Health + Tech - How Digital Health Tools Help Create Greater Consumer Focus in Healthcare
Cyber Threats
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Moving Energy Forward: Future Voices Of The Industry
Sitting with the C-Suite: Servient – What’s Next
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
IP | Trend: Data in the Cloud is the Next Big Storm?
At Intersection of Cloud Storage/Transfer & Instant Messaging, Instacom’s a Unique Tool
“The Cloud” No Longer a Hot Topic Because It’s Common Knowledge at This Point
A mix of surging Covid cases, the renewed restrictions and shutdowns they’ve prompted, and the unlikelihood of more virus stimulus any time soon sent stocks sharply down to start the week, with the S&P 500 charting its...more
Not shockingly, the White House’s recent insistence on keeping tariffs in place on China (to ensure deal compliance) is proving to be a major stumbling block in negotiations on a grand trade deal between the US and China....more
Once again, it’s Jobs Report Friday. Here’s some things to keep in mind as you review the numbers...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
The White House has chosen Columbia University economist Richard Clarida as Fed Vice Chair—the number 2 spot at the central bank. Clarida is a “monetary policy scholar” and former Bush II administration Treasury official....more
Several companies cast an eye toward the Internet of Things, Twitter’s AI gets pretty good at live video, some industry giants get behind the driverless car, and more … Samsung launches a place in the cloud just for...more
Late last week, Uber announced it had reached a settlement with California and Massachusetts drivers over their classification as independent contractors. The settlement calls for drivers to remain independent contractors,...more
In this newsletter, we highlight how strategic acquisition and investment can best be leveraged for organizational growth. We also discuss a recent example in the case of IBM's purchase of live streaming service Ustream, and...more
Last year, entrepreneurs, companies and courts grappled with questions over content owners’ rights with respect to livestreaming, Yelp reviewers’ anonymity expectations, bankruptcy creditors’ access to business’ Facebook and...more
Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more
Earlier this month, privacy and security professionals from around the globe gathered for “Privacy. Security. Risk. 2015”—the second joint conference between the International Association of Privacy Professionals and the...more
1. CJEU finds Safe Harbor Invalid - In a landmark ruling delivered today, Europe's highest court, the Court of Justice of the European Union (CJEU) declared that the EU Commission's US - EU Safe Harbour regime is...more
The Court of Justice of the European Union (ECJ) has now declared Safe Harbor invalid – in total. The ECJ has sent the case back to the Irish Data Protection Authority to determine whether Facebook Ireland’s transfer of...more
Last week, The New York Times reported that men “feel entitled to take time off for family” too. The subject of the article was Josh Levs, a former CNN reporter who wanted more time off when his third child was born...more
Litigator’s Toolbox: PowerPoint or… There is no denying that, along with a good trial presentation database, PowerPoint is an integral part of the litigator’s toolbox. PowerPoint is the claw hammer that drives your point...more
I continue my exploration of the use of social media in doing compliance by taking a look at a very innovative social media solution to a difficult compliance issue around, of all things, honey. This example shows how...more
In This Issue: - Good Rep: Social Media Assets in M&A Transactions - Narrow Vision: Did Anti-Glass Hysteria Contribute to the Demise of Google Glass? - Forced to Cyber-Spy: Court Rules Parents Can Be Held...more
In This Issue: - What’s in a Like? - R.I.P.: The Facebook “Like” Gate - Facebook Dislikes Fake Likes - Privacy in the Cloud: A Legal Framework for Moving Personal Data to the Cloud - Click...more
As one who presumably has no nude selfies, you may not be too concerned about a “hack” like the one that continues to afflict celebrities like Jennifer Lawrence and Kate Upton. But that doesn’t mean there aren’t still plenty...more
There has been so much news swirling in the data privacy and security world in the last few days, that it has been difficult to keep up. We’ll give you a roundup here....more
On April 10, 2014, Kentucky Governor Steve Beshear signed H.B. 232 into law, making Kentucky the 47th state to enact data breach notification legislation. Prior to H.B. 232, Kentucky was one of only four states—including...more