General Business Business Organization Science, Computers & Technology

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

Tax Review - August 2015

We are proud to present the next edition of our “Tax Review” which contains a selection of rulings and interpretations that had been issued or published in July 2015. We hope you will find the information provided here...more

World’s Largest Succinic Acid Plant Opened In Canada

On August 6, 2015, BioAmber Inc. and Mitsui & Co., Ltd announced the opening of their joint succinic acid plant in Sarnia, Ontario. This joint venture cost approximately $141.5 million to build and has a capacity of 30,000...more

I Paid For It, So I Own It, Right? Well…

You’ve formed your company, and you’ve qualified to do business (if you haven’t, see last week’s blog). But more than that, you’ve engaged a third-party web designer (not your employee) to create a web site for you....more

Healthcare & Life Sciences Private Equity Deal Tracker: Metacrine Secures $36 Million in Financing

Metacrine, based in San Diego, Calif., is a biotechnology company focused on advancing research in nuclear hormone receptors for treatment of metabolic diseases originated at the Salk Institute for Biological Studies....more

It’s a Bird, It’s a Plane! No, It’s a … Drone? Lawyers at Forefront of UAS

From the military to movies, we are all at least a little familiar with Unmanned Aircraft Systems (UAS or “drones”). But with FAA’s recent streamlining of its commercial UAS exemption process, did you know that it probably...more

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

RadioShack’s Consumer Data: A Highly Scrutinized Asset

Following the Texas Attorney General’s objection to the sale of RadioShack Corporation’s consumer data as an asset in its bankruptcy, 37 other state attorneys general and a large number of other consumer protection entities...more

Cyber Security - Risk Management and Mitigation

In This Issue: - Agenda - Current Threat Environment - Current Threat Environment - Strategic Importance - Asian Data Privacy Regimes At-A-Glance - Data Protection: Regional temp - Asia-Pacific...more

Board Games (Silicon Valley, Episode 16)

Episode 16 culminates with a disastrous end to the Intersite bake-off, and highlights an issue that’s cropped up in several episodes: troublesome or under-performing board members. To recap, Pied Piper is competing against...more

Reverse Engineering Cloud-Based Software

Let’s say you provide web-based software in a SaaS subscription model. What if your reseller or strategic business partner works against you to redesign and reverse engineer your software so they can launch a competing...more

Protecting Directors and Officers From Derivative Liability Arising From Data Breaches

With data breaches affecting companies across virtually every industry, cyber security has remained front page news. Lawsuits brought by aggrieved consumers and financial institutions against companies that have suffered data...more

Bitcoin Basics for Corporate Counsel

Bitcoin, the online “cryptocurrency,” is not just for anti-government doomsday fanatics and drug dealers. Seen everywhere from SEC filings, to state legislature hearings, to an episode of The Good Wife, it is both an...more

Blue Pill/Red Pill: How Officers and Board Members Can Swallow the Red Pill and See the Real World of Cybersecurity

Trying to understand how a hacker thinks can twist your brain around – while you normally think about how to make something work or why something is not working, hackers think how to get something to work in ways that it is...more

OECD Discussion Draft on Cost Contribution Arrangements vs. US tax rules on Cost Sharing Arrangements: key comparisons

The OECD has released a Discussion Draft on Cost Contribution Arrangements (CCAs) as part of its ongoing activities related to eliminating Base Erosion and Profit Shifting (BEPS) by multinational enterprises. This...more

The DOJ’s New Cyber Security Best Practices — Creating a Standard of Care?

On April 29, 2015, the U.S. Department of Justice Computer Crime and Intellectual Property Section (“DOJ”) issued version 1.0 of its “Best Practices for Victim Response and Reporting of Cyber Incidents.” It draws on “lessons...more

VC’s running scared – Hooli is suing Pied Piper (Episodes 9 and 10) continued

Last post I mused that had Richard taken certain steps in the first season of Silicon Valley, he might now have ammunition to use against Hooli’s lawsuit. What am I talking about? To very crudely recap what happened last...more

[Webinar] Compliance Agility: Managing Privacy in a Dynamic Environment - June 9, 1:00-2:00 pm Eastern

Privacy risk, legislation, and regulation is growing at an exponential rate. Organizations – themselves in constant states of change – are struggling to keep up and fearful because a single organizational change, be it...more

Contracting with foreign entities and electronic signature under English Law: Getting the execution right

You've managed to agree the deal; all that's left is to sign the documents. That's the easy bit, correct? So you might think, but it is important to be careful not to slip up at this final stage, particularly when contracting...more

Bridging the Week - May 2015 #2

Two Traders Subject of CME Summary Suspension for Alleged Spoofing Sued by CFTC Too - Last week, the Commodity Futures Trading Commission commenced a lawsuit in federal court in New York against Heet Khara and Nasim...more

Economic Impact from a Company’s Data Breach – No Big Deal? Not So Fast!

Recent data breaches have prompted worries about economic damage to the infiltrated companies. Analyses in fact show minimal effects on stock prices or revenues of the hacked companies. But that may be only temporary comfort...more

Orrick Technology IPO Insights - Q1 2015

Welcome to the Q1 2015 issue of Orrick Technology IPO Insights, a quarterly publication highlighting trends in U.S. information technology company IPOs. We isolate technology companies in order to analyze and present...more

Taking Control of Cybersecurity: A Practical Guide for Officers and Directors

Major cybersecurity attacks of increased sophistication — and calculated to maximize the reputational and financial damage caused to the corporate targets — are now commonplace. These attacks have catapulted cybersecurity to...more

Miami: The Next Global Frontier

Miami’s second annual eMerge Americas Conference marks another milestone in the city cementing itself as a hub for tech startups and entrepreneurs. In the last 18 months, Miami has established and cemented many of the key...more

SEC Updates Guidance on Cybersecurity

Emphasizing the critical importance of cybersecurity to registered investment companies (RICs), including insurance separate accounts and business development companies, and to investment advisers, the SEC’s Division of...more

Addressing Cybersecurity Oversight in Audit Committee Charters

Cybersecurity continues to emerge as a key risk that is attracting the attention of regulators and boards of directors. Companies take different approaches regarding how the board fulfills its oversight duty with respect to...more

161 Results
|
View per page
Page: of 7

Follow General Business Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×