What is a hostile work environment?
CorpCast Episode 8: The Controlling Stockholder
From Behind the Bribe: The Sharp End of Compliance
Strong Market Outlook Drives Growth of Philippine Companies
Why do we have to go to mediation?
FCPA Compliance and Ethics Report-Episode 178-Ben Locwin on Risk Assessments
Do I need an expert witness in my case?
Marketing to Millennials
CorpCast Episode 7: Better Know a Judge: the Honorable Mary M. Johnston of the Delaware Superior Court
Top Three Cybersecurity Misconceptions
Preparing a Company to Deal With Activist Investors
How can someone prepare for the first meeting with an attorney?
CorpCast Episode 6: A Brief Introduction to the Delaware Rapid Arbitration Act
The Intersection of Cyber and D&O Coverage
Talking PTAB with Bob Steinberg
Is Private/Non-Profit D&O Coverage Under Priced?
CorpCast Episode 5: The eDiscovery Big Picture
BakerHostetler Attorneys James Mastracchio and Jay Nanavati Discuss Global Tax Enforcement
Richard Bistrong Weighs in on the FIFA Scandal and Takedowns
Meritas Capability Webinar - Avoiding Common Mistakes Companies Make When Operating a Business Aircraft
From latest data breach laws to cyber liability insurance to the FTC's consumer data safety guidance ... a recap of popular cybersecurity reads on JD Supra during the second half of July 2015....more
For decades, companies trying to cooperate with the government have hoped for a change in the general rule that disclosing privileged communications and/or work product to the government waives those protections. In nearly...more
Nevada and Connecticut recently enacted amendments to breach notification and data security requirements that are relatively unique among existing state laws, thus imposing new compliance obligations upon companies doing...more
It has taken a while for companies to realize the value of digital assets, and it is also taking a while for companies to digest the significance of digital risks. In the digital economy, virtually all aspects of business...more
It's no secret that data breach is becoming more and more common as sophisticated hackers penetrate corporate and governmental networks at what seems to be a breakneck pace. No business or institution with an internet...more
Until last week, an Italian cybersecurity company known as “Hacking Team” was reputed to be an elite provider of sophisticated spyware and hacking tools to numerous governments, police agencies and intelligence services. But...more
Last month the country learned about the unauthorized access of the Houston Astros “Ground Control” database, which contained trade talks, proprietary statistics, and scouting reports, by members of the St. Louis Cardinals...more
The Federal Trade Commission (FTC) has released a guide for businesses with practical tips and advice to help organizations better secure their data. The guide, Start With Security, draws on more than 50 data security...more
1. Solvency II - Insurance Code Amended -
Legislative Decree No. 74 of 12 May 2015 was published in the Official Gazette on 15 June 2015, which has made all necessary amendments to the Insurance Code in order to...more
On June 30, 2015, the Federal Financial Institutions Examination Council (“FFIEC”), an interagency body that prescribes principles and standards for the federal examination of financial institutions, released a Cybersecurity...more
The Federal Financial Institutions Examination Council (FFIEC) has released its long-awaited Cybersecurity Assessment Tool (Assessment) to help financial institutions identify the inherent risks faced by a company and...more
The title, of course, begs the question: does your business even have an Information Governance Program? If not, you should get one—quick.
An integrated Information Governance Program is considered a “best practice” to...more
Last year we gathered Robert Chersi, Executive Director, Center for Global Governance, Reporting and Regulation at Pace University; Seth Rice, Assistant General Counsel – Compliance & Director of Global Ethics and Compliance...more
Cyber risk is now firmly at the top of the international agenda as high-profile breaches raise fears that hack attacks and other security failures could endanger the global economy.
The Global Risks 2015 report,...more
In what appears to be yet another brazen demonstration of capability following an earlier hijack of government social media sites, a group calling itself the Syrian Electronic Army (SEA) recently hacked into the U.S. Army’s...more
Internet Advertising and Marketing Summer Newsletter from Ifrah Law with updates you won't want to miss!...more
As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more
Following the Texas Attorney General’s objection to the sale of RadioShack Corporation’s consumer data as an asset in its bankruptcy, 37 other state attorneys general and a large number of other consumer protection entities...more
Over the past few years, users have become increasingly aware of the inherent dangers of connecting to unsecured Wi-Fi networks. Unfortunately, existing security vulnerabilities in the underlying network hardware may still...more
In This Issue:
- Current Threat Environment
- Current Threat Environment - Strategic Importance
- Asian Data Privacy Regimes At-A-Glance
- Data Protection: Regional temp
Over the last few months, we’ve been talking about cybersecurity issues for employers. We’ve discussed the responsibilities and risks associated with personally identifiable information and the wave of lawsuits resulting...more
Employees are reasonable in assuming that their employer is protecting their personal information from compromise. The obvious way to do that is to maintain appropriate encryption technology. Simply put: encryption,...more
In February, the New York Times published an 8,000-word investigation into wealthy foreigners buying New York City real estate and taking advantage of U.S. laws that allow them to set up shell companies in order to obscure...more
Health care startups are expected to attract billions in venture capital in the next few years. Despite the pace and excitement this surge of investment creates, these next-wave digital disruptors need to keep three legal...more
Do your employees understand the importance of intellectual property (IP) to your company and steps that they should be taking to protect it? Do they recognize that exposing proprietary information, such as product...more
Find a Business Organization Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top