junjul2016
Technologies like predictive coding play a significant role in narrowing the scope of data to potentially relevant evidence, but that […]
Risk appetite, the balance between risk-taking and risk-management, should turn on a careful set of decisions by corporate leaders, with […]
The Uniform Fraudulent Transfer Act (UFTA) prevents debtors from transferring assets in an effort to frustrate creditors’ collection of debts. […]
With the current state of European privacy regulations, American firms must make additional efforts with their contracts and guarantees of […]
Under the Foreign Corrupt Practices Act, if the agent of a company pays or offers to pay a bribe to […]
Some of the first cases relating to a cyber-attack or data breach relied on traditional insurance forms that contained specific […]
Earlier this year a number of healthcare providers found themselves under siege by targeted ransomware attacks. In February, Hollywood Presbyterian […]
A data breach plaintiff, like any federal plaintiff, must establish standing in order to survive a 12(b)(1) motion to dismiss. […]
Employees are becoming empowered to take workplace technology adoption into their own hands, and that’s become a challenge for IT […]
Under section 337 of the Tariff Act, the U.S. International Trade Commission conducts investigations into allegations of certain unfair practices […]
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.