4 Key Takeaways | NY Sales Tax on Cloud-Based Document Management Services
Health + Tech - How Digital Health Tools Help Create Greater Consumer Focus in Healthcare
Cyber Threats
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Moving Energy Forward: Future Voices Of The Industry
Sitting with the C-Suite: Servient – What’s Next
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
IP | Trend: Data in the Cloud is the Next Big Storm?
At Intersection of Cloud Storage/Transfer & Instant Messaging, Instacom’s a Unique Tool
“The Cloud” No Longer a Hot Topic Because It’s Common Knowledge at This Point
As mobile devices have become ubiquitous, so has the need for lawyers to collect information from them to use in litigation. Due to the unique data collection challenges posed by these devices, “mobile device forensics” has...more
One of the biggest threats to modern corporations involves departing employees who take confidential business information (CBI) and/or trade secrets with them prior to or upon their departure. Indeed, the misappropriation of...more
Over the last decade, we have heard a lot about artificial intelligence, machine learning, robotics, blockchain, and other disruptive digital technologies and how they are transforming the world. With the current coronavirus...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
In November 2017, Rosebud filed a patent lawsuit against Salesforce asserting that Salesforce’s Quip product allegedly infringes two of Rosebud’s patents. Quip is a popular cloud-based collaborative software suite built for...more
The cloud-based file-sharing and collaboration business continues to grow, inspiring competition between two heavy weights: Microsoft and Box. Last week, Box announced over $100 million in third quarter revenue growth...more
On October 6, 2016, the Department of Health and Human Services Office for Civil Rights (“OCR”) issued guidance on complying with HIPAA privacy, security, and breach notification rules when using cloud computing technology...more
On December 28, 2015, the Ministry of Industry and Information Technology of China (the MIIT) released the newly revised Classification Catalogue of Telecommunications Services (2015 Catalogue) and the new Catalogue is due to...more
The National Cybersecurity Center of Excellence (NCCoE) has announced that the comment period for the draft NIST Cybersecurity Practice Guide “Mobile Device Security: Cloud& Hybrid Builds” will close on January 8, 2016....more
Last week the Chicago City Council approved Mayor Rahm Emanuel’s 2016 revenue ordinance as part of his tax-laden budget proposal. The revenue ordinance included noteworthy changes to the personal property lease transaction...more
On Thursday, October 8, 2015, California Governor Jerry Brown signed into law the Electronic Communications Privacy Act (the “California ECPA”). This legislation, which takes effect on January 1, 2015, has been heralded by...more
Law enforcement requests for electronic information, particularly from technology companies such as Google and Twitter, have skyrocketed in recent years. In response, several states—Maine and Texas in 2013, Utah in 2014 and...more
In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more
I continue my exploration of the use of social media in doing compliance by taking a look at a very innovative social media solution to a difficult compliance issue around, of all things, honey. This example shows how...more
Increasingly interconnected global businesses need to focus on how export controls and trade sanctions can affect their cross-border activities in unexpected ways. For decades, the US Government has used trade...more
On April 8, 2014, several news agencies, including the New York Times and CNN, reported the discovery of a vulnerability in a core security protocol used by an estimated two-thirds of the world’s servers. The vulnerability...more