junjul2016
Technologies like predictive coding play a significant role in narrowing the scope of data to potentially relevant evidence, but that early understanding is contingent […]
Risk appetite, the balance between risk-taking and risk-management, should turn on a careful set of decisions by corporate leaders, with the general counsel and […]
The Uniform Fraudulent Transfer Act (UFTA) prevents debtors from transferring assets in an effort to frustrate creditors’ collection of debts. But the UFTA requires […]
With the current state of European privacy regulations, American firms must make additional efforts with their contracts and guarantees of personal data protections to […]
Under the Foreign Corrupt Practices Act, if the agent of a company pays or offers to pay a bribe to a foreign official in […]
Some of the first cases relating to a cyber-attack or data breach relied on traditional insurance forms that contained specific coverages relating to electronic […]
Earlier this year a number of healthcare providers found themselves under siege by targeted ransomware attacks. In February, Hollywood Presbyterian Medical Center in Los […]
A data breach plaintiff, like any federal plaintiff, must establish standing in order to survive a 12(b)(1) motion to dismiss. Traditionally, district courts have […]
Employees are becoming empowered to take workplace technology adoption into their own hands, and that’s become a challenge for IT departments and companies. A […]
Under section 337 of the Tariff Act, the U.S. International Trade Commission conducts investigations into allegations of certain unfair practices in import trade. Most […]