Health + Tech - How Digital Health Tools Help Create Greater Consumer Focus in Healthcare
Cyber Threats
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Moving Energy Forward: Future Voices Of The Industry
Sitting with the C-Suite: Servient – What’s Next
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
IP | Trend: Data in the Cloud is the Next Big Storm?
At Intersection of Cloud Storage/Transfer & Instant Messaging, Instacom’s a Unique Tool
“The Cloud” No Longer a Hot Topic Because It’s Common Knowledge at This Point
The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more
On August 16, 2022, CISA (the Cybersecurity and Infrastructure Security Agency) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) issued an Alert outlining multiple Common Vulnerabilities and Exposures...more
For a whole decade, ACI’s U.S. Export & Reexport Compliance for Canadian Operations conference continues to stand apart as the only practical, comprehensive event of its kind for the export compliance community in Canada. ...more
Jury Can Decide Bad Faith Intent for Rule 37 Sanctions - In a slip and fall case, Carnival was found to have failed to take reasonable steps to preserve CCTV video. Judge Goodman noted the fact that its 30(b)(6)...more
In a recently developing story, on June 20, 2018, automaker and renewable energy giant Tesla filed suit against its now former employee Martin Tripp in the U.S. District Court for the District of Nevada. ...more
Microsoft scored an important victory when the Second Circuit ruled that the government is not authorized to issue warrants for customer data stored overseas. In re Warrant to Search a Certain E-mail Account Controlled &...more
Last week, the Sixth Circuit expanded potential liability for violations of the Federal Wiretap Act for manufacturers of devices that can be used for wiretapping, like monitoring software, in reversing the dismissal of a...more
We all know that “cloud computing” is one of the most tired and overused phrases in the technology industry, and it has been for years. Everyone has gone “to the cloud” now, right? Not so fast. When it comes to cloud-based...more
In a case that may have significant impact for companies providing public Internet and cloud services, the Second Circuit has ruled that a federal court may not issue a criminal warrant ordering a U.S. company to produce...more
On Thursday, October 8, 2015, California Governor Jerry Brown signed into law the Electronic Communications Privacy Act (the “California ECPA”). This legislation, which takes effect on January 1, 2015, has been heralded by...more
Law enforcement requests for electronic information, particularly from technology companies such as Google and Twitter, have skyrocketed in recent years. In response, several states—Maine and Texas in 2013, Utah in 2014 and...more
Thousands of U.S. and European companies who rely on the EU–US Safe Harbor Framework to permit the transfer of personal data from the EU to the U.S., have come a step closer to seeing the transfer mechanism struck down....more
The U.S. Second Circuit Court of Appeals scheduled oral argument for September 9, 2015 on Microsoft’s appeal of a district court opinion upholding the validity of the U.S. government’s search warrant for customer data stored...more