Corcoran: Infighting on Compensation Costs BigLaw Time and Money
Conducting Corporate Internal Investigations
Zimmermann: "Two Class" Partnership Culture Emerging in BigLaw
Appel: Corporate Inversions Could Mean Big Tax Bills For Shareholders
Hedge Funds Word of the Day™ – Accelerated Share Repurchase
Data Privacy: The Next Frontier of Corporate Compliance
Planning For The Exit – What’s Your Exit Strategy?
Hedge Funds Word of the Day™ – CFTC
What are the Implications of Alice v. CLS?
What Questions CEOs and Board Members Should Be Asking Themselves About Tax Inversions
Hedge Funds Word of the Day™ – Derivative
Legal Considerations for Web-Based Start-Ups
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Hedge funds word of the day™ – Big Boy Letter
How Leading Philippine Companies are Using Bonds to Their Advantage
Hedge Funds Word of the Day™ – 10b5-1 Plan
Private Equity's Inversion Excursion: Pepper Hamilton Talks Tax With the Deal
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
Warning Signs that Signal You Might be Terminated from Your Job
How is Graphene Currently Used and What is the Hope for the Future?
Now that entities are aware that at least 1.2 billion records have been compromised from websites spanning across all industries, a question arises whether entities have an obligation to investigate whether their websites...more
Before taking any action on this latest data breach news out of Russia, there are a number of things to understand....more
A breach of this nature is reportable under the breach notification laws in both California and Florida, as recently amended: “Personal Information” includes user name or email address, in combination with a password or...more
Canadian registered charities seeking to comply with Canada’s new anti-spam law (CASL) recently received some disappointing news. CASL is a very complex law and many important issues remain ambiguous and uncertain. Several...more
A recap of most popular writings on the recent European Court Ruling that Google must allow citizens the right to be forgotten....more
Part of JD Supra's series on innovation and the law. The NLRB has famously struck down employers’ social media policies based on a law that was adopted during the New Deal and has not been amended since....more
Threats to data privacy are not going away, but establishing appropriate security measures up-front, performing regular stress-tests on a security system, putting in place procedures to address a data breach and implementing...more
The vulnerability caused by the Heartbleed bug circumvents the purpose of OpenSSL: encryption. Therefore, the conclusion would appear to be that any data breach during the time of OpenSSL vulnerability would be reportable...more
Bennett Jones launches Canadian Anti-Spam Information Site
TORONTO, January 22, 2014 – In response to the long-awaited regulations pertaining to the Canadian government's anti-spam legislation, Bill C-28, Bennett Jones LLP...more
A detailed social media policy specifically addressing the ownership of social media accounts is key to a corporation’s ability to maintain ownership of an employee’s account after the employee leaves the corporation....more
In March 2012, the Obama Administration announced its Big Data Research and Development Initiative. The program involves a total of over $200 million in new commitments from several departments and agencies to improve the...more
Life is full of anxieties. We all know that. Some suffer worse anxieties than others. As I often say, anxiety comes and goes. Anxiety cannot be measured but is something that everyone experiences on their own terms....more
The message–that’s what I’m talking about–who’s gonna get the message sent to them first?
Data breaches, hacking, and privacy are one of the biggest news stories since 2011 and there is no sign that will be changing...more
Cyber-attacks against U.S. companies have been skyrocketing in recent years, with 2011 seeing an increase of nearly 44 percent according to the National Security Agency. While many businesses have implemented and continue to...more
application. The case highlights the evolution of publicity rights in the face of social media.
Publicity rights have been protected since the advent of the Hollywood celebrity in the second half of the 20th century. In...more
The Federal Trade Commission (“FTC”) announced the release of revised “Green Guides” on October 1, 2012. The Green Guides are intended to help marketers avoid making misleading environmental claims.
The Green Guides are...more
Infographic: The Growing Impact of Social Media
Social media sites are transforming not only the daily lives of consumers, but also how companies interact with consumers. As with the Internet boom during the mid-to-late...more
The European perspective on managing cyber risk is valuable for US companies operating internationally and also as risk management guidance when operating in the US.
Recently, an arm of the UK Government Communication...more
The CAN-SPAM act sets legal rules for commercial E-Mail and includes various provisions that apply to “any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial...more
California takes citizen privacy rights seriously.
That’s the unmistakable message communicated by a recent announcement that the Office of the Attorney General of California is creating a Privacy Enforcement and...more
This week, Apple shareholders requested that its Board of Directors publish a report explaining how the board oversees privacy and data security risks. The proposal was prompted by concern that recent issues such as the...more
This article explains to in-house corporate counsels the risks, benefits, and issues to investigate regarding cloud storage of data....more
Google’s business model is based on delivering relevant search results and, increasingly, relevant ads to those who use its products. In order to do so, Google needs to know a user’s search history since search history and...more
Find a Business Organization Author »
Back to Top