JD Supra Business Advisor

18 Magazines | 3,392 Articles | 646 Followers | @JDSupra | Fresh analysis and insights on news of the day from leading professionals & industry experts. Updated daily.

Music and the Blockchain

The promise of blockchain technology for the music industry is its ability to solve the problem of “shared facts” and to provide transparency in real …

DRM

Decentralized Autonomous Organizations

A Decentralized Autonomous Organization (DAO) is a computer program, running on a peer-to-peer network, incorporating governance and decision-making …

The Blockchain: Beyond Bitcoin

Blockchain - While many people in the U.S. are still skeptical that bitcoin will become a mainstream currency, both private and public sectors are …

Bitcoin

It's All About Blockchain - Don't Miss These 7 Reads

In case you missed them the first time around, here's a recap of some of the popular posts recently published on JD Supra covering Blockchain and …

Building Block(chain)s: 6 Key Findings – and Featured Predictions – from the World Economic Forum’s Blockchain Report

The World Economic Forum threw a knockout punch this month when it released its report “The Future of Infrastructure: An Ambitious Look at How …

World Economic Forum

Your Next IPO Could Be on the Blockchain

Delaware’s corporate law blockchain initiative includes a new class of “distributed ledger shares” and promises to lower transactional costs, speed …

Delaware

Can blockchain live up to the hype?

Is blockchain the revolutionary technology that will rewrite the rules for the finance industry, identifying authenticity and verifying payment flows …

The City

FDA Approves First Genetically Modified Food-Producing Animal

On November 19, 2015, the United States Food and Drug Administration (FDA) approved a new animal drug application (NADA) that authorizes the …

The FDA’s Draft Guidance on Cybersecurity for Networked Medical Devices

Yet another regulator has weighed in on cybersecurity issues, adding to an already complicated and daunting mosaic of regulatory enforcement actions …

Weak Baby Monitor Security Subject of FTC Internet of Things Study

On January 19, the Federal Trade Commission posted the results of a small study of baby monitor security, finding that four out of five devices …

China Passes (De) Encryption Cyber Law

On December 27, 2015, the Standing Committee of the National People's Congress, China's national legislative body, passed the <i>Counter-Terrorism</i> <i>Law</i> <i>of</i> …

Star Wars Copyright and Trademark Litigation: The Empire Sues Back

Haven’t seen the new Star Wars movie yet? The pop culture zeitgeist recommends that you binge-watch all six of the prior Star Wars movies before …

Star Wars

Alert: Top 10 Antitrust Developments and Trends to Watch in 2016

Attention in the US during 2016 will be on the presidential campaign, and the election in November will bring a change in the "antitrust guard" at …

Top 10

Cyber Security Compliance: The Role of the CCO

For years, cyber security has been the province of IT specialist and technicians. Those days are long gone. If you ask a Board of Directors to …

Security

Health Care Reform – What You Should Know For 2016

Unlike most other years since the Affordable Care Act (“ACA”) was passed, there are relatively few new requirements employers need to implement in …

Health Care Reform

JD Supra's Top 50 Popular Topics in 2015 | JD Supra

<i>Dear Readers:</i> It is my pleasure to present once again our annual recap of <b>popular reader topics on JD Supra for the past year</b>. As with last year's …

List-Worthy

5 Reasons Why No One Reads Your Content

Why you're not being read - and what to do about it....<br>By: JD Supra Perspectives

Blogging

Popular Hiring & Firing Reads on JD Supra | JD Supra

For your reference, here's a recap of well-read posts focused on hiring, firing, and other HR-related workplace issues published on JD Supra in the …

7 Essential IP Law Considerations for Startup Entrepreneurs

Startups derive immense value from intangible assets. Startup valuations are based heavily on things you can’t touch: passion, brainpower, expertise, …

Entrepreneurship

Startup Entrepreneurs Should Plan for Success But Prepare for Failure: Do You Have a Plan B?

<i>Absent luck and preparation, failure equals disaster – it is folly to assume otherwise...</i><p>When a startup participant (i.e., company founder, investor, …

Trademark Strategies for Start-Up Companies

Most innovative start-up companies appreciate that a sound patent strategy is critical to success in the marketplace, and in making the company …

FTC v. Wyndham: The Litigation Goes On, But Other Lessons To Learn

It’s fair to say that the opinion by the Third Circuit Court of Appeals in <i>FTC v. Wyndham</i> was a set-back for Wyndham, but for businesses it may be …

Lawsuits

Are Independent Contractors Always Exempt From I-9 Requirements?

Employers rarely question the general rule that independent contractors are not required to complete a form I-9. Most employers believe that, if an …

Freelancing

5 Things Companies Should Know About the Slowdown in China

The dramatic drops in the Shanghai, Shenzhen and Hong Kong stock markets have produced very obvious repercussions in global markets. In China, the …

Asia

How to Avoid Choosing the Wrong Cybersecurity Firm

With today’s landscape, managing cyber risk has become a top priority for businesses. However, choosing the right cybersecurity firm can be a …

What's Popular Right Now at the Intersection of Social Media and the Law?

Live streaming, hashtag trademarks, social media ownership after bankruptcy, the role of socmed in discovery ... myriad issues make for interesting …

Social Media

I Was An Irrational Compliance Calculator

In what might be described as a “companion guide” to my <i>Ethikos</i> article <i>Does Compliance Need More “Darkside,”</i> I had a chance to read Scott …

Calculators

The DOJ’s Cyber Incident “Best Practices” Guidance

The Cybersecurity Unit of the U.S. Department of Justice released in April its “Best Practices for Victim Response and Reporting of Cyber Incidents,” …

World War C: Cyber Warfare

[author: Winthrop Smith]<p>State-sponsored hacking occurs when a country funds cyber hacking organizations or groups in order to infiltrate a company’s …

Cybersecurity Oversight: What is a Board of Directors to Do?

Cybersecurity and the risks of data breaches figured prominently at the 35th Annual Ray Garrett Corporate and Securities Law Institute held April 30, …