Health + Tech - How Digital Health Tools Help Create Greater Consumer Focus in Healthcare
Cyber Threats
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Moving Energy Forward: Future Voices Of The Industry
Sitting with the C-Suite: Servient – What’s Next
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
IP | Trend: Data in the Cloud is the Next Big Storm?
At Intersection of Cloud Storage/Transfer & Instant Messaging, Instacom’s a Unique Tool
“The Cloud” No Longer a Hot Topic Because It’s Common Knowledge at This Point
Previous editions of Re:Torts (It’s (Still) Important Enough to Get It Right; Opioid Public Nuisance Question) have covered decisions that addressed whether various states permit public nuisance claims in connection with the...more
Sending a shot across the bow of the gig economy, New Jersey is seeking nearly $650 million from Uber for “years of unpaid employment taxes for its drivers, arguing that the ride-hailing company has misclassified the workers...more
Part 1: Electronic Commerce - This is the first part of a two-part article discussing the regulatory landscape for financial technology as applied to electronic commerce and electronic banking. This article focuses on...more
Once again, it’s Jobs Report Friday. Here’s some things to keep in mind as you review the numbers...more
A recent issue of MIT’s Technology Review magazine is titled, “Look how far precision medicine has come.“ At least part of the premise is that personalized medicine or precision medicine is not perceived as having made the...more
Two of the largest U.S. banks – Bank of America (“BofA”) and Wells Fargo – were sued for patent infringement by Wapp Tech Limited Partnership and Wapp Tech Corp. in the Eastern District of Texas in July 2018. ...more
Over the years USAA has aggressively asserted its patent portfolio related to check depositing. Specifically, USAA holds itself out as an innovator in the research and development of allowing banking customers to deposit...more
Navigating the crossroads of security and convenience is a balancing act, but it can be done. Two minutes. That’s all it takes to perform a Google search on yourself—or anyone you choose—and obtain a virtual encyclopedia...more
Few issues keep executives awake at night more than Privacy and Data Security. New regulations and threats alike are plentiful, varied, and evolving. The rate of change for cybersecurity and information governance continues...more
According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more
Digital currencies like Bitcoin seem tailor made for social peer-to-peer payment applications. Transactions denominated in or convertible to digital currency could be withdrawn and transmitted by users at virtually no...more
Delaware’s New Privacy Policy Requirements - Effective January 1, 2016, Delaware became the second state in the U.S., joining California, to require operators of commercial websites that collect personally...more
Intel and Sony give us an idea of the future of virtual reality; Google goes shopping in the cloud; the FBI warns consumers about car hacking; the Internet of Thing’s language problem; and more…...more
More than twelve years after the promulgation in 2003 of the Catalogue of Telecommunications Services; the “2003 Catalogue”) China’s Ministry of Industry and Information Technology (“MIIT”) finally promulgated the amended...more
On Dec. 28, 2015, the Ministry of Industry and Information Technology of the People’s Republic of China (“MIIT”) issued the Catalog of Telecommunication Business (2015 Edition) (the “2015 Edition”), which will take effect on...more
A new privacy law requires companies to make specific statements about what information is collected on its website. Like California, it also requires that companies state in writing whether they respect “Do Not Track”...more
A lot has changed since the HIPAA Privacy Rule was finalized in 2002 and the HIPAA Security Rule was finalized a year later in 2003. The iPhone had not been released (that happened in 2007), Apple had just released the...more
Last week, The New York Times reported that men “feel entitled to take time off for family” too. The subject of the article was Josh Levs, a former CNN reporter who wanted more time off when his third child was born...more
I continue my exploration of the use of social media in doing compliance by taking a look at a very innovative social media solution to a difficult compliance issue around, of all things, honey. This example shows how...more
Harlem Globetrotters Get an Assist From CARU - In a rare loss, the Harlem Globetrotters agreed, at the direction of the Children's Advertising Review Unit (CARU), that their age-screening practices for the company's...more
In This Issue: - What’s in a Like? - R.I.P.: The Facebook “Like” Gate - Facebook Dislikes Fake Likes - Privacy in the Cloud: A Legal Framework for Moving Personal Data to the Cloud - Click...more
Why do you need to act urgently even if you feel your data handling is compliant? If you are a US headquartered company do you need to bother with these new EU laws and significant changes proposed?...more
The world has changed in ways that are even more dramatic than the conventional wisdom would suggest. When thinking about privacy online, it is tempting to immediately envision a desktop web browsers and one's latest web...more