Big Data: It is in the news every day, and industry researchers can't say enough about the potential value of data and predictions for the data analytics market.
Over the last two weeks, we discussed contract provisions designed to address the implementation of preventive security measures , as well as responding to security incidents . Our third and final blog post in this series focuses on contractual provisions that address the allocation of liability for breaches that result in security incidents.
Cloud computing solutions offer many advantages over traditional enterprise systems, including cost-saving potential, access to enhanced applications, and consumption flexibility.
Last week, we discussed contract provisions that focused on documenting security requirements and monitoring security commitments.
Based on the explosive growth of smartphones over the last three years, Bring Your Own Device (BYOD) policies have been widely adopted for corporate email and other work-related tasks.
As we have previously discussed , cybersecurity threats are mounting and are a major concern for senior management.
We hope our readers can join an October 9 webinar presented by Labor and Employment partner Barbara Miller and associate Kathryn McGuigan on the legal risk and potential privacy issues for California employers arising from bring your own device (BYOD) policies.
California legislators recently signed Senate Bill 962 into law, which requires manufacturers to install kill-switches on smartphones sold in California that are made on or after July 1, 2015.
In signing  Delaware House Bill 295 into law on July 1, Delaware became the latest in a series of states to address the safe destruction of documents that contain consumers’ personal identifying information.
A growing trend in the fitness industry is the use of wearable electronic devices to track personal health and training information, such as sleeping patterns, heart rate, running speed, calories burned, current location, and distance and route traveled.