Information Technology

News & Analysis as of

A Framework for Discovery Automation: eDiscovery Trends

Automation has been a recurring theme this year on this blog. At the beginning of the year, I declared that the age of eDiscovery automation is upon us. I’ve also spoken about discovery automation on numerous occasions,...more

Investment Funds Update - Europe: Legal and regulatory updates for the funds industry from the key asset management centres and...

Central Bank Issues "Dear Chairman" Letter Regarding Directors' Time Commitments for Each Sub Fund - The Central Bank of Ireland issued a “Dear Chairman” letter on 8 September 2016, concerning its review of the number of...more

NIST Extends Deadline for Comments to Mobile Device Infrastructure Guidance

All enterprises are struggling with the security risks posed by the use of mobile devices by employees. Companies want their employees to have easy access to information so that they can perform their job functions in an...more

FFIEC IT Security Booklet Revised

On September 9, 2016 the Federal Financial Institution Examination Council (FFIEC) updated its Information Security Booklet (available here). In addition to certain editorial non-substantive changes, the modifications...more

IT Workers Lose Class Certification Battle

Perhaps no field of class action litigation in California is more fraught with complex certification issues than determining whether the administrative exemption applies to network, internet, and database administrators or...more

No Longer a Mirage: FCPA Compliance and Cooperation Has Its Benefits

On September 12, 2016, the SEC announced that it had reached a settlement with Jun Ping Zhang (“Ping”), a former executive of a Chinese subsidiary of Harris Corporation (“Harris”), regarding alleged violations of the Foreign...more

The Ping FCPA Enforcement Action: Lessons for the Compliance Practitioner

The Securities and Exchange Commission (SEC) settled a Foreign Corrupt Practices Act (FCPA) enforcement action against an individual earlier this month when it announced the resolution of a matter involving Jun Ping Zhang,...more

Claim For Fraudulent Wire Transfer Under Commercial Crime Policy Found to be Covered, Although Denial Not In Bad Faith

Principle Solutions Group, LLC, an information technology company, lost $1.717 million when it became the victim of a fraud scheme for which it sought coverage under the terms of a commercial crime policy issued by Ironshore...more

N.Y. Moves Ahead with Proposed Cybersecurity Regulations for Financial Institutions

The New York Department of Financial Services (NYDFS) will require all institutions subject to NYDFS supervision to establish and maintain a cybersecurity program meeting "certain regulatory minimum standards." All financial...more

Napoleonic E-Discovery: Legal Project Management is the Key to Efficient, Cost-Effective Operations

In the Information Age, Napoleon’s maxim doesn’t seem all that ground breaking, and yet, in many industries, managers still approach whatever challenges lie ahead by simply throwing resources and personnel at the problem. In...more

Survey Of Federal Government IT Personnel Finds Big Data Analytics Enhances Cybersecurity; Challenges Persist

On August 29, 2016, MeriTalk, a public-private partnership that works on government Information Technology (“IT”) issues, released a report titled “Navigating the Cybersecurity Equation.” The report examines how federal...more

IT and Legal Walk into a Bar: Why Strong Interdepartmental Relationships are a Must in E-Discovery

The E in E-Discovery requires expertise in tech as well as law, and the most successful in-house legal teams bring those disciplines together. Legal professionals become more technology savvy. IT team members begin to...more

The Goal of Gender Equality in Cybersecurity

I have the privilege of teaching the Privacy Law class at Roger Williams University School of Law (RWU). It is a required course for the school’s Joint Masters in Cybersecurity/Juris Doctor program, which is, to my knowledge,...more

OCR Plans to More Widely Investigate HIPAA Breaches Affecting Fewer than 500 Individuals

This month the HHS Office for Civil Rights (OCR) has launched an initiative “to more widely investigate the root causes” of HIPAA breaches affecting fewer than 500 individuals, according to an August 18, 2016 OCR email...more

Fourth Circuit Decision Reminds Employers That Overbroad Noncompete Agreements May Not Be Enforceable

If your company operates in a territory covered by the 4th circuit (Maryland, Virginia, West Virginia, North Carolina, and South Carolina) and requires employees to sign a noncompete agreement with language similar to the...more

Texas Comptroller’s Office Holds Roundtable on Proposed Regulation Targeting IT, Pharmaceutical Industries

On August 4, 2016, representatives of the Texas Comptroller of Public Accounts held a limited-invite roundtable to discuss the proposed amendments to 34 Tex. Admin. Code 3.584, relating to the reduced rate available under the...more

Three Tips to Verify the Security of Your E-Discovery Software

SOC 2® Type 2 Certification and Zapproved–Building Trust and Confidence that Your Data is Secure - Today in e-discovery, it should be no surprise that cyber security is a rising concern among corporate leaders and that...more

Elevating the role of the in-house counsel

Premise: The role of in-house counsel has evolved and status has been elevated. Expectations have been raised by the C-Suite. The department must be managed like other business units, with adherence to budget, performance...more

Integration of Technology Into Health Care Delivery

The integration of technology into health care delivery is exploding throughout the health industry landscape. Commentators speculating on the implications of the information revolution’s penetration of the health care...more

New Legal Startups Are Changing the Practice of Law

Corporate Counsel recently reported on the dramatic growth of legal startups over the last two years — increasing from 412 to 1,104 today. This showed the increase in innovation targeting legal technology. While it’s valuable...more

Hackers using cyber weapons to attack IT systems

A depressing new report by security firm LightCyber opines that hackers are using cyber weapons to evade detection when deploying attacks to IT systems rather than malware. In fact, the report says that cybercriminals are...more

Considerations for Your Company’s Website Accessibility Policy

We previously discussed the uncertainty concerning whether the Americans with Disabilities Act (ADA) applies to websites of private businesses and, if so, the specific requirements that would apply. We noted that even if...more

3 Takeaways (a Litigator’s Perspective) from CFPB Supervisory Highlights

The CFPB recently issued its newest edition of Supervisory Highlights Mortgage Serving Special Edition, Issue 11 (June 2016). From a litigator’s perspective, the Supervisory Highlights do more than summarize recent...more

House Homeland Security Committee Holds Hearing On 2015 Cybersecurity Act

On June 15, 2016, the House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies held a hearing to examine industry perspectives on the implementation of the Cybersecurity Act...more

Five on Friday – Five Recent Developments that We’ve Been Watching Closely: June 2016 #2

It’s Friday and time for another overview of developments in the field of business and human rights that we’ve been monitoring. This week’s post includes: a new guide for business lawyers from the International Bar...more

171 Results
View per page
Page: of 7
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.