February 08, 2013 | Inside Counsel
Technology: Ensuring ownership of contractor-created technology and other worksCompanies are making ever-greater use of third-party contractors to assist in the development of proprietary technology and processes.
By Todd Taylor
8 minute read
January 25, 2013 | Inside Counsel
Technology: Don’t let the cloud services Grinch steal your ChristmasOn Christmas Eve 2012, Netflixa leading provider of Internet streamed video contentreceived the electronic equivalent of coal in its online stocking.
By Todd Taylor
4 minute read
January 11, 2013 | Inside Counsel
Technology: Navigating the export control mazeAs a U.S. business grows into a global enterprise, it must pay attention to export regulations impacting the shipment (or transmission) of items and technology outside the U.S.
By Todd Taylor
5 minute read
December 28, 2012 | Inside Counsel
Technology: The biggest social media lesson of 2012his year saw a flood of news articles relating to the issue of whether employers could (or should) be permitted to ask their employees and prospective employees for social media passwords.
By Todd Taylor
7 minute read
December 14, 2012 | Inside Counsel
Defending against cyber-attacksGiven recent highly publicized cyber-attacks against companies such as Barnes & Noble, Citibank, Sony, Yahoo and Comcast (to name just a few), corporate security officers may be forgiven for wanting to take matters into their own hands by counterattacking (or hacking back) into the computer systems of cybercriminals.
By Todd Taylor
4 minute read
November 30, 2012 | Inside Counsel
Technology: 4 important issues to address in the brave new work world of BYOD programsAcross America, corporations are allowing employees to use personal devices to perform work and access corporate networks.
By Todd Taylor
4 minute read
September 17, 2012 | Corporate Counsel
An Analysis of Proposed Federal Cybersecurity LegislationCybersecurity is a dynamic field, and companies must be flexible as they manage both cyber threats and new laws and regulations that are likely to be enacted in response to cyber threats.
By Todd Taylor
8 minute read