remote computing services (RCS)
- Resnick v. AvMed, Inc. (11th Cir. 2012)
- retinal identification
- Rhode Island data security law
- Riley v. California (2014)
- risk factors (Section 10-K disclosures)
- risk of harm (state data breach notification laws)
- Rockefeller, Jay
- Rocky Mountain Helicopters v. Lubbock Cty. Hosp. Dist. (Tex. 1998)
- Roe v. Bernabei & Wachtel PLLC (D.D.C. 2015)
- Rogers, Mike (former Congressman)
- Role Models America, Inc. v. Jones (D. Md. 2004)
- Rollins, Inc. v. Heller (Fla. Dist. Ct. App. 1984)
- Rosenweig, Paul
- Ruiz v. Gap, Inc. (N.D. Cal. 2009)
- Russia
s
- Samuelson, Pamela
- Santra T. E. v. South Berwyn School Dist. 100 (7th Cir. 2010)
- SB-1 (California Financial Information Privacy Act)
- SCADA
- Scalia, Antonin
- Schneckloth v. Bustamonte (1973)
- Schrems v. Data Protection Commissioner
- scraping
- Secure Socket Layer (SSL)
- Securities and Exchange Commission, CF Disclosure Guidance: Topic No. 2, Cybersecurity (Oct. 13
- Securities and Exchange Commission cybersecurity expectations
- Securities and Exchange Commission Form 8-K
- Securities and Exchange Commission Regulation S-P (GLBA Safeguards Rule)
- separation of duties
- Shamrock Foods Co. v. Gast (D. Ariz. 2008)
- shareholder protections for cybersecurity incidents
- Sherman & Co. v. Salton Maxim Housewares, Inc. (E.D. Mich. 2000)
- Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc. (W.D. Wash. 2000)
- Simon v. Eastern Ky. Welfare Rights Organization (1976)
- Skinner v. Railway Labor Executives' Assn. (1989)
- Smith v. Maryland (1979)
- Snapchat (FTC privacy action)
- social security number redaction
- Sony Play Station data breach
- Sotomayor, Sonia
- Sovereign Bank v. BJ's Wholesale Club, Inc. (3d Cir. 2008)
- Special Markets Insurance Consultants v. Lynch (N.D. Ill. 2012)
- Spectro Alloys Corp. v. Fire Brick Engineers Co. (D. Minn. 2014)
- Spilfogel v. Fox Broadcasting Co. (11th Cir. 2011)
- Spokeo v. Robins (2016)
- Sprint
- Sprung, Marshall S.
- SQL inject attacks
- state computer hacking laws
- state consumer protection laws
- state data breach notification laws
- state data disposal laws
- State Department
- Stollenwerk v. Tri-West Health Care Alliance (9th Cir. 2007)
- Stone ex rel. AmSouth Bancorporation v. Ritter (Del. 2006)
- Stored Communications Act
- Section 2701
- Section 2702
- Section 2703
- full text
- Swartz, Aaron, 195–197
- Switzerland
t
- tabletop exercises
- Target data breach and litigation
- taxpayer identification number (state data breach notification laws)
- Thayer Corp. v. Reed (D. Me. 2011)
- Theofel v. Farey-Jones (9th Cir. 2004)
- Ticketmaster v. RMG Technologies, Inc. (C.D. Cal. 2007)
- TJX Companies data breach
- TransUnion
- Travelers Indemnity Company of America v. Portal Healthcare Solutions, LLC (4th Cir. 2016)
- Treasury Department
- trespass (computer hacking)
- tribal identification number (state data breach notification laws)
- TriTeq Lock & Sec. LLC v. Innovative Secured Solutions, LLC (N.D. Ill. 2012)
- typicality (class action certification)
u
- unfairness (Section 5 of the FTC Act)
- Uniform Commercial Code
- United States v. Adjani (9th Cir. 2006)
- United States v. Adlman (2d Cir. 1998)
- United States v. Aleynikov (2d Cir. 2012)
- United States v. Alfano (6th Cir. 1988)
- United States v. Bae (D.C. Cir. 2001)
- United States v. Cameron (1st Cir. 2012)
- United States v. Carey (9th Cir. 2016)
- United States v. Carlson (3d Cir. 2006)
- United States v. Carpenter (6th Cir. 2016)
- United States v. ChevronTexaco (N.D. Cal. 2003)
- United States v. Chung (9th Cir. 2011)
- United States v. Czubinski (1st Cir. 1997)
- United States v. D'Andrea (D. Mass. 2007)
- United States v. Elcom Ltd. (N.D. Cal. 2002)
- United States v. Hambrick (W.D. Va. 1999)
- United States v. Ivanov (D. Conn. 2001)
- United States v. Jarrett (4th Cir. 2003)
- United States v. Jin (N.D. Ill. 2012)
- United States v. Jin (7th Cir. 2013)
- United States v. John (5th Cir. 2010)
- United States v. Jones (2012)
- United States v. Keith (D. Mass. 2013)
- United States v. Kovel (2d Cir. 1961)
- United States v. Leon (1984)
- United States v. Lindsley (5th Cir. 2001)
- United States v. Martinez-Fuerte (1976)
- United States v. Martin (1st Cir. 2000)
- United States v. Martin (9th Cir. 2002)
- United States v. Middleton (9th Cir. 2000)
- United States v. Muhtorov (D. Colo. 2015)
- United States v. Nosal (9th Cir. 2012)
- United States v. Pinson (10th Cir. 2009)
- United States v. Richardson (4th Cir. 2010)
- United States v. Roberts (E.D. Tenn. 2009)
- United States v. Rodriguez (11th Cir. 2010)
- United States v. Shiah (C.D. Cal. 2008)
- United States v. Silva (1st Cir. 2009)
- United States v. Spilotro (9th Cir. 1986)
- United States v. Valle (2d Cir. 2015)
- United States v. Villanueva (S.D.N.Y. 1998)
- United States v. Wang (N.D. Cal. 2014)
- United States v. Warshak (6th Cir. 2010)
- United States v. Weaver (C.D. Ill. 2009)
- United States v. Willis (10th Cir. 2007)
- United States v. Zolin (1989)
- Universal City Studios v. Corley (2d Cir. 2001)
- University of Pennsylvania v. EEOC (1990)
- unjust enrichment
- Upjohn Co. v. United States (1981)
- Uruguay
- U.S. Computer Emergency Readiness Team (US-CERT)
v
- Vaquero Energy v. Herda (E.D. Cal. 2015)
- Variety Wholesalers v. Salem Logistics (N.C. 2012
- Video Privacy Protection Act (VPPA)
w
- Wal-Mart v. Dukes (2011)
- Wal-Mart 10-K Cybersecurity Disclosures
- Wassenaar Arrangement
- WEC Carolina Energy Solutions LLC v. Miller (4th Cir. 2012)
- Whitaker v. Health Net of Cal., Inc. (E.D. Cal. 2012)
- White House Consumer Privacy Bill of Rights (2012)
- Whitmore v. Arkansas (1990)
- Wiretap Act
- Wolfle v. United States (1934)
- work product doctrine
- World Intellectual Property Organization (WIPO)
- Wyden, Ron
- Wyoming v. Houghton (1999)
z
- Zurich American Insurance Co. v. Sony Corp. (N.Y. Sup. Ct. 2014)
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.