Information-sharing legislation is coming: Senator Chambliss shares 4 top points for companies
FCPA Compliance and Ethics Report-Episode 190-Interview with Vivian Carpenter, author of The Fifth Letter
Front Line Interview Episode 1. Alison Taylor: Organizations, Compliance & Corruption
FCPA Compliance and Ethics Report-Episode 189-Compliance Evangelist
The Social Engineering Cyber Exposure
Taking A Proactive Approach to Cyber Security
An FCPA Journey to the Darkside & Steps to Protect Your Organization
What is a hostile work environment?
CorpCast Episode 8: The Controlling Stockholder
From Behind the Bribe: The Sharp End of Compliance
Strong Market Outlook Drives Growth of Philippine Companies
Why do we have to go to mediation?
FCPA Compliance and Ethics Report-Episode 178-Ben Locwin on Risk Assessments
Do I need an expert witness in my case?
Marketing to Millennials
CorpCast Episode 7: Better Know a Judge: the Honorable Mary M. Johnston of the Delaware Superior Court
Top Three Cybersecurity Misconceptions
Preparing a Company to Deal With Activist Investors
How can someone prepare for the first meeting with an attorney?
CorpCast Episode 6: A Brief Introduction to the Delaware Rapid Arbitration Act
All this week, we are featuring a series “Cyber Risks – Director Liability and Potential Gaps in D&O Coverage”
Part 2 of 5: Why Directors Should Be Concerned...more
To read the full 2014 Class Action Survey report, please visit ClassActionSurvey.com.
Fifty-two percent of major companies are currently engaged in class action litigation. This percentage has remained fairly consistent...more
Cyber security is top of mind for companies, and cyber-security oversight is top of mind for corporate directors. I recently co-moderated a panel discussion for directors on board oversight of cyber security and...more
With the rise of BaaS (or Backend as a service) platforms, it is easier than ever to create a mobile app on the fly. But Fenwick privacy co-chair Tyler Newby advises that companies should be aware of some important privacy...more
With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more
Cybersecurity may be the SEC’s newest area for enforcement actions. While the SEC first released Disclosure Guidance concerning cybersecurity in 2011, the recent media attention surrounding significant cybersecurity breaches...more
In this case, a corporate successor, Central Trust Investment Company (hereafter also "Central Trust") sued the former employee (Kennedy) of its acquired company, Springfield Trust & Investment Company (hereafter also "STC"),...more
Your company has been sued – what do you need to consider to comply with data preservation requirements? How do you address litigation holds, ediscovery and data retention? Robert Brownstone, litigation attorney and chair of...more
It’s no surprise that people trust online reviews from consumers more than traditional advertisements. After all, advertisements are created by the company selling a product of service, whereas third party reviews are by...more
California legislators have been active passing several employment law bills that impact local businesses in recent months. Here’s a recap of some with brief summaries. Legal counsel should be sought for a complete...more
California takes citizen privacy rights seriously.
That’s the unmistakable message communicated by a recent announcement that the Office of the Attorney General of California is creating a Privacy Enforcement and...more
The European perspective on managing cyber risk is valuable for US companies operating internationally and also as risk management guidance when operating in the US.
Recently, an arm of the UK Government Communication...more
The CAN-SPAM act sets legal rules for commercial E-Mail and includes various provisions that apply to “any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial...more
Google’s business model is based on delivering relevant search results and, increasingly, relevant ads to those who use its products. In order to do so, Google needs to know a user’s search history since search history and...more
A non-disclosure agreement (NDA) is an agreement between (at least) two parties, where one is the provider of the information that is to be protected and another is the receiver of the information. The non-disclosure...more
Assuring cybersecurity has become a necessity for businesses across all industries. According to an FBI study in March 2009, cybercrime...more
Find a Business Organization Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top