Information Technology

News & Analysis as of

Indonesia publishes data protection rule aimed at government agencies

On 14 July 2015, the Indonesian government published the Draft Regulation of the Minister of Communication and Information (RPM) of the Protection of Personal Data in Electronic Systems (‘Draft Regulation’). Pursuant to...more

Coding Errors Lead To SEC Sanctions for High-Frequency Trading Firm

Mistakes in computer coding by a high frequency trading firm that went undetected for approximately four years were responsible for approximately 12.6 million orders that violated Reg NMS, according to an Order settling an...more

"OFAC and BIS Further Ease Cuba Restrictions"

On September 21, 2015, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) and the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) amended their respective Cuba regulations to...more

Medicaid at 50: The Program’s Evolution and Future

Born as an afterthought to Medicare five decades ago, Medicaid has evolved from an adjunct to state welfare programs to the nation’s largest health insurer. The occasion of Medicaid’s 50th birthday is a fitting time to...more

Companies: Five Steps to Protecting Trade Secrets

If your management team knows it needs to better protect company trade secrets but isn’t sure where to start, take note. and PwC have put together a five-step framework to guide companies on how to identify, assess...more

Employees: Your Role in Keeping Trade Secrets ‘Secret’

As an employee, do you know what you should be doing to protect your company’s critical business information and trade secrets? It’s likely that in your employment contract you agreed not to disclose confidential corporate...more

Great E-Discovery Teams Include These 5 Roles

If I could give one piece of advice regarding e-discovery processes, cultivate a cross-functional team among Legal, IT e-Discovery and IT Forensics. These relationships are critical to your success and will ultimately make up...more

Who is Stealing Your Trade Secrets? An Overview of Key Threats

Every company has trade secrets – for some, they may be special manufacturing processes, for other organizations, trade secrets could include product formulae, customer lists, software code or marketing strategies. The more...more

EPA's NPDES Electronic Reporting Rule: A Step Toward A Next Generation Compliance Strategy

The final rule strives to take advantage of information technology, allowing resources to be used more efficiently and effectively, and giving the EPA, states and the public better access to key data. Implementation will...more

5 Tips for Quickly Identifying Responsive Data Sources for E-Discovery Collections

Working with IT or your service provider to collect/process from a variety of data sources, like email archives, file shares, legacy backup tapes, SharePoint, etc., can be a painful and complicated ordeal. You don’t...more

Two Reasons Why You Should Take Your Lit Support Manager to Lunch!

When we think about the people who are involved in the task of identifying, assessing, collecting, reviewing and producing data (we’ll call this “data management”), there’s someone from Legal, someone from IT who has an...more

HR Tech: Compliance Pointers

Yesterday, TalentCulture hosted a #tchat entitled “Why Compliance is A Complex HR Necessity.” Every participant in the chat agreed that compliance is difficult and no fun. Laws constantly change, and just when one issue...more

As Autumn Looms, Low-Hanging Fruit in IT Procurement May Tempt Baker

The Office of the Massachusetts Attorney General is investigating the failure of the Governor Patrick administration and its chosen information technology contractor to adapt the state’s health exchange to the complex...more

Cybersecurity for Medical Devices: A Risk Mitigation Checklist for In-House Counsel

Just this summer, a cybersecurity firm issued a report widely cited in the media detailing cases where unnamed hospitals were allegedly hit by data breaches after medical devices (identified only generically as a blood gas...more

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

Optimize Your E-Discovery Process Now to Save Time & Money

It’s no secret that IT and legal speak different languages. But, legal and IT must work hand-in-glove during e-discovery. Clear communication between IT and legal can go a long way to bridging e-discovery gaps and optimizing...more

Think Big Picture – minimize corporate export compliance risks while protecting your information security

Recently I have attended several cyber security conferences. What I have learned about protecting information has changed how I view export controls. Senior management and board members should think about the big picture as...more

Security Frameworks 101: Which is Right for my Organization?

These days information security is on the minds of virtually all technology professionals and business executives alike. But how does an organization ensure that their security profile is adequate. It can certainly help to...more

DoD's New Cybersecurity and Cloud Standards and Reporting Requirements

The Department of Defense (DoD) released interim rules implementing provisions of the 2013 and 2015 National Defense Authorization Acts. The rules, released on Aug. 26, 2015, are effective immediately and establish the...more

A Primer on Russia’s New Data Localization Law

Privacy and data security professionals worldwide should circle September 1 on their calendars, as it’s the day Russia’s new data localization law goes into effect – and possibly generates major waves far beyond Russian...more

Farewell to Chocolate Thunder, Baylor Football and Due Diligence

Daryl Dawkins died yesterday. To anyone who followed the National Basketball League (NBA); Dawkins will always be remembered with the brilliant Stevie Wonder-derived moniker – Chocolate Thunder. I will also remember him for...more

NIST Publishes Cybersecurity Standards Objectives

The National Institute of Standards and Technology has published a draft of its objectives for cybersecurity standardization, following in many ways the consultative model that it used successfully in drafting the NIST...more

German Federal IT Committee Issues New Restrictions for Cloud Service Providers

Last month the German Federal Government IT Advisory Committee ("Federal IT Committee") issued new cloud computing service criteria for all prospective vendors to German Federal Agencies. Cloud services providers who offer,...more

NIST Guide Highlights Cybersecurity Considerations for Utilities and Manufacturing Companies

In 2013 alone, the U.S. Department of Homeland Security (DHS) and its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to more than 256 cyber-incident reports—more than half of them in the energy...more

4 Phases of an Effective Implementation and Change Management Plan: Expert Advice When Changing to a New Compliance Service...

Thinking of making the move over to a new compliance service provider can seem like a tedious project to tackle. However, compliance organizations are tasked to find innovative ways to track and manage compliance...more

85 Results
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.