Information Technology

News & Analysis as of

Creating a Consistent E-Discovery Preservation Hold Process

Exterro was founded with the simple vision that applying the concepts of process optimization and data science to the way companies respond to litigation would drive more successful outcomes at a lower cost. The process part...more

NYDFS Report Foreshadows New Cyber Security Regulations

The New York State Department of Financial Services (NYDFS) has released a report entitled "Update on Cyber Security in the Banking Sector: Third Party Service Providers." The report details the findings of an October, 2014...more

Cybersecurity: Where Does the Buck Stop?

Over the last few months, we’ve been talking about cybersecurity issues for employers. We’ve discussed the responsibilities and risks associated with personally identifiable information and the wave of lawsuits resulting...more

German Parliament's IT-Security Act Covers Critical Infrastructure

On June 12, 2015, the German Parliament (Deutscher Bundestag) passed an Act to Improve the Security of Information Technology Systems ("IT-Security Act"). The new legislation requires operators of so-called critical...more

MoFo Global Procurement Quarterly: Spring 2015

In This Issue: - Right to Modify? - International Brands May Trigger Cross-Border Interest in EU Tenders - Q&A with James Koukios - GSA Data Reporting - International IT Companies Face Continuing...more

Technology in Healthcare [Video]

From the 2015 PLUS Medical PL Symposium session “Technology in Healthcare: EHRs & PHI,” moderator Patricia Marzella-Graubert (Swiss Re American Holdings Corporation) and panelist Alexander Grijalva (New York Presbyterian...more

How to Keep What is Yours: Practical Considerations for Healthcare IT Protection

One of the worst kept secrets is the experienced and expected growth in healthcare IT. In 2013, over $650 million was invested into healthcare IT companies, and the trend is continuing to grow. Combined with the fact that...more

CareFirst Suffers Cyberattack, Data Breach of 1.1 Million Customers’ Information

BREAKING NEWS: Health insurer CareFirst BlueCross BlueShield disclosed today that hackers gained access to one of its databases, exposing personally identifiable information for approximately 1.1 million people....more

Congress Talks Encryption

The Information Technology Subcommittee of the Committee on Government Oversight and Reform of the US of House of Representatives last Wednesday held a hearing on encryption technology and potential US policy responses....more

Information Governance and the Converging Roles of the GC & CIO

Even more than e-discovery, information governance (IG) requires a systematic and strategic relationship between a company's IT and legal departments. This collaboration starts from the top, with the CIO and GC serving as two...more

How Oil and Gas Companies can Optimize Technology Performance and Costs During Oil Price Volatility

An unexpected surge in production coupled with weakened global demand has resulted in a 50 percent drop in the price of crude oil since June 2014 and currently averaging US$50 a barrel. The Organization of the Petroleum...more

A Technical Audit Checklist for Lawyers

It’s important for lawyers to have a road map for accomplishing their SEO goals. A technical audit is essentially an inventory of common website elements that should be optimized both on and off a website. Lawyers can use...more

Employment Law Update: Tech Support - The FLSA’s Specialized Exemption

The Fair Labor Standards Act (FLSA) provides several exemptions from overtime requirements for employees whose job duties meet specific tests. Most employers are familiar with the standard “white- collar” exemptions –...more

BELGIUM: Belgian government’s new focus on privacy and technology laws

Almost five months after federal parliamentary elections took place, the negotiators from the four political parties around the negotiating table (Flemish parties NVA, CD&V and Open VLD and Walloon party MR) reached a...more

Doing Business in Canada

This Guide provides non-Canadians with an introduction to the laws and regulations that affect the conduct of business in Canada and, in particular, in the province of Ontario. In some cases, this Guide also identifies issues...more

HIPAA Violation Results in $4.8 Million Settlement: An IT Perspective

In today’s healthcare industry, information technology (“IT”) systems play an ever-expanding role in the success of a medical practice. Medical practitioners consistently juggle e-billing and electronic medical records...more

House committee questions authority of a DHHS staff division to regulate health IT

Is the Office of the National Coordinator for Health Information Technology (ONC) overstepping its statutory authority in pursuing enhanced regulatory activity? A June 3, 2014 letter from the House Committee on Energy and...more

FDA seeking comments on Health IT report

Exchange of information in an electronic environment (health IT) has provided and continues to provide opportunities to improve the quality, safety, cost and efficiency of health care and encourage patient involvement. ...more

North Carolina Legislative Report - May 2014

The General Assembly’s Short Session will begin next week, Wednesday, May 14, 2014. The MVA Public Affairs Legislative Report on North Carolina will be distributed weekly to keep you up to date on the latest legislative...more

Plugging the Leak: Guidelines for a Data Breach Response Plan

Though data breaches have been on the forefront of many large company’s risk management efforts for a number of years, it has become clear that the threat of a data breach is very real and touches on every business,...more

Effectively Delivering It Services In The Retail Sector

With media sources reporting that online retail is continuing to increase and more people engaging with retail and fashion in a multi-channel way (e.g., via mobiles and tablets), we are seeing even greater business scrutiny...more

Recent Developments In Information Technology Law – First Quarter 2014

U.S. SUPREME COURT - Patents - As reported at 87 BNA’s PTCJ 332, on December 6, 2013, the Supreme Court grants a petition for writ of certiorari in a case challenging software method and system patent...more

Governance & Securities Law Focus: Europe Edition, April 2014

In this issue: - EU Developments - German Developments - UK Developments - Us Developments - Excerpt from EU Developments - European Commission Proposes to Introduce Shareholder "Say...more

Legal Advisor Newsletter - First Quarter 2014

In this issue: - Are You Ready for the Cybersecurity Boom? - Size Appeal of Mali, Inc., SBA No. SIZ-5506 (2013) - Be A Resolved Employer in 2014 - 2014: Year of the WOSB - Excerpt from...more

24 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×