This paper will provide an overview of the U.S. federal and state considerations applicable to any business initiative that relies on Big Data, and provide some practical advice for those seeking to monetize Big Data in health care.
Lessons learned from devising programs to reduce products liability can point the way to creating effective information security policies.
This article explains and demystifies cybersecurity for senior management and directors by identifying the steps global companies must take to address, mitigate, and respond to the risks associated with data security.
This Checklist addresses hiring outside counsel, outside counsel guidelines, applying legal project management principles to legal matters, insourcing and outsourcing legal work, analyzing matter outcomes, and terminating outside counsel.
This Practice Note considers steps that a corporate law department can take to help transform itself from a cost center into a profit center.
This Standard Document and the integrated drafting notes are for guidance in the preparation of a patent and know-how license agreement from the perspective of the licensor.
This is a presentation of the largest ever healthcare fraud takedown by the U.S. Department of Justice.
This is a sample supplier security requirements and expectations.
This is a sample intel enhanced data security assessment form.
This form outlines how to list hardware inventory.