General Business Science, Computers & Technology

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

Data Breaches: Are You Ready (for the inevitable)?

In 2015, identity theft occurred every two seconds, disrupting the lives of 13.1 million people, according to Javelin Strategy and Research. Year after year, U.S. data breaches have hit record highs, reports the Identity...more

The SEC, CCOs and Compliance Programs

Compliance programs, Chief Compliance Officers and liability have been the subject of a great deal of debate in recent months. Members of the Commission, for example, debated charging decisions regarding CCOs last year in...more

Recommendations for Evaluating Your Organization’s Use of Social Media

The majority of organizations utilize social media to market their products and services, interact with consumers, and manage their brand identity. Many mobile applications and websites even permit users to sign-in with their...more

Swimming with the “Fintechs”– an insight into the future of Financial Technology Companies

Imagine applying for a mortgage or commercial loan on Amazon or shopping for a checking account via an App on your Iphone. As many in the financial services industry may already know, there are a new brand of startups known...more

German Court orders WhatsApp to provide consumers in Germany with T&Cs in German language

In a press release dated 17 May 2016, the Federation of German Consumer Organizations (Verbraucherzentrale Bundesverband – vzbv) announced that on 8 April 2016, the Court of Appeal Berlin (Kammergericht Berlin; “Court”)...more

Think you’re covered? Think again

Commercial General Liability policies (CGL) typically do not include data protection loss coverage, although some insurers offer additional data protection endorsements. Normally those additional endorsements only cover data...more

Most Frequently Hacked Industries Now Includes Manufacturing

Second only to health care, the manufacturing industry is now one of the most frequently hacked industries (according to IBM’s 2016 Cyber Security Intelligence Index). And more importantly, automotive manufacturing was the...more

Breaking News: Texas Comptroller Publishes Retroactive Rule Targeting IT, Pharmaceutical Retailers; Clock Running on Comment...

On May 20, 2016, the Texas Comptroller of Public Accounts published proposed amendments to 34 Tex. Admin. Code 3.584 – relating to the reduced rate available under the Texas Franchise Tax for retailers and wholesalers – in...more

Laurie & Monica Out-Action Jack…and Other Fiduciary Duties (Silicon Valley – Episode 22)

Episode 22 provides a decisive and satisfying showdown between Jack’s Box plan and Richard’s consumer platform option. Richard’s not-so-secret skunkworks project is dead, and the team sets to work on the Box believing that...more

Privacy Best Practices for Commercial and Private Drone Use Adopted in NTIA Process

Consensus was reached in a proceeding of the National Telecommunications and Information Administration (NTIA) of the U.S. Department of Commerce on a set of privacy best practices for the commercial and recreational use of...more

Presentation Recap: Car Wars

“A [not so] long time ago in an automotive industry [not] far, far away,” John Murphy, Research Analyst for Merrill Lynch delivered his popular annual “Car Wars” presentation in Detroit on May 10th. This was the 26th year of...more

What Start-Ups, Tech Companies and Marketers Need to Know About the New Overtime Rules

You may have heard about new overtime rules from the Department of Labor. It’s not all about bathroom laws. Michael Kelsheimer, author of the Employer Handbook, broke down the new rules in Federal Changes to Overtime...more

Finance Committee Report Places Medical Device Arrangements under Increasing Scrutiny

Hospitals and providers participating in physician-owned distributorships, or “PODs” may be at increased risk for government investigation or enforcement. A Senate Finance Committee (SFC) Report issued this month highlights...more

Is That a Carrot or a Stick in Your Hand? The Third Circuit Examines the Line Between Competition and Coercion in De Facto...

We recently wrote about attempts to force exclusivity onto customers. But firms with large or dominant market shares often must walk a fine line between properly offering customers percentage-based discounts and improperly...more

Your Next IPO Could Be on the Blockchain

Delaware’s corporate law blockchain initiative includes a new class of “distributed ledger shares” and promises to lower transactional costs, speed up and automate manual processes, and reduce fraud. The public and...more

A lighter touch — Final FAR rule issued on safeguarding contractor information systems

On Monday, May 16, 2016, the FAR Council is expected to issue its long- awaited final FAR rule ("the Final Rule") on safeguarding contractor information systems. This rule, effective immediately, creates a new contract...more

False Claims Act Trends: Technical Data, Software And IP

Government contracting has never been easy. But occasionally it is exciting, at least at the outset: Figuring out how to prepare the most competitive proposal and landing a significant contract are memorable achievements...more

"Big Data Enters the Agenda of EU Antitrust Authorities"

On May 10, 2016, the French Competition Authority and German Federal Cartel Office published “Competition Law and Data,” a joint report on big data and its implications for competition law. The paper identifies issues that...more

Cyber Security

Roughly one million pieces of malware—computer viruses or malicious software—are released every day. In recent years, we’ve witnessed an unprecedented level of activity in the cyber arena, both in the form of increased...more

How to Evaluate a Credit Monitoring Service

Organizations are not, generally, required to offer services to consumers whose information was involved in a breach. Nonetheless, many organizations choose to offer credit reports (i.e., a list of the open credit accounts...more

Rethinking the “Standard” Arbitration Clause in Cloud Agreements

Twenty or so years ago, arbitration began to gain wide acceptance among lawyers as a viable alternative for the effective resolution of civil disputes. Clients were beginning to view “alternative dispute resolution” (ADR) as...more

5 Ways to Defend Against Ransomware

Last week, Fish hosted a cybersecurity panel session at our L.E.A.D. retreat in Dallas. We discussed the need for a full-spectrum cybersecurity risk assessment and plan, and during the course of the presentation, we touched...more

Reworked EU-U.S. Privacy Shield Still Undergoing Growing Pains

When the European Union’s highest court issued its October 2015 ruling striking down the U.S.-EU Safe Harbor framework, shock waves rippled on both sides of the Atlantic. For thousands of U.S. companies handling the...more

Final Government Contractor Basic Data Security Rule Issued

On May 16, 2016, the Federal Acquisition Regulations (“FAR”) Council published the final FAR rule on Basic Safeguarding of Contractor Information Systems. The rule is intended to prescribe “the most basic level” of...more

Tennessee Enacts Changes to Data Breach Statute

Businesses in the State of Tennessee should take note of several significant changes to Tennessee's data breach statute that take effect for data breaches occurring on or after July 1, 2016. Currently, Tennessee Code...more

5,050 Results
|
View per page
Page: of 202

Follow General Business Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×