Don’t forget you can visit MyAlerts to manage your alerts at any time.
In cybersecurity context, look at how data is transmitted between entities and security risks it presents. More broadly, report on how organizations are leveraging big data for service offerings and storing it.
By Jessica Seah | September 15, 2022
South Korea found that Google and Meta did not clearly inform users or obtain their consent as they collected information about their online activities, and used the data collected for targeted advertising.
3 minute read
By Ryan Dailey | September 14, 2022
HiPerGator, a supercomputer housed at the University of Florida, is being used to address some of the state's most-pressing agricultural and environmental problems.
4 minute read
By Christine Schiffner | September 12, 2022
The founder of Whistleblower Aid discusses his approach to representing high-profile whistleblowers and the process so far in the Twitter whistleblower headed before a congressional hearing.
6 minute read
By Scott Forman | August 30, 2022
A retroactive analysis of litigation data can help legal departments identify trends and determine where to allocate resources to reduce the likelihood of future litigation. But as the legal risks facing companies grow and intensify, it's critical to leverage data to keep looking for earlier and earlier indicators of risk.
7 minute read
By Marc Lieberstein and Raymond Aghaian | August 25, 2022
Franchisors and franchisees should collaborate and coordinate their online activities to provide for security and control over the franchises valuable proprietary commercial and consumer data.
6 minute read
By Michael Kasdan | August 24, 2022
As the NFT space matures, it will be fascinating to see what new types of utility are bundled with IP rights and what types of bundling approaches work to spur increased innovation and increase the overall value of NFT projects.
7 minute read
By Trudy Knockless | August 22, 2022
"You're talking about millions of messages every day in a tool like Slack or Teams compared to hundreds of thousands of emails. How do I get my arms around it?" said Ellen Blanchard, director of discovery and information governance at T-Mobile.
3 minute read
By Dan Roe | David Gialanella | August 18, 2022
While not as resourced as large firms, midsize firms can use data to win over clients, raise rates and improve recruitment and retention.
7 minute read
By The Associated Press | August 16, 2022
The result is "a grave threat to civil liberties," the activists and two immigration advocacy groups argued. The lawsuit asks a Cook County judge to prevent the data broker from selling personal information without consent.
3 minute read
By Tim Parilla | August 16, 2022
Companies must develop programs to bulk up security and controls related to maintaining the privacy of customer information, and in-house legal teams must prioritize addressing the challenges that the inconsistent regular landscape creates.
7 minute read
Presented by BigVoodoo
The premier educational and networking event for employee benefits brokers and agents.
The Legal Intelligencer honors lawyers leaving a mark on the legal community in Pennsylvania and Delaware.
Consulting Magazine recognizes leaders in technology across three categories Leadership, Client Service and Innovation.
Truly exceptional Bergen County New Jersey Law Firm is growing and seeks strong plaintiff's personal injury Attorney with 5-7 years plaintif...
Shipman is seeking an associate to join our Labor & Employment practice in our Hartford, New Haven, or Stamford office. Candidates shou...
McCarter & English, LLP, a well established and growing law firm, is actively seeking a talented and driven associate having 2-5 years o...
MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS