Chicago partner Randy Rucker hosted a webinar that discussed some of the key bilateral and multilateral FTAs and highlighted their similarities and unique differences. To view the webinar, click the play button below.
Making good on a 2014 directive from President Obama “to modernize and streamline” existing overtime regulations, the Department of Labor (DOL) today published its highly anticipated Final Rule Defining and Delimiting the Exemptions for Executive, Administrative, Professional, Outside Sales and Computer Employees.
The Supreme Court issued its long-awaited decision in Spokeo, Inc. v. Robins, in which it was asked whether plaintiffs have Article III standing if they allege a bare violation of a statute (i.e., an injury in law) but no concrete harm (i.e., an injury in fact).
Implement and follow robust data security practices.
Train employees to be on the lookout for suspicious emails and websites.
Establish business continuity plans that include regular system backups.
Create and implement rigorous data retention policies to ensure that only necessary data is maintained, thus minimizing the amount of data subject to ransom.
Ransomware attacks, which employ a devious and malicious type of malware that encrypts or loc...
Requires multi-factor authentication for card administrators to access sensitive card data on all networks
Companies should prioritize PCI compliance as a continuing practice
On April 28, 2016, the Payment Card Industry’s Security Standards Council (PCI) published its new Data Security Standards (DSS). PCI sets debit/credit card security standards updates and clarifies existing standards to reflect changes in the business and technical landscape. The n...
The article examines the Federal Communication Commission’s (FCC) recent briefing before the D.C. Circuit Court of Appeals, and how the agency’s statements may provide some limited guidance for TCPA compliance efforts.