Latest Publications

Share:

Women in PE to Know: Farrah Holder

The interview below is part of an ongoing effort by McGuireWoods to profile women leaders in private equity (PE). To recommend a woman for a future interview, email Amber Walsh at awalsh@mcguirewoods.com....more

Tech Investing Part III: Investing in AI

Investing in artificial intelligence (AI) companies has become a riskier and more involved process than in previous years. Companies need new processes and tools to follow the more stringent AI regulations that are on the...more

Tech Investing Part II: Purchase Price Adjustments

Buyers, sellers, their counsel and other advisers sometimes give short shrift to post-closing adjustment provisions in M&A deals; however, it’s important to make sure that language and calculation methods are clear and don’t...more

Tech Investing Part 1: Zero Hour

The technology sector runs the gamut from artificial intelligence (AI), the Internet of Things (IoT) to SaaS companies or cybersecurity, and from the biggest household names to the smallest companies being operated out of...more

The Evolving World of AI

Artificial intelligence (AI) refers to the ability of a computer or a computer-enabled robotic system to process information and produce outcomes in a manner similar to the thought processes of humans in learning, decision...more

Women in PE to Know: Priya Parrish

The interview below is part of an ongoing effort by McGuireWoods to profile women leaders in private equity (PE). To recommend a woman for a future interview, email Amber Walsh at awalsh@mcguirewoods.com....more

Venture Capital Coast to Coast – April 2020

VC WATCH - VC Is Built for a Crisis - Like most law, accounting and consulting firms, in March McGuireWoods was occupied advising clients on their response to COVID-19, in addition to closing investment deals and...more

Family Office Venture Capital Bets: Balancing Risk, Returns and Relationships

Throughout 2019, single-family office (SFO) direct private equity investment has surged, and McGuireWoods has shared some SFO best practices around deal sourcing, vetting, due diligence and co-investing. (See recent...more

The IOT is Here and so is the Regulation

For years, we have waited with bated breath the arrival of the “Internet of Things” (IoT) to transform garages into smart factories, cars into autonomous vehicles and ordinary homes into smart homes completely controllable by...more

Venture Capital Coast to Coast - February 2019

VC WATCH - Early 2019 Continues 2018 Record Pace - January 2019 saw the highest January venture capital (VC) investment in healthcare and life sciences startups on record since Pitchbook began tracking funding in 2008....more

Three More Risks to Consider with SaaS Solutions

As previously discussed, software as a service (SaaS) solutions offer the allure of being able to outsource IT for data storage. Being able to rely on someone else to protect you sounds great, but is it really? Losing...more

12/19/2018  /  Cybersecurity , Data Protection , SaaS , Vendors

State and Federal Power Struggle Over Data Privacy and Security

U.S. Senate leaders may be close to reaching an agreement on a legislative proposal that would establish a national data breach notification and security standard (the Data Acquisition and Technology Accountability and...more

Cyberattacks—Are You Ready?

Recent cyber-attacks hurt individuals and investors on a regular basis. Recent attacks have cost hundreds of millions of dollars. Firms that have dismissed the dangers are increasingly at risk of regulatory action. New...more

Three Major Security Issues to Consider with SaaS and Cloud Solutions

Small and medium-sized businesses are turning to software as a service (SaaS) solutions for their IT needs more and more frequently. SaaS solutions can provide end-users with quicker, cheaper access to software that they...more

SEC’s IT Security Under Attack as It Attacks Others

The inspector general (IG) of the U.S. Securities and Exchange Commission (SEC) reported last week that the SEC has not sufficiently implemented information technology security upgrades in order to protect highly sensitive...more

What’s on the Cybersecurity Horizon for 2016?

The last twelve months saw many high-profile and innovative cyber-threats, costly and embarrassing breaches, and several cybersecurity trends. Many executives and boards have been reactive rather than proactive, catalyzing...more

Board Participation in Cybersecurity: What More Needs to Be Done?

High-profile data breaches seem to hit the headlines almost every day. These breaches have proved terrifying for many companies, particularly as the attackers release embarrassing emails and other information. The frequency...more

A Classy Affair: Class Action Lawyers Race to Courthouse in Wake of Ashley Madison Data Breach

Illicit affairs have always imposed risks – from marital discord and divorce to boiling bunnies and Maury appearances. However, when old-school adultery met new-school technology on the Ashley Madison infidelity website,...more

UK’s First Ever Right To Be Forgotten Enforcement : Google In The Firing Line Again

The UK’s Information Commissioner’s Office (ICO) has made what appears to be its first “right to be forgotten” enforcement action against Google Inc. The ICO issued the notice on 18 August 2015, ordering Google to remove nine...more

Neiman Marcus Seeks En Banc Review of Seventh Circuit’s Watershed Data Breach Class-Action Decision

Does a data breach of a retailer’s payment-card information automatically confer Article III standing on affected customers? Is the mere possibility that some criminal element may use pilfered information to commit future...more

Target and Visa Announce $67 Million Settlement

Last winter, following a well-publicized data breach, a group of financial institutions sued Target, arguing that Target should be held responsible for the damages that they had experienced as a result of the data breach...more

Credit Card Fraud Liability Shift Looms for Retail Industry

On October 1, 2015, a substantial portion of the liability associated with in-store fraudulent credit card purchases will shift from credit card issuers, such as banks or credit unions, to retail merchants. Credit card...more

Facial Recognition and Privacy

Based upon the way modern computers are designed, there are certain tasks they are much better at performing than humans. It wouldn’t be pedantic to point the fact that’s the purpose of a computer in the first place: to do...more

Rhode Island Governor Signs Comprehensive Identity Theft Protection Act

On June 26, Rhode Island Governor Gina Raimondo (D) signed into law Senate Bill 0134, the Rhode Island Identity Theft Protection Act of 2015 (the Act), which clarifies data security measures, expands protection to health data...more

Newly Enacted Statute Restricts Virginia Employers’ Access to Employees’ Social Media Accounts

On July 1, 2015, a new law, Virginia Code Section 40.1-28.7:5 went into effect that prohibits Virginia employers from requiring current or prospective employees: (1) to disclose their social media account usernames and/or...more

47 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide