David Johnson

David Johnson

Pillsbury Winthrop Shaw Pittman LLP

Contact  |  View Bio  |  RSS

Latest Publications

Share:

IT Services with Chinese Characteristics

The "Amazon of China" is following Amazon's playbook yet again with their investment in the cloud. Aliyun, Alibaba's technology arm, already operates five Chinese data centers supporting 1.4 million customers. They cite high...more

3/23/2015 - Amazon China Cloud-Based Services Data Centers

BYOD: No Such Thing as a Free Lunch

It seems intuitive that, by and large, employees prefer to use their own mobile devices, carrying only a single device for personal and work purposes, and having choice over the device to be used (please don't take away my...more

9/5/2014 - Bring Your Own Device Cell Phones Mobile Devices Reimbursements

Public Sector Outsourcing: Events and Lessons from 2013

2013 was not a stellar year for public sector outsourcing. As we reported in an earlier blog article, Indiana is appealing judgment in an ongoing court battle with IBM over a troubled welfare claims processing project....more

2/6/2014 - Australia Health and Welfare Plans Healthcare Outsourcing Unemployment Unemployment Benefits

Of Service Levels, Welfare, and Heartbreak: Indiana vs. IBM

In 2006 Indiana awarded IBM a contract for more than $1 billion to modernize Indiana's welfare case management system and manage and process the State of Indiana's applications for food stamps, Medicaid and other welfare...more

5/28/2013 - Breach of Contract Contract Claims Health and Welfare Plans IBM Liquidated Damages

BYOD Trends and Best Practices: Part 3 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 3 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will address developing BYOD trends and best practices. Please check out Part 1 and 2 of this 3-part series addressing employee and employer concerns,...more

5/21/2013 - Bring Your Own Device Cybersecurity Data Protection

Employer BYOD Concerns: Part 2 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 2 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will discuss employer BYOD concerns. Check out Part 1 to learn more about employee interests; Part 3 will present developing trends and suggest best...more

5/14/2013 - Breach Notification Rule Bring Your Own Device Compliance Data Breach Data Protection Information Security

It's 2013. Do You Know Where Your BYOD Policies Are?

Imagine you grab your phone only to find it locked, with all of your applications, pictures, and contacts permanently deleted. Imagine your employer's IT department remote-wiped your phone because they mistakenly believed it...more

5/7/2013 - Bring Your Own Device Cybersecurity Data Protection Security and Privacy Controls

7 Results
|
View per page
Page: of 1

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×