Cybersecurity has remained a priority for the Chinese government in 2016. The second draft of the Cybersecurity Law was released for public comment on July 5, 2016. Although still in draft form, when it is adopted, the Cybersecurity Law will impose a number of requirements on companies with business operations within the territory of China that have been subject to heated discussions among multinational companies (MNCs).
- October 14, 2016Tiana Zhang, Jodi Wu, Sally Han and Mike He
Since the dawn of the new millennium, technology has been expanding the reach and ability of criminals at breakneck speeds. Regulators have constantly found themselves running behind a new era of cyberthreats and dangers, struggling to respond to accidents while fortifying the road ahead.
October 14, 2016Ricci DipshanAnalyzing data and providing the right kind of data is critically important to every aspect of legal activities. When you're expecting data to act as a secret weapon in the sales process, the courtroom, or to provide a strong foundation for your firm, the quality of your information is priceless. To uphold your firm's integrity and ensure its success, it's time to get your staffers off Google and arm them with data intelligence.
October 14, 2016Lauren BakewellAs a fan of technology, and legal technology specifically, I spend a lot of time researching what's new, helpful, or just plain interesting. Below are my top 10 as of this moment in 2016. All of them will either help improve how you run your law firm, plan for retirement, or will improve your personal life in some small but excellent way.
October 14, 2016Dan LearWith all of society's technological advancements, it is a bit shocking that there has only been ONE technology ever developed to sniff out lies. The polygraph, invented in 1921, has barely advanced since.
October 13, 2016Karen EllisAmerican companies, and foreign companies doing business in the United States, routinely collaborate with outside entities in mutually beneficial joint ventures and strategic partnerships. In that process, however, these companies can risk losing protection for their critical trade secrets to outsiders.
October 13, 2016Christopher Pelham and Frederick D. FriedmanThis edition of the Quarterly State Compliance Review looks at some legislation of interest to corporate lawyers that went into effect between Aug. 1 and Oct. 1, 2016, including amendments to Delaware's corporation and LLC laws. It also looks at some recent cases of interest, including two decisions from the Delaware Chancery Court.
October 13, 2016Sandra FeldmanMassive cyberattacks and data breaches have become routine. The window of opportunity for obtaining insurance coverage for the resulting costs under "traditional" first-party or general liability policies is rapidly closing. Here's what you need to know.
October 13, 2016Peri N. MahaleyHigh-profile cyberattacks and data breaches have become routine occurrences. Cyber threats are so pervasive that many privacy and security experts advise that responsible parties ' like fiduciaries of employee benefit plans ' should prepare for when a data breach occurs, not if.
October 13, 2016Marc BussoneAmong the many responsibilities of an audit committee, overseeing the function of internal audit can be among the more challenging and complex. As a result, it is common for an internal audit function to be required and the scope of that function subject to the oversight of the audit committee. From a governance perspective, what is the mission of internal audit?
October 13, 2016William L. Floyd










