Private Equity's Inversion Excursion: Pepper Hamilton Talks Tax With the Deal
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
Warning Signs that Signal You Might be Terminated from Your Job
How is Graphene Currently Used and What is the Hope for the Future?
A Conversation with Tim Gardner on Asia Restructirungs
What is Graphene? Fenwick Patent Attorney Has the Answer
A Conversation with Lindsay Chu on Asia Restructurings
Two Tips for Inventors Filing Patent Applications
The M&A Word of the Day® from the Book of Jargon® Is Naked No Vote
The M&A Word of the Day® from the Book of Jargon® – Global Mergers & Acquisitions Is Fiduciary Out
FCPA Compliance and Ethics Report-Episode 68-Neil Swidey, author of Trapped Under the Sea
A Conversation with Rajiv Gupta on Asia Restructurings
The M&A Word of the Day® from the Book of Jargon® – Global Mergers & Acquisitions Is No Poach
Bennett Jones Spring 2014 Economic Outlook
A Conversation with Ben Simpfendorfer on Asia Restructurings
The M&A Word of the Day® from the Book of Jargon® – Global Mergers & Acquisitions Is Revlon Doctrine
Polsinelli Podcasts - Be Careful What you Put in Writing - What Companies Need to Know About Document Retention
The M&A Word of the Day® from the Book of Jargon® – Global Mergers & Acquisitions Is Squeeze Out
A Conversation with David Heller on Asia Restructurings
The M&A Word of the Day® from the Book of Jargon® – Global Mergers & Acquisitions Is Take Private
In this LEVICK Daily video interview, LEVICK Senior Vice President Jason Maloni discusses the key forensic and communications challenges that accompany instances of data loss and...more
Preserving company E-mail that may be relevant in litigation is important for every business. Failure to do so can open a company to liability for breaching the duty to preserve evidence.
Sending a notice to employees who...more
In a prior column, we discussed the inevitability of technology-related accidents occurring at virtually every company. One particularly common mishap is the loss of customer, client or employee data. These data breaches may...more
This article explains to in-house corporate counsels the risks, benefits, and issues to investigate regarding cloud storage of data....more
Congress has been struggling with cyber security issues for several years, most recently in connection with the Cybersecurity Act of 2012 (CSA2012).
CSA2012 is an attempt to protect the nation’s critical infrastructure...more
Part Three in a multi-part series on the topic.
In Part One of this series, we discussed California’s Electronic Discovery Act. Part Two discussed the importance in legal proceedings of electronic information from social...more
In part one of this series, we discussed the issues of security, interoperability and vendor lock-in issues in cloud computing contracts. In this installment, we will discuss the five issues of regulatory compliance,...more
"Reproduced with permission from Law Business Research. This article was first published in Getting the Deal Through - e-Commerce 2013 (published in July 2012; contributing editor:
Robert Bond of Speechly Bircham LLP)....more
Companies are on social media. They are interacting and connecting with customers through Facebook, Twitter and blogs. In a 2010 study, numbers on the conservative side show that 65% of Fortune Global 100 companies have...more
During litigation, nothing is sacred, and no stone will remained unturned in the hunt for responsive data — and that includes social media data. With social media here to stay — and growing in popularity every day — the...more
The ambulance company that fired a worker after she criticized her supervisor and employer on Facebook has settled a complaint issued by the National Labor Relations Board (NLRB). Under the accord, which was announced this...more
cyber attacks on corporates have become common either by competitors or state sponsored actors of foriegn state, Security to organisations and legal compliance has become important...more
Find a Business Organization Author »
Back to Top