Marketing to Millennials
Top Three Cybersecurity Misconceptions
Technology in Healthcare
The Intersection of Cyber and D&O Coverage
Compiling Successful IP Solutions for Software Developers
Regan Miller, RPLU on Cyber Risk
BakerHostetler's Tanya Forsheit Discusses Cloud Computing
Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
In recent headlines, the Office of Personnel Management (“OPM”) has begun notifying millions of federal employees that it may have lost their personal information earlier this month in a data breach.
The data breach...more
Love that fitness app you downloaded to your smartphone? Like the idea of having an Apple Watch, Fitbit or some other mobile device helping you stay in shape?
There’s certainly nothing wrong with any of these devices...more
First came the Industrial Revolution. Then the Internet Revolution. And today we have made a firm step into the dawn of a third revolution called the ‘‘Internet of Things’’ or ‘‘IoT.’’ Or at least this is how IoT’s arrival...more
For American companies doing business abroad, it is time—past time, in fact—to consider how and where you are storing your data. If you answered “in the cloud,” you need to do some probing, stat. ...more
Epiq Systems Inc. recently announced that it has acquired Iris Data Services for $134 million. Epiq, which provides a range of services to the legal industry including data breach response, bankruptcy and class action and...more
The Middle District of Tennessee recently issued a key decision in the ongoing Genesco, Inc. v. Visa U.S.A., Inc. data breach litigation. The court denied discovery requests by Visa for analyses, reports, and communications...more
As the number of high profile data breaches increase, there is mounting pressure on Congress to create a more unified regulatory standard governing company actions in response to a data breach. ...more
On March 24, 2015 France’s Data Protection Authority (CNIL) issued a press release announcing the simplification of its data transfer policy. The new requirement will now allow companies to transfer data outside of the EU...more
On Tuesday 7 April 2015, a single Federal Court Judge ordered six internet service providers (ISPs) to hand over the names and identities corresponding to approximately 4,700 unique IP addresses, which have allegedly...more
Did you know that your car has a recording device that records the speed, direction, and location of your vehicle while you are driving it, as well as your steering, braking, seat belt use and erratic driver behavior?...more
As we discussed in our previous post, Premera Blue Cross (Premera) recently revealed that it suffered a massive data breach potentially exposing the personal data of 11 million customers. ...more
5 Reasons Employers Should Prohibit Employees From Using Personal Email Accounts - Recently, a political firestorm has erupted as news stories revealed that Former Secretary of State (and likely Presidential Candidate)...more
“There are only two types of companies left in the United States … those that have been hacked and those that don’t know they’ve been hacked.” That is how U.S. District Judge John E. Jones III of the Middle District of...more
The Federal Communications Commission’s (“FCC”) net neutrality proceeding culminated this month with the release of an Order reclassifying broadband Internet access service as a common carrier Telecommunications Service...more
Data security breaches have become unfortunately prevalent amongst higher education institutions. In fact, colleges and universities suffer data breaches at a rate of just over one per week.(1) The Privacy Rights...more
On March 11, 2015 the Italian Data Protection Authority (Garante per la protezione dei dati personali, the “Italian DPA“) initiated a public consultation on the draft Code of Conduct concerning the processing of personal data...more
Effective information governance is about taking information — your most important business asset — and looking at ways to better leverage it in a manner that streamlines the business processes, and reduces costs and risk....more
The Bill’s provisions on international data transfers are most relevant to foreign companies that do business in Brazil.
The Brazilian government has issued a Bill for the Protection of Personal Data (Bill) for public...more
Under the Electronic Communications Privacy Act of 1986 (“ECPA”), the government can gain access to emails and other electronic communications that are more than 180 days old. This has been termed the “180-day rule,” whereby...more
Altegrity, Inc., who bills itself on its website as “The world’s leading brands in risk solutions, security, ediscovery, data recovery and employment screening,” filed for chapter 11 protection in Delaware on February 8,...more
2014 was another eventful year for e-discovery and information management in Canada. Set out below are some of the major trends and developments that emerged over the last year....more
2014 has been perhaps the biggest year Information Governance (“IG”) has seen. A relatively small and, if not unknown, at least undefined field only a few years ago has grown into an area of interest—and concern—to many...more
As the much-publicized data breaches of the last year reveal, third parties are often the gateway to an organization’s data. As repositories of vast amounts of confidential client data in e-discovery, such as personally...more
From reliable surveys and less dependable anecdotes in most major markets, including the UK and the US, opinions point to the almost inevitable expansion of BYOD – Bring Your Own Device – as a cost-saving model for employers....more
A sometimes overlooked but potentially significant liability exposure for any company that uses the “cloud” to remotely store, process or distribute data is the service provider contract between the company user and its data...more
Find a Science, Computers & Technology Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top