Companies are under tremendous pressure to reduce IT costs. Cloud and Software as a Service (SaaS) offer significant potential cost reductions through the use of shared infrastructure and standardized software offerings.
Employee and Other Proprietary Information & Invention Assignment Agreements – Update for New Trade Secret Law
On May 11, President Barack Obama today signed the Defend Trade Secrets Act (DTSA) into law.
Over the last decade, communication via email and text has become a vital part of how many of us communicate in the workplace.
More than 60 companies have joined forces with several environmental groups to launch a new coalition, called the Renewable Energy Buyers Alliance (REBA), to promote the development of 60 GW of renewable energy in the United States by 2025.
In fiscal year 2015, the U.S. Department of Justice (“DOJ”) recovered more than $3.5 billion from False Claims Act (“FCA”) cases. A staggering $1.9 billion of that amount was recovered from health care providers who were alleged to have provided unnecessary care, paid kickbacks or overcharged federal health care programs.
With a possible sentence of 20 years in prison for hacking for a trial set for June 28, 2016 the US Attorney commented about the indictment that “IT administrators often hold the ‘keys to the kingdom’ for companies, … Disgruntled IT administrators can therefore pose a grave threat to businesses, which must take measures to protect themselves when letting such an employee go.”
Yes and no. SnapChat automatically deletes most messages after they have been opened or expired.
Here’s the pre-emption argument: Our plane’s design was approved by the FAA.
DoD Rule Would Help Contractors Protect Their Technical Data Rights in Commercial Items Used in Major Systems
The Department of Defense (DoD) is considering a proposed rule that would help contractors protect their technical data rights in privately-developed commercial items that are incorporated into major systems, including major weapons systems.
Ever since the Target and Home Depot breaches were traced to intrusions at their vendors, the management of cybersecurity at third-party vendors has been a focus of companies and regulators.