David Johnson

David Johnson

Pillsbury Winthrop Shaw Pittman LLP

Contact  |  View Bio  |  RSS

Latest Publications


Say “Yes” to the Service Desk: 4 Keys to Documenting Services like a Champ

Of Silk and ServicesAs I listened to my wife, a custom wedding dress designer, talk a hysterical bride off the cliff this past weekend, I realized the conversation sounded eerily familiar. My wife was certain that the...more

11/17/2015 - Contract Terms Outsourcing Service Contracts

IT Services with Chinese Characteristics

The "Amazon of China" is following Amazon's playbook yet again with their investment in the cloud. Aliyun, Alibaba's technology arm, already operates five Chinese data centers supporting 1.4 million customers. They cite high...more

3/23/2015 - Amazon China Cloud Computing Data Centers

BYOD: No Such Thing as a Free Lunch

It seems intuitive that, by and large, employees prefer to use their own mobile devices, carrying only a single device for personal and work purposes, and having choice over the device to be used (please don't take away my...more

9/5/2014 - Bring Your Own Device Cell Phones Mobile Devices Reimbursements

Public Sector Outsourcing: Events and Lessons from 2013

2013 was not a stellar year for public sector outsourcing. As we reported in an earlier blog article, Indiana is appealing judgment in an ongoing court battle with IBM over a troubled welfare claims processing project....more

2/6/2014 - Australia Health and Welfare Plans Healthcare Outsourcing Unemployment Unemployment Benefits

Of Service Levels, Welfare, and Heartbreak: Indiana vs. IBM

In 2006 Indiana awarded IBM a contract for more than $1 billion to modernize Indiana's welfare case management system and manage and process the State of Indiana's applications for food stamps, Medicaid and other welfare...more

5/28/2013 - Breach of Contract Contract Claims Health and Welfare Plans IBM Liquidated Damages

BYOD Trends and Best Practices: Part 3 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 3 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will address developing BYOD trends and best practices. Please check out Part 1 and 2 of this 3-part series addressing employee and employer concerns,...more

5/21/2013 - Bring Your Own Device Cybersecurity Data Protection

Employer BYOD Concerns: Part 2 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 2 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will discuss employer BYOD concerns. Check out Part 1 to learn more about employee interests; Part 3 will present developing trends and suggest best...more

5/14/2013 - Breach Notification Rule Bring Your Own Device Compliance Data Breach Data Protection Information Security

It's 2013. Do You Know Where Your BYOD Policies Are?

Imagine you grab your phone only to find it locked, with all of your applications, pictures, and contacts permanently deleted. Imagine your employer's IT department remote-wiped your phone because they mistakenly believed it...more

5/7/2013 - Bring Your Own Device Cybersecurity Data Protection Security and Privacy Controls

8 Results
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.