Punk Rock and The Sale of Your e-Business
December 28, 2006
'Should I stay or should I go?'<br>That was the question that those classic '80s punk rockers The Clash asked in a song by the same title about a romance gone awry. That's just a song, though.<br>But, interestingly enough, that hard-driving ditty is applicable to the world of e-business: The entrepreneur contemplating the future of his or her business ' a love built of the same good times and bad, and with the same blood, sweat and tears as a real-life romance ' confronts the same dilemma when it's time to make that decision: Should he stay or should he go? How could a person not expect such perseveration? When an entrepreneur reads about the rapid rise of YouTube from startup to $1.65 billion buyout, he or she can easily forget about the many new firms that fail, and instead imagine being the personification of ' or fantasize about ' having a company that becomes the next tech-economy icon.
Beware of Phishing: How Landlords and Tenants Can Avoid the Hook
December 28, 2006
Although landlords and tenants often have different views on various topics, they share a common interest in protecting their premises against theft. Until recently, security considerations were generally limited to decisions concerning appropriate locks and the installation of stout hardware. In the new millennium, however, securing electronic entryways to premises may be of even greater importance, and it behooves landlords and tenants alike to keep abreast of developments in computer-related security breaches. In particular, landlords and tenants must be alert to a variety of identity theft threats, including phishing scams, in which they receive an e-mail from a seemingly reputable company (eg, a tenant receives an e-mail that appears to be from the landlord) that attempts to obtain personal information from the recipient when in fact the e-mail was sent by an identity thief.
Offshore Outsourcing: Protecting Privacy A World Away
December 28, 2006
Business process outsourcing (BPO) to offshore service providers has become an integral part of the global economy ' and integrally 'e' ' finding particular success in the financial services, health care and IT industries.<br>Studies confirm that offshore BPO will not only continue to grow, but accelerate in the years to come. One study projects that by 2010, the world's 100 largest financial institutions will move $400 billion of their cost base offshore, saving an average of just under $1.5 billion annually each. <br>This explosive trend will continue to create economic, political, cultural and legal challenges for all types of companies dealing with personal data and the regulations that cover the collection, movement, storage and accessing of it ' in the United States and abroad. And, given the popularity of financial services and health care BPO, privacy concerns are certain to figure largely in these challenges. This article provides an overview of some of the legal and practical implications of BPO to offshore vendors.
Confusion Over Regulation of Lawyers' Sites In Florida
December 28, 2006
To Google or not to Google is the dilemma plaguing the Florida Bar in its protracted debate over how to regulate law firm Internet sites. <br>Because the Bar Board of Governors deadlocked on proposed new Web site rules at its monthly meeting on Dec. 8 in Key Biscayne, law firm sites are completely unregulated as of Jan. 1. The Board tabled its discussion until this month.
CA Supreme Court Shields Web Re-publishers
December 28, 2006
People who republish defamatory content online cannot be held liable for defamation even if they were warned about it, the California Supreme Court ruled, 7-0, late last year.
Deepening Insolvency Is Sinking Fast
December 27, 2006
Uniformity among courts on this question has not been and may never be reached. Nevertheless, recent decisions from the Third Circuit, the Delaware Chancery Court, and the Southern District of New York reflect an unmistakable and growing trend toward restricting significantly or even rejecting claims for deepening insolvency. This article describes this emerging trend, and demonstrates that each of these cases reflects an approach that appears to have developed within these respective courts. The common thread underlying these decisions is a concern that recognition of a claim for deepening insolvency would discourage good faith efforts to turnaround a troubled company that qualify for protection under the business judgment rule. This article concludes by identifying serious weaknesses from which deepening insolvency claims suffer in light of these significant rulings.
The Growth of Litigation: A Global Trend
December 26, 2006
For the past three years, our law firm, Fulbright & Jaworski LLP, has conducted its Litigation Trends Survey, based on responses from senior-level in-house lawyers at companies in a variety of industries and at various revenue levels. In the first year, we surveyed only United States companies. Last year, we expanded our survey to encompass companies in the United Kingdom as well. This year's edition of the Litigation Trends Survey ' in recognition of the increasing globalization of the world economy and our own firm's rapid international expansion ' drew on responses from companies around the world. The survey results generally confirmed what prompted us to expand the scope of the Survey to begin with ' that companies are increasingly operating more globally and therefore face greater and more frequent challenges in protecting their interests in areas far from home.
Averting Data Security Threats From Portable Electronics
December 22, 2006
The proliferation of flash drives, iPods, camera cell phones, Black-berries, and similar electronic devices has put all companies at added risk for insider theft. With the use of these devices, downloading significant amounts of data is easy, virtually instantaneous, and often very difficult to detect. These risks apply to essentially all companies that allow employees access to electronically stored, confidential, and proprietary information.<br>So what is today's company supposed to do to protect its valuable, sensitive information in the face of the risks posed by new portable devices?
Data Security Breaches Offshore
December 22, 2006
Outsourcing decisions should be based in part on a comparison of data security in-house and at each vendor location; generally this is evaluated in terms of staff vetting, physical access security, database security, communications security, etc. But another vital consideration should be the effectiveness of each candidate location's legal preventive measures and remedies for data theft or misuse ' and the complexity and cost of securing those protections. This article, which surveys the state of data security legal protections in India, shows that making such a comparison is no simple matter.
Policing Employees' Online Access at Work
December 22, 2006
What are the risks for employers in instances where employees use company computers to access, view, download, store and possibly forward pornography or engage in illegal activities? How can corporate counsel both prevent these abuses and handle investigations if they suspect some kind of prohibited conduct is occurring in the workplace?