Choose Site
Cloud computing solutions offer many advantages over traditional enterprise systems, including cost-saving potential, access to enhanced applications, and consumption flexibility.
Last week, we discussed contract provisions that focused on documenting security requirements and monitoring security commitments.
Based on the explosive growth of smartphones over the last three years, Bring Your Own Device (BYOD) policies have been widely adopted for corporate email and other work-related tasks.
As we have previously discussed , cybersecurity threats are mounting and are a major concern for senior management.
Governance is an essential component of outsourcing planning and execution.
EisnerAmper's Fifth Annual Board of Directors Survey highlights cybersecurity breaches and social media use as top risks that concern boards of directors in 2014.
The U.S. Copyright Office recently released a third-edition public draft of the Compendium of its practices for comment.
The hospitality industry is particularly focused on data analytics and is the recipient of a large volume of end user data.
Building on our introductory discussion of data analytics and use restrictions from last week , in this post, we describe in more detail some potential restrictions, under applicable law and contracts, of a company’s ability to use data for analysis purposes.
We hope our readers can join an October 9 webinar presented by Labor and Employment partner Barbara Miller and associate Kathryn McGuigan on the legal risk and potential privacy issues for California employers arising from bring your own device (BYOD) policies.