Cyber Insurance: Is it right for you?
We are frequently asked about insurance policies that cover internet-based risks like those involving network security like data breaches and ransomware, as well as data privacy related risks like class action lawsuits for privacy violations and costs related to the increasingly complex landscape of privacy rules. Read More ›
Categories: Cybersecurity, Insurance
Three Steps to Forming an LLC
A limited liability company (“LLC”) provides many benefits and protection to its owners. When forming an LLC there are several steps you should take. Below are three key steps to setting up your LLC. Read More ›
Categories: Compliance, Contracts, Entity Selection, Organization & Planning, Startup
Legal Cybersecurity Hotline Launched
This blog post has since been updated with new information
Hackers are more sophisticated than ever. It is often not a matter of ‘if’ but ‘when’ a data breach will occur. October is National Cybersecurity Awareness Month and with new threats frequently reported in the media; individuals, businesses, municipalities and other organizations need to do their due diligence in preparing for the inevitable. Read More ›
Categories: Cybersecurity
What to Consider Before Filing a Patent
This blog has since been updated with new information
What is eligible for patent protection?
In the U.S., what is known as a "general utility patent" or what most people typically imagine a patent to be, protects the use and function of an invention. Processes, machines, articles of manufacture and compositions of matter are all patent eligible. You cannot get a patent for an abstract idea or something that you discover in nature; you have to have a true physical invention or a process that creates a transformation of some kind in order to be eligible. Read More ›
Categories: Copyright, Intellectual Property
Using Vendor Management to Protect Your Business's Data
As a business or business owner, one thing to consider when creating a cybersecurity plan, is a vendor management program. Vendor management programs can help businesses address risks that arise when working with vendors and third parties that might be receiving sensitive information or business information. Read More ›
Categories: Cloud Computing, Cybersecurity, Digital Assets, IT Contracts
Children's Online Privacy Protection Act: Are You Compliant?
The Children’s Online Privacy Protection Act (“COPPA”) was enacted in 1998 and was created to address concerns with the online collection of children’s personal information. Recently, the Federal Trade Commission (“FTC”) has announced several large fines for companies not in compliance. Read More ›
Categories: Compliance, Liability, Privacy, Technology
Updates on Federal and State Privacy Legislation and the FTC’s Authority
The International Association of Privacy Professionals Global Privacy Summit (“GPS”) occurred at the beginning of this month in Washington, D.C., giving more than 4,000 privacy professionals the chance to meet, reconnect, discuss developing issues, and learn from leaders in data privacy and security. Much of the conversation centered around the General Data Protection Regulation ("GDPR"), now approaching one year since its effective date. Read More ›
How are Businesses Preparing for Proposed Federal Data Privacy Legislation? Part Two: Conduct a Data Assessment and Address Risks
This is the second part in a series discussing the actions that companies can take to prepare for potential data privacy legislation. Part One summarizes and discusses recently proposed data privacy legislation. Read More ›
Categories: Compliance, Cybersecurity, Digital Assets, IT Contracts
Michigan Marijuana Retailers: Data Privacy and Cybersecurity Risks
More than 30 states have legalized medical marijuana and more than 10 have legalized marijuana for recreational use, including Michigan in a 2018 ballot proposal. Marijuana retailers have significant issues to address as the industry and the rules governing it mature over time. Among those issues, retailers should not overlook data privacy and cybersecurity issues. Read More ›
Categories: Cybersecurity, Electronic Health Records, HIPAA
SEC-Regulated Companies Should Address Cybersecurity to Avoid Enforcement Risks
If 2018 was any indication, cybersecurity compliance should be high on the list of SEC-regulated companies’ priorities in 2019. Take, for example, the SEC’s 2018 enforcement action against Voya Financial Advisor, Inc. (“Voya”) for violation of the Red Flags Rule, which resulted in a $1 million settlement. Read More ›
Categories: Compliance, Cybersecurity
Categories
- Corporate Transparency Act (CTA)
- Entity Selection, Organization & Planning
- Labor Relations
- IT Contracts
- Distribution
- Employment
- Billing/Payment
- Social Media
- Did you Know?
- Retirement
- Hospice
- HIPAA
- Department of Labor
- Sales/Disputes
- Fraud & Abuse
- Liability
- Entity Planning
- Cloud Computing
- Compliance
- National Labor Relations Board
- Privacy
- Legislative Updates
- Startup
- Copyright
- Criminal
- News
- Contracts
- Financing
- Artificial Intelligence (AI)
- Estate Planning
- Alerts and Updates
- Venture Capital/Funding
- Inspirational
- Chapter 11
- Electronic Health Records
- Insurance
- Technology
- Digital Assets
- Personal Publicity Rights
- Trademarks
- Sales Tax
- Regulations
- Intellectual Property
- Employee Benefits
- E-Commerce
- Licensing
- Trade Secrets
- Hospitals
- Lawsuit
- Cybersecurity
- Mergers & Acquisitions
- Elder Law
- Crowdfunding
- Patents
- Defamation
- Domain Name Registration
- Tax Disputes
- Tax