Close

Sourcing Speak

Updated:

Big Data, Big Trouble? Privacy and Legal Concerns with Big Data

Google has figured out that I shop for a lot of children’s clothing online, as my two children grow like weeds. Every time I launch a search, my banner ads link to brands that I have bought previously or similar brands that other consumers may have purchased. That is Big…

Updated:

Too Much of A Good Thing? Mind the Privacy Implications of iOS 7’s New MDM Capabilities in Your BYOD Workforce

In addition to the consumer hoopla over iOS 7, companies managing BYOD programs also have reason to rejoice. As reported on CIO.com, iOS 7 brings about a new level of control for companies through expanded app-level MDM Capabilities. MDM, or Mobile Device Management, is the technology that companies use to…

Updated:

Private Health Exchanges: Preparing for the Affordable Care Act

As the U.S. moves toward full implementation of the Federal Affordable Care Act (ACA, also known as Obamacare), employers are seeing new challenges and opportunities in the provision of health coverage and other benefits to their employees.Some predict that ACA will lead to cheaper, better, universal health care. Others predict…

Updated:

A Step Up on Step-In Rights

Most outsourcing contracts that I see contain a step-in right for the customer. Generally, a step-in right allows the customer to take over the outsourced operations if the supplier cannot or does not perform, and then “step out” when the supplier demonstrates that it will meet its contractual obligations. How…

Updated:

New watchdog study shows that approximately half of all web privacy policies are non-compliant and risk enforcement action

It has been said for some time that data is the new oil, but many global organizations continue to struggle to comply with regulatory requirements when it comes to the exploitation of this valuable resource. A recent worldwide audit of over 2,000 websites, coordinated by the Global Privacy Enforcement Network…

Updated:

Avoiding the Pitfalls of the “Unlimited” License – Four questions you should ask: The Third Question

Let’s quickly revisit the scenario we’ve been following through our first two installments. That is, you are a CIO faced with a decision on whether or not to enter into an “enterprise” or an “unlimited” license arrangement with a major software publisher. With the first installment, we explored the scope…

Updated:

Database Marketing Outsourcing

Database marketing outsourcing is a strategic transaction for retailers. This type of outsourcing can facilitate the integration of diverse marketing channels (e.g., web, social media, catalog and in-store sales) and enable more targeted and effective marketing to consumers. Database marketing encompasses a potentially broad array of services, including: • Implementation…

Updated:

Personal Email Privacy in a BYOD Environment – A View from the Bench

We recently posted a three-part series on BYOD issues in this blog. A primary theme was the inherent tension between employer control and employee privacy in a BYOD environment. In a recently reported case out of the Northern District of Ohio (Lazette v. Kulmatycki), the courts had an opportunity to…

Updated:

Help Clients Insure Against Cyberattacks

This article was originally published in the July 22, 2013 issue of Texas Lawyer. The constant threat of cyberattacks presents many and varying challenges for businesses. Insurance provides one way to deal with them. Because the market for insurance covering these risks and the law interpreting these policies both continue…

Contact Us