Science, Computers & Technology General Business Business Organization

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

RadioShack’s Consumer Data: A Highly Scrutinized Asset

Following the Texas Attorney General’s objection to the sale of RadioShack Corporation’s consumer data as an asset in its bankruptcy, 37 other state attorneys general and a large number of other consumer protection entities...more

Cyber Security - Risk Management and Mitigation

In This Issue: - Agenda - Current Threat Environment - Current Threat Environment - Strategic Importance - Asian Data Privacy Regimes At-A-Glance - Data Protection: Regional temp - Asia-Pacific...more

Board Games (Silicon Valley, Episode 16)

Episode 16 culminates with a disastrous end to the Intersite bake-off, and highlights an issue that’s cropped up in several episodes: troublesome or under-performing board members. To recap, Pied Piper is competing against...more

Reverse Engineering Cloud-Based Software

Let’s say you provide web-based software in a SaaS subscription model. What if your reseller or strategic business partner works against you to redesign and reverse engineer your software so they can launch a competing...more

Protecting Directors and Officers From Derivative Liability Arising From Data Breaches

With data breaches affecting companies across virtually every industry, cyber security has remained front page news. Lawsuits brought by aggrieved consumers and financial institutions against companies that have suffered data...more

Bitcoin Basics for Corporate Counsel

Bitcoin, the online “cryptocurrency,” is not just for anti-government doomsday fanatics and drug dealers. Seen everywhere from SEC filings, to state legislature hearings, to an episode of The Good Wife, it is both an...more

Blue Pill/Red Pill: How Officers and Board Members Can Swallow the Red Pill and See the Real World of Cybersecurity

Trying to understand how a hacker thinks can twist your brain around – while you normally think about how to make something work or why something is not working, hackers think how to get something to work in ways that it is...more

OECD Discussion Draft on Cost Contribution Arrangements vs. US tax rules on Cost Sharing Arrangements: key comparisons

The OECD has released a Discussion Draft on Cost Contribution Arrangements (CCAs) as part of its ongoing activities related to eliminating Base Erosion and Profit Shifting (BEPS) by multinational enterprises. This...more

The DOJ’s New Cyber Security Best Practices — Creating a Standard of Care?

On April 29, 2015, the U.S. Department of Justice Computer Crime and Intellectual Property Section (“DOJ”) issued version 1.0 of its “Best Practices for Victim Response and Reporting of Cyber Incidents.” It draws on “lessons...more

VC’s running scared – Hooli is suing Pied Piper (Episodes 9 and 10) continued

Last post I mused that had Richard taken certain steps in the first season of Silicon Valley, he might now have ammunition to use against Hooli’s lawsuit. What am I talking about? To very crudely recap what happened last...more

[Webinar] Compliance Agility: Managing Privacy in a Dynamic Environment - June 9, 1:00-2:00 pm Eastern

Privacy risk, legislation, and regulation is growing at an exponential rate. Organizations – themselves in constant states of change – are struggling to keep up and fearful because a single organizational change, be it...more

Contracting with foreign entities and electronic signature under English Law: Getting the execution right

You've managed to agree the deal; all that's left is to sign the documents. That's the easy bit, correct? So you might think, but it is important to be careful not to slip up at this final stage, particularly when contracting...more

Bridging the Week - May 2015 #2

Two Traders Subject of CME Summary Suspension for Alleged Spoofing Sued by CFTC Too - Last week, the Commodity Futures Trading Commission commenced a lawsuit in federal court in New York against Heet Khara and Nasim...more

Economic Impact from a Company’s Data Breach – No Big Deal? Not So Fast!

Recent data breaches have prompted worries about economic damage to the infiltrated companies. Analyses in fact show minimal effects on stock prices or revenues of the hacked companies. But that may be only temporary comfort...more

Orrick Technology IPO Insights - Q1 2015

Welcome to the Q1 2015 issue of Orrick Technology IPO Insights, a quarterly publication highlighting trends in U.S. information technology company IPOs. We isolate technology companies in order to analyze and present...more

Taking Control of Cybersecurity: A Practical Guide for Officers and Directors

Major cybersecurity attacks of increased sophistication — and calculated to maximize the reputational and financial damage caused to the corporate targets — are now commonplace. These attacks have catapulted cybersecurity to...more

Miami: The Next Global Frontier

Miami’s second annual eMerge Americas Conference marks another milestone in the city cementing itself as a hub for tech startups and entrepreneurs. In the last 18 months, Miami has established and cemented many of the key...more

SEC Updates Guidance on Cybersecurity

Emphasizing the critical importance of cybersecurity to registered investment companies (RICs), including insurance separate accounts and business development companies, and to investment advisers, the SEC’s Division of...more

Addressing Cybersecurity Oversight in Audit Committee Charters

Cybersecurity continues to emerge as a key risk that is attracting the attention of regulators and boards of directors. Companies take different approaches regarding how the board fulfills its oversight duty with respect to...more

Planning for Breach Notification Requirements in Your Customer Contracts

At the San Francisco “Exchange” Data Privacy and Cyber Security Forum on April 26, a spirited debate arose whether a federal breach notification law will/should be enacted to bring uniformity to the patchwork of breach...more

DMCA vs. Gearheads: Piracy Under the Shade Tree

A recent Wired magazine article by Kyle Wiens (co-founder and CEO of iFixit) provided an ominous warning to automobile owners: you don’t own your vehicle, you merely operate it at the manufacturer’s pleasure. This view of...more

Structure your start-up for fundraising success - Part Two: Organize your corporate records

If you’ve determined that your new venture is going to require outside investment, there are a number of things you can do to make your company more attractive to investors....more

NAIC Update – Spring 2015

The National Association of Insurance Commissioners (NAIC) held its first national meeting for 2015 in Phoenix, Arizona, from March 26 through March 31. Noteworthy new initiatives include cybersecurity, price optimization and...more

SEC Rules Expand Access to Capital via Larger Private Offerings (Regulation A+)

On March 25, 2015, the Securities and Exchange Commission (“SEC”) issued new rules that will enable private companies to raise as much as $50 million in a 12-month period through private offerings of securities exempt from...more

156 Results
|
View per page
Page: of 7

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×