News & Analysis as of

Cloud Computing Mobile Devices

Epiq

Mobile Device Collections — a Potential Minefield for Lawyers

Epiq on

As mobile devices have become ubiquitous, so has the need for lawyers to collect information from them to use in litigation. Due to the unique data collection challenges posed by these devices, “mobile device forensics” has...more

TransPerfect Legal

Three Strategies to Prevent Departing Employees from Absconding with Trade Secrets and Other Confidential Business Information

TransPerfect Legal on

One of the biggest threats to modern corporations involves departing employees who take confidential business information (CBI) and/or trade secrets with them prior to or upon their departure. Indeed, the misappropriation of...more

Perkins Coie

How Are the World’s Most Disruptive Technologies Faring in the Fight Against the World’s Most Disruptive Virus?

Perkins Coie on

Over the last decade, we have heard a lot about artificial intelligence, machine learning, robotics, blockchain, and other disruptive digital technologies and how they are transforming the world. With the current coronavirus...more

Association of Certified E-Discovery...

Weekly Trends Report – 2/1/2019 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Shook, Hardy & Bacon L.L.P.

Rosebud Asserts Growing Patent Portfolio Against Salesforce’s Quip

In November 2017, Rosebud filed a patent lawsuit against Salesforce asserting that Salesforce’s Quip product allegedly infringes two of Rosebud’s patents. Quip is a popular cloud-based collaborative software suite built for...more

Robinson+Cole Data Privacy + Security Insider

Box, OneDrive, a Combination—What’s Your Flavor?

The cloud-based file-sharing and collaboration business continues to grow, inspiring competition between two heavy weights: Microsoft and Box. Last week, Box announced over $100 million in third quarter revenue growth...more

King & Spalding

HHS-OCR Announces Guidance On HIPAA Compliance And Cloud Computing

King & Spalding on

On October 6, 2016, the Department of Health and Human Services Office for Civil Rights (“OCR”) issued guidance on complying with HIPAA privacy, security, and breach notification rules when using cloud computing technology...more

McDermott Will & Emery

China Released the Latest Classification Catalogue of Telecommunications Services (2015 Revision)

McDermott Will & Emery on

On December 28, 2015, the Ministry of Industry and Information Technology of China (the MIIT) released the newly revised Classification Catalogue of Telecommunications Services (2015 Catalogue) and the new Catalogue is due to...more

Robinson+Cole Data Privacy + Security Insider

Comment period for NIST guide “Model Device Security” coming to a close

The National Cybersecurity Center of Excellence (NCCoE) has announced that the comment period for the draft NIST Cybersecurity Practice Guide “Mobile Device Security: Cloud& Hybrid Builds” will close on January 8, 2016....more

McDermott Will & Emery

Chicago Mayor’s Tax-Heavy Budget Passes: Lease and Amusement Tax Implications

McDermott Will & Emery on

Last week the Chicago City Council approved Mayor Rahm Emanuel’s 2016 revenue ordinance as part of his tax-laden budget proposal. The revenue ordinance included noteworthy changes to the personal property lease transaction...more

Goodwin

California Enacts CalECPA, Requiring a Search Warrant to Obtain or Access Users’ Electronic Information

Goodwin on

On Thursday, October 8, 2015, California Governor Jerry Brown signed into law the Electronic Communications Privacy Act (the “California ECPA”). This legislation, which takes effect on January 1, 2015, has been heralded by...more

McDermott Will & Emery

California Joins Other States with the Passage of CalECPA

McDermott Will & Emery on

Law enforcement requests for electronic information, particularly from technology companies such as Google and Twitter, have skyrocketed in recent years. In response, several states—Maine and Texas in 2013, Utah in 2014 and...more

Seyfarth Shaw LLP

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

Seyfarth Shaw LLP on

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

Thomas Fox - Compliance Evangelist

Social Media Week Part IV – Telling a Story About Honey

I continue my exploration of the use of social media in doing compliance by taking a look at a very innovative social media solution to a difficult compliance issue around, of all things, honey. This example shows how...more

Latham & Watkins LLP

5 Compliance “Hot Spots” for Technology Companies Under Export Controls and Sanctions Laws

Latham & Watkins LLP on

Increasingly interconnected global businesses need to focus on how export controls and trade sanctions can affect their cross-border activities in unexpected ways. For decades, the US Government has used trade...more

Saul Ewing Arnstein & Lehr LLP

Heartbleed Bug Creates Risk for Businesses and Consumers

On April 8, 2014, several news agencies, including the New York Times and CNN, reported the discovery of a vulnerability in a core security protocol used by an estimated two-thirds of the world’s servers. The vulnerability...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide