The Purpose of this Agreement is to set forth the rights and obligations of the Parties with respect to the exchange, protection, and disclosure of Proprietary Information, as defined in paragraph 5 of this Agreement, which may be disclosed by one Party to the other in their meetings, discussions, and/or submittals concerning the Business Purpose.
It’s a bad day, the eve of your company’s merger. You are a high-profile corporate lawyer working for a global brand and you just learned that personal data believed to have been stolen from your cloud computing account has been posted on WhoNeedsTheLaw.com, apparently exposing your name, entire work email inbox, phone number and scandalous images secured by a hacker accessing the camera on your laptop computer. The data includes a private dialogue between you and the outside company about the liabilities of taking on the merger. What would you do? This interactive session will cover emerging executive liability issues and test how effectively you can navigate risk with real-life scenarios and video vignettes.
This article addresses the three broad topics that many Boards of Directors are examining as they review and assess cybersecurity issues.
It’s a bad day, the eve of your company’s merger. You are a high-profile corporate lawyer working for a global brand and you just learned that personal data believed to have been stolen from your cloud computing account has been posted on WhoNeedsTheLaw.com, apparently exposing your name, entire work email inbox, phone number and scandalous images secured by a hacker accessing the camera on your laptop computer. The data includes a private dialogue between you and the outside company about the liabilities of taking on the merger. What would you do? This interactive session will cover emerging executive liability issues and test how effectively you can navigate risk with real-life scenarios and video vignettes.
The Relationship of Big Data, Information Governance, and Data Governance presentation to the Information Governance Committee on July 16, 2015.
The purpose of this table is to: 1) list the countries in the European Union that have a comprehensive data protection law (columns 1 and 2); 2) summarize the notification and/or registration requirements with the competent data protection authority in these countries and explain where exemptions to notify/register may exist (columns 3 and 4); and 3) specify the countries where it is required to notify individuals about the collection and processing of their personal data (column 5).
This Leading Practices Profile, which updates 2010’s Leading Practices in Privacy and Data Protection: What Companies Are Doing, examines the data security and privacy practices of six companies with operations spanning the globe.
In this interactive workshop a panel of experts provides practical tips and guidance on data breach obligations and associated notification requirements, how to address data breach in contracts, how to deal with bad leavers and protect trade secrets, corporate spying and the impact of European human rights legislature.
This article is a security guide for businesses published by the United States Federal Trade Commision.
This is an online tutorial to help train your employees; publications to address particular data security challenges; and news releases, blog posts, and guidance to help you identify – and possibly prevent – pitfalls.