Todd Taylor

Todd Taylor

February 08, 2013 | Inside Counsel

Technology: Ensuring ownership of contractor-created technology and other works

Companies are making ever-greater use of third-party contractors to assist in the development of proprietary technology and processes.

By Todd Taylor

8 minute read

January 25, 2013 | Inside Counsel

Technology: Don’t let the cloud services Grinch steal your Christmas

On Christmas Eve 2012, Netflixa leading provider of Internet streamed video contentreceived the electronic equivalent of coal in its online stocking.

By Todd Taylor

4 minute read

January 11, 2013 | Inside Counsel

Technology: Navigating the export control maze

As a U.S. business grows into a global enterprise, it must pay attention to export regulations impacting the shipment (or transmission) of items and technology outside the U.S.

By Todd Taylor

5 minute read

December 28, 2012 | Inside Counsel

Technology: The biggest social media lesson of 2012

his year saw a flood of news articles relating to the issue of whether employers could (or should) be permitted to ask their employees and prospective employees for social media passwords.

By Todd Taylor

7 minute read

December 14, 2012 | Inside Counsel

Defending against cyber-attacks

Given recent highly publicized cyber-attacks against companies such as Barnes & Noble, Citibank, Sony, Yahoo and Comcast (to name just a few), corporate security officers may be forgiven for wanting to take matters into their own hands by counterattacking (or hacking back) into the computer systems of cybercriminals.

By Todd Taylor

4 minute read

November 30, 2012 | Inside Counsel

Technology: 4 important issues to address in the brave new work world of BYOD programs

Across America, corporations are allowing employees to use personal devices to perform work and access corporate networks.

By Todd Taylor

4 minute read

September 17, 2012 | Corporate Counsel

An Analysis of Proposed Federal Cybersecurity Legislation

Cybersecurity is a dynamic field, and companies must be flexible as they manage both cyber threats and new laws and regulations that are likely to be enacted in response to cyber threats.

By Todd Taylor

8 minute read