CorpCast Episode 7: Better Know a Judge: the Honorable Mary M. Johnston of the Delaware Superior Court
Top Three Cybersecurity Misconceptions
Preparing a Company to Deal With Activist Investors
How can someone prepare for the first meeting with an attorney?
CorpCast Episode 6: A Brief Introduction to the Delaware Rapid Arbitration Act
The Intersection of Cyber and D&O Coverage
Talking PTAB with Bob Steinberg
Is Private/Non-Profit D&O Coverage Under Priced?
CorpCast Episode 5: The eDiscovery Big Picture
BakerHostetler Attorneys James Mastracchio and Jay Nanavati Discuss Global Tax Enforcement
Richard Bistrong Weighs in on the FIFA Scandal and Takedowns
Meritas Capability Webinar - Avoiding Common Mistakes Companies Make When Operating a Business Aircraft
FCPA Compliance and Ethics Report-Episode 161-Gini Dietrich on how to create a MasterClass
What is the Current State of Anti-Bribery Compliance & Enforcement in Australia?
Halliburton: Good for the Plaintiffs’ Bar?
Debt Financing Trends – Joe Price, Member, Corporate & Securities Practice
Venture Capital Trends: East Meets West – Lewis Geffen, Co-chair, Venture Capital Practice
Can an employer require drug testing in the workplace?
Paths to Dispute Resolution
Performance Based Equity Compensation
Employees are reasonable in assuming that their employer is protecting their personal information from compromise. The obvious way to do that is to maintain appropriate encryption technology. Simply put: encryption,...more
ICYMI a recap of recent well-read posts on JD Supra at the intersection of mobile apps and the law....more
Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more
Although the inherent nature of cybersecurity radiates urgency, businesses should not let this characteristic dictate the vendor selection process....more
Video vigilantes are on the rise, and their recordings can quickly go viral. What should employers do to prepare for, handle and prevent covert recordings made in the workplace?
Just a few short years ago HR and...more
Human error was the number one cause of data security incidents according to a new report released today by the Privacy and Data Protection Team at BakerHostetler. In the incidents that the firm worked on last year, employee...more
Having strong cybersecurity policies is critical for protecting a company's business, as the amount of commerce conducted over networks and the Internet increases each year. Last month the Congressional Research Service...more
The stakes are getting higher regarding cybersecurity. However, there are several steps organizations can take to protect against cybersecurity data breaches. Further, taking these steps can protect companies in the context...more
Effective information governance is about taking information — your most important business asset — and looking at ways to better leverage it in a manner that streamlines the business processes, and reduces costs and risk....more
Now that entities are aware that at least 1.2 billion records have been compromised from websites spanning across all industries, a question arises whether entities have an obligation to investigate whether their websites...more
Before taking any action on this latest data breach news out of Russia, there are a number of things to understand....more
A breach of this nature is reportable under the breach notification laws in both California and Florida, as recently amended: “Personal Information” includes user name or email address, in combination with a password or...more
Canadian registered charities seeking to comply with Canada’s new anti-spam law (CASL) recently received some disappointing news. CASL is a very complex law and many important issues remain ambiguous and uncertain. Several...more
A recap of most popular writings on the recent European Court Ruling that Google must allow citizens the right to be forgotten....more
Part of JD Supra's series on innovation and the law. The NLRB has famously struck down employers’ social media policies based on a law that was adopted during the New Deal and has not been amended since....more
Threats to data privacy are not going away, but establishing appropriate security measures up-front, performing regular stress-tests on a security system, putting in place procedures to address a data breach and implementing...more
The vulnerability caused by the Heartbleed bug circumvents the purpose of OpenSSL: encryption. Therefore, the conclusion would appear to be that any data breach during the time of OpenSSL vulnerability would be reportable...more
Bennett Jones launches Canadian Anti-Spam Information Site
TORONTO, January 22, 2014 – In response to the long-awaited regulations pertaining to the Canadian government's anti-spam legislation, Bill C-28, Bennett Jones LLP...more
A detailed social media policy specifically addressing the ownership of social media accounts is key to a corporation’s ability to maintain ownership of an employee’s account after the employee leaves the corporation....more
In March 2012, the Obama Administration announced its Big Data Research and Development Initiative. The program involves a total of over $200 million in new commitments from several departments and agencies to improve the...more
Life is full of anxieties. We all know that. Some suffer worse anxieties than others. As I often say, anxiety comes and goes. Anxiety cannot be measured but is something that everyone experiences on their own terms....more
The message–that’s what I’m talking about–who’s gonna get the message sent to them first?
Data breaches, hacking, and privacy are one of the biggest news stories since 2011 and there is no sign that will be changing...more
Cyber-attacks against U.S. companies have been skyrocketing in recent years, with 2011 seeing an increase of nearly 44 percent according to the National Security Agency. While many businesses have implemented and continue to...more
application. The case highlights the evolution of publicity rights in the face of social media.
Publicity rights have been protected since the advent of the Hollywood celebrity in the second half of the 20th century. In...more
Find a Business Organization Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top