The SaaS Tacks – The Ins and Outs of Negotiating SaaS Contracts
CMO Series EP100 - Celebrating 100 episodes and exploring the future of professional services marketing
Medical Device Legal News with Sam Bernstein: Episode 10
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Paralegal Insights: A Collaborative Trademark Practice, Series 3
JONES DAY PRESENTS®: Enhancing Trade Secret Protection in Remote Work Environments
Investigative Power: Utilizing Self Service Solutions for Internal Investigations?
Podcast: Unpacking FDA's Final Clinical Decision Support Guidance - Diagnosing Health Care
Software Escrow: An enterprise resiliency tool every legal department should have in their toolbox (with Don Dennis Jr.)
ASG LegalTech CEO Soumya Nettimi Talks Covid, Racial Injustice and The Future of Legal Payments: On Record PR
E8: Interview with Cookiebot CEO on Technical Solutions to GDPR Readiness
New Revenue Recognition Standard-Part III, Shaking Up the Software Industry?
Unfair and Unbalanced-Episode 19
FCPA Compliance Report-Episode 286-Use of Technology in Supply Chain Risk Management
Compiling Successful IP Solutions for Software Developers
Drafting Software Patents In A Post-Alice World
Polsinelli Podcasts - Hear How the SCOTUS Ruling May Impact Patent-Eligible Subject Matter for Software
IP|Trend: New Era in Protection of Software by Intellectual Property Law?
What are the Implications of Alice v. CLS?
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
FCPA Compliance and Ethics Report-Episode 11 with Eddie Cogan
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the week of July 8-14. Here’s what’s...more
Three US agencies – the US Department of Commerce, Bureau of Industry and Security (BIS), the US Department of the Treasury, Office of Foreign Assets Control (OFAC), and the US Department of State – took new actions on June...more
Editor’s Note: In this insightful discussion between John Wilson, Chief Information Security Officer and President of Forensics at HaystackID, and Rene Novoa, Director of Forensics at HaystackID, we delve into the intricate...more
Federal regulators have cracked down on the use of texts messages and messaging platforms for business communications, using their broad authority to root out record retention violations, resulting in significant fines and...more
This article is the third in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity has been providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more
This article is the second in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity will be providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more
This post provides some tips from eDiscovery experts on what to consider ahead of any investigation commencing. Consider ease of compliance when procuring chat software The pandemic accelerated the adoption of chat and...more
Introduction: Tracking Software in the Healthcare Industry - Privacy-related concerns have become increasingly prominent in recent years, especially with the widespread use of third-party tracking tools such as tracking...more
Health privacy has been a Federal Trade Commission (FTC) priority for decades, and indeed, one of its very first privacy cases, in the early 2000s, involved the inadvertent sharing of user health data. Fast-forward a few...more
Earlier this week, Apple issued another patch—this one is said to address a reported vulnerability that “an application may be able to execute arbitrary code with kernel privileges.” According to Apple, it “is aware of a...more
Mobile devices within the Internet of Things (IoT) are continuously benefitting from rapid technological advancements. And once those devices are sold to consumers, over-the-air (OTA) software updates ensure they can be...more
Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more
What a great idea! Trusty Consumer Reports has announced that it is collaborating with three cybersecurity firms to “create a new standard that safeguards consumers’ security and privacy—and we hope industry will use...more
DISTRICT COURT CASES - Mobile Device Data Monitoring Patent Not Directed to Abstract Idea Under § 101 - On October 26, 2015, Judge Sparks of the Western District of Texas denied defendant’s motion for summary...more
New Technology = New Threats - With new technology comes new security concerns. But when that new technology is in the medical field, the cybersecurity vulnerabilities can be particularly devastating. The...more
I continue my exploration of the use of social media in doing compliance by taking a look at a very innovative social media solution to a difficult compliance issue around, of all things, honey. This example shows how...more
For corporations, the mobile app is today’s website. Back in the late 1990s, no self-respecting company, no matter how stodgy and old-fashioned, wanted to be without a website....more
On September 23, 2010, Eon filed suit against seventeen defendants in the District Court of the District of Delaware, alleging infringement of U.S. Patent No. 5,663,757. During the case, the '757 patent went through two...more
Samsung recently announced that about more than 600 million Samsung mobile devices contained a factory installed third party software produced by SwiftKey that predicts the words you will types on your keyboards. The issue...more
Innovation is prized in the growing space of the Internet of Things (IoT). But an innovative product design is not enough, and potential pitfalls abound. As demonstrated in a report published by the Federal Trade Commission...more
Increasingly interconnected global businesses need to focus on how export controls and trade sanctions can affect their cross-border activities in unexpected ways. For decades, the US Government has used trade...more
"If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device’s encryption software."...more