JD Supra Business Advisor on Flipboard

@JDSupra | 17 Magazines | 3,365 Articles | 558 Followers | Fresh analysis and insights on news of the day from leading professionals & industry experts. Updated daily.

How to Avoid Choosing the Wrong Cybersecurity Firm

Although the inherent nature of cybersecurity radiates urgency, businesses should not let this characteristic dictate the vendor selection …

Cybersecurity

What's Popular Right Now at the Intersection of Social Media and the Law?

Live streaming, hashtag trademarks, social media ownership after bankruptcy, the role of socmed in discovery ... myriad issues make for interesting …

Social Media

I Was An Irrational Compliance Calculator

In what might be described as a “companion guide” to my Ethikos article Does Compliance Need More “Darkside,” I had a chance to read Scott …

Calculators

The DOJ’s Cyber Incident “Best Practices” Guidance

The Cybersecurity Unit of the U.S. Department of Justice released in April its “Best Practices for Victim Response and Reporting of Cyber Incidents,” …

Security

World War C: Cyber Warfare

State-sponsored hacking occurs when a country funds cyber hacking organizations or groups in order to infiltrate a company’s or government’s cyber …

Foreign Policy

Cybersecurity Oversight: What is a Board of Directors to Do?

Cybersecurity and the risks of data breaches figured prominently at the 35th Annual Ray Garrett Corporate and Securities Law Institute held April 30, …

Cybersecurity

Facebook is Not a Picket Line

The National Labor Relations Act protects the rights of employees to connect and address conditions at work, and recent decisions have held that this …

Facebook

Like It or Love It: How Not to Get Pinned (Legally) When Using Social Media to Promote Your Brand

Twitter®, Instagram®, Facebook®, Pinterest® and other social media websites and apps are great ways to interact with friends, family and potential …

Marketing

#Trademarks?: Hashtags as Trademarks

Hashtags have become ubiquitous in social media, but their status as intellectual property—particularly as trademarks—is still developing. First …

Social Media

Effort to Hide Facebook Evidence by Deactivating Account Ends Badly for Louisiana Man

As social media has become ubiquitous, courts are wrestling with more discovery disputes involving social media accounts. In a recent case, Crowe v. …

Facebook

Is Posting Obscenities Aimed At Supervisor On Facebook A Terminable Offense?

Maybe not, according to a recently published NLRB decision. In Pier Sixty LLC, a majority of a three-member NLRB panel affirmed an ALJ’s decision …

Federal Court Limits Employer's Right to Discover Information About the EEOC’s Own Hiring Policies and Expands the EEOC's Rights on Discoverability

In recent years, the Equal Employment Opportunity Commission has aggressively sought to enforce its April 2012 enforcement guidance concerning how, …

Civil Rights

In a Win for Employees, Fourth Circuit Finds That Two Racial Slurs May Support Harassment Claim

The Fourth Circuit Court of Appeals recently made two noteworthy rulings in a single case concerning sexual harassment and retaliation under Title …

Harassment

SEC Proposes Pay-Versus-Performance Disclosure Rules

The Securities and Exchange Commission (SEC) recently issued its long-awaited proposal for "pay-versus-performance" disclosure. The proposed rules …

Executive Compensation

China’s Tax Authority Issues New Circular to Regulate Payment to Overseas Affiliates

On July 29, 2014, the State Administration of Taxation (SAT) of the People’s Republic of China (PRC or China) released The Notice Regarding the …

Asia

Game-Changing Developments Threaten Franchise Business Model

The National Labor Relations Board (NLRB) and Service Employees International Union (SEIU) have been coordinating attacks on the franchise business …

Webinars

New Release for Spring 2015: The Annual Verizon Data Breach Investigations Report

It’s that time of year again. Spring is in the air, flowers are in bloom, and Verizon’s annual Data Breach Investigations Report (DBIR) has been …

Verizon

The Best Compliance Reads Are Not About Compliance

Lately, during a number of webinars and speaking engagements where I frequently site the work of what I consider to be thought leaders in …

Who Wins With Google's New Patent Marketplace (Other Than Google)?

There’s something off about Google’s Patent Purchase Promotion....
By: JD Supra Perspectives

Patents

Need to Know: 10 Popular Cybersecurity Reads on JD Supra

Reading recap of ten popular Cybersecurity posts on JD Supra right now. It's complicated....
By: JD Supra Perspectives

Cyber-attacks

Quantum Computers for Mining Bitcoins

Today’s computers encode data into bits – binary digits in one of two definite states, 0 or 1. Any calculation that needs to be performed with the …

Quantum Computing

[Webinar] Formation Issues and Changes in Structure: Tax Considerations - Mar. 19, 12-1PM PST

Please join Sheppard Mullin for our monthly Third Thursday Emerging Company Webinar Series educating entrepreneurs and emerging companies on the key …

Webinars

Lawyers: How to Be Valuable ... Aside from Practicing Law

Lawyers have a problem. We’re consistently perceived as experts on one thing: law. This not only dominates how others view us, but also dominates how

JD Supra Thought Leaders in Cybersecurity - Feb 2015

Meet the top Cybersecurity writers on JD Supra during February, 2015....
By: JD Supra Perspectives

Thought Leadership

How Recent Data Breaches are Changing the Face of Cybersecurity for the Private Sector

If "The Year of the Breach" and the rapid start to data breaches in 2015 have taught us anything, it is that any company is susceptible to a cyber …

Security

Breaches in the Boardroom: What Directors and Officers can do to Reduce the Risk of Personal Liability for Data Security Breaches

Corporate directors and officers may increasingly be targets of shareholder derivative lawsuits in the wake of the surge of regulatory actions and …

Security

Anthem Data Breach Spawns Class Action Suits and “Phishing” Scams

Last week, Anthem Inc. – the nation’s second largest health insurer – reported a data breach involving the disclosure of the personal information of …

Anthem, Inc.

Is 2015 the Year of Data Protection?

The growing frequency, impact and sophistication of cyberattacks in the U.S. and abroad have highlighted the need to address America's lack of a …

Security

The Anthem Data Breach: The Fallout and What’s Next

By now (unless you have been under a snow drift), you have likely heard about the apparent intrusion into a database at the nation’s largest health …

Privacy

5 Simple Steps Startups Can Take to Protect Intellectual Property

All emerging companies can and should take basic steps to protect their uniquely valuable intellectual property. For many companies, especially …

Intellectual Property