News & Analysis as of

Confidential Information Cloud Computing

TransPerfect Legal

Three Strategies to Prevent Departing Employees from Absconding with Trade Secrets and Other Confidential Business Information

TransPerfect Legal on

One of the biggest threats to modern corporations involves departing employees who take confidential business information (CBI) and/or trade secrets with them prior to or upon their departure. Indeed, the misappropriation of...more

CloudNine

6 Tips for Managing eDiscovery for Access Requests for a State or Local Government Organization

CloudNine on

By Catherine Ostheimer Being responsive to the growing number of Access Requests and DSARS as a local government organization can be daunting. First, there’s the data management challenge. State and local groups generate...more

Foley & Lardner LLP

How Intellectual Property Fits in Cloud Computing and SaaS Business Models

Foley & Lardner LLP on

Various types of intellectual property (IP) can provide companies protection of innovations and maintain or expand competitive advantages. For companies that operate using Software-as-a-Service (SaaS) technologies and/or...more

Foley & Lardner LLP

Lower the Gate – Employers Must Take Steps to Restrict Access to Confidential Information

Foley & Lardner LLP on

With the proliferation of technology and cloud-based computing, employers often struggle to provide employees with the tools to allow access to the information they need to effectively and efficiently do their jobs while...more

The Volkov Law Group

Living in the Cloud: Practical Approaches to Cybersecurity Risks (Part III of III)

The Volkov Law Group on

Businesses are increasingly relying on the cloud to store confidential and sensitive information.  One-third of information technology budgets are used for cloud services.  Rapid growth in cloud storage is expected over the...more

Proskauer - Minding Your Business

A Cloud on the Horizon? Attorneys’ Obligations when Using a Third-Party’s Cloud-Based Services

When we think of clouds, we likely picture cumulus, stratus, and cirrus ones, not the type of “cloud” that holds data and software. The latter type of cloud is generally controlled by a third-party service provider and is...more

Searcy Denney Scarola Barnhart & Shipley

BYOD – Another reasonable basis for discovery about discovery

I still remember typewriters. Heck, I still remember carbon paper, mimeographs and bag phones. Would a company, “back in the day”, have ever asked an employee, “hey, we need you to bring your own typewriter, desk,...more

Katten Muchin Rosenman LLP

Bridging the Week - August 2016

FCM Agrees to Pay US $800,000 Fine to CFTC Because of US $1.1 Million in Erroneous Customer Exchange Fees Charges: Barclays Capital, Inc. agreed to pay a fine of US $800,000 to the Commodity Futures Trading Commission to...more

Foley & Lardner LLP

Three Trending Topics in IoT: Privacy, Security, and Fog Computing

Foley & Lardner LLP on

Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more

Burr & Forman

TN Ethics Opinion Approves Lawyers’ Cloud Storage of Client Data

Burr & Forman on

Tennessee has joined other states in formally approving lawyers’ cloud-storage of client-confidential data. The Board of Professional Responsibility (“BOPR”) held that lawyers ethically may use cloud storage for...more

Seyfarth Shaw LLP

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

Seyfarth Shaw LLP on

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

Robins Kaplan LLP

Trade Secrets, Security, and Cloud Computing: Best Practices Now

Robins Kaplan LLP on

As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more

Adams and Reese LLP

ISO’s Cloud Privacy Standard: A Guide for Lawyers’ “Reasonable Efforts” to Protect Client Information

Adams and Reese LLP on

Rule 1.1 of the Model Rules of Professional Conduct requires that all lawyers provide “competent representation to a client.” In August 2012, the ABA added new language to Model Rule 1.1, comment 8: To maintain the...more

Eversheds Sutherland (US) LLP

Ethical Issues Implicated by Lawyers’ Use of Third-Party Cloud Services

Law firms increasingly turn to “cloud services” for processing and storing confidential client information because of their greater flexibility and efficiency. Use of “the cloud,” however, outsources the administration,...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide