Data computerData security breaches are impacting long-standing and start-up corporations, as well as public and private entities. No one is immune from these threats and understanding the prevalence is the first step in best preventing this from impacting your organization.

Continue Reading Gone Phishing: Data Security Breaches Affect Start-Ups and School Districts Alike

globe AsiaOn Thursday, June 15, 2017, by a vote of 98-2, the U.S. Senate overwhelmingly passed a bill that would potentially impose additional sanctions against Russia and give Congress the power to delay and/or prevent any action by President Trump to lift or relax sanctions against Russia. Tentatively titled the “Countering Russian Influence in Europe and Eurasia Act of 2017” (“CRIEEA”), the bill must now proceed to the U.S. House of Representatives for further deliberation and approval.

Continue Reading Senate Passes Potential Russian Sanctions Bill

Is your company prepared for a potential ransomware attack? Ransomware is a type of malicious software feared most by corporate boards and IT departments as it could completely shut down an entire network of computers and compromise large amounts of critical and sensitive data. In a post on Husch Blackwell’s Byte Back blog, Mindi Giftos provides simple yet important steps companies should take to prepare for and minimize the risk of a cyber attack.

Shanghai ChinaThe newly passed Cybersecurity Law of the People’s Republic of China will take effect in June 2017, and it is expected to have a significant impact on multinationals doing business in mainland China. The law affects both domestic and foreign companies operating on the Chinese mainland and covers a wide range of activities including the use of the internet, information and communications technologies, personal data, national security and more.

The difficulties with determining the steps needed to comply with such sweeping changes are only complicated by the fact that a large number of key terms in the law have yet to be clearly defined. As a result, China’s new Cybersecurity Law will continue to evolve as the national government interprets it.

Here are some key provisions to follow in the coming months.

Continue Reading Costs and Unanswered Questions of China’s New Cybersecurity Regime

swing sunset loveAny agreement between two parties begins with the rosy optimism that the good times will last forever. In the world of technology licensing and development, however, we know this is rarely the case. While this blog has previously considered data security oversight by the board of directors of the company, it is also important for a company’s legal and procurement teams to establish a plan for the security, use, and transition of its data throughout the contracting process. These issues are particularly important in highly regulated industries such as healthcare and financial services.

While there are many types of data issues that a company may need to address in any contract negotiation, our team has found that the following issues require consideration in nearly every technology licensing and development agreement.

Read the full list on our Byte Back blog.

Data LocksThe European Union and United States differ greatly on law regulating the collection and transfer of personal data. For many years companies could rely upon the U.S.–EU Safe Harbor to lawfully make transatlantic data transfers and bridge the gap between the differing privacy frameworks. But in October 2015, the EU Court of Justice invalidated the U.S.–EU Safe Harbor on the grounds that it did not adequately protect personal data. This ruling jeopardized the continued flow of data from the EU to the United States and left many companies wondering how they could continue collecting and using data from the EU without violating the law.

Husch Blackwell Partner Mindi Giftos covered this topic in further detail on the InBusiness website. Click here to read more.

websitePosting terms of use document on your website or mobile application defines the terms which govern your customer’s use of your website or mobile application and greatly reduce your exposure to liability when providing goods or services through a web-based application. A privacy policy describes to your consumers what information you collect, how you collect it and how you use it.  Posting a privacy policy provides notice to your customers so that they can make an informed decision on whether or not they want to use your web-based application after considering the data you collect and how you use it.

Continue Reading Terms of Use and Privacy Policy: Your Navigation System in the Ocean of E-Commerce

Digital BusinessIn its Technology Vision 2016 report, Accenture predicts that 25% of the world’s economy will be digital by 2020.  The global consulting firm contends that we are witnessing a major technology revolution, specifically a digital revolution.  It’s a revolution of emerging “digital platforms” comprised of cloud services, artificial intelligence, cognitive computing, predictive analytics and intelligent automation.

These platforms transform and replace traditional business processes in areas such as finance & accounting, HR, marketing, procurement, supply chain and more.  To quickly leverage these digital solutions, companies increasingly look to outsource traditional in-house functions to third party providers in what are referred to as Business Process Outsouring (BPO) transactions.

Continue Reading Outsourcing, Offshoring: BPO Deals are Soaring!

Computer screensAlthough more companies are purchasing software nowadays, spending perhaps tens of thousands of dollars a year in this one area, they continue to fall into the familiar trap of immediately signing pre-printed or online “form’ license agreements designed to protect the vendor not the purchaser. Some of these “form” agreements are non-negotiable, but many can be modified upon request.  Here are five important points to address in most software agreements, from the perspective of the purchaser:

Continue Reading 5 Key Points When Purchasing Software

On May 11, 2016, President Obama signed the Defend Trade Secrets Act of 2016 (DTSA), which amended the Economic Espionage Act of 1996 to create a federal civil remedy for trade secret misappropriation. lockThe DTSA governs misappropriations occurring after the effective date of May 11, 2016.

Although trade secret theft has been a federal crime since 1996, civil claims for trade secret misappropriation were almost always governed by state law. A corporation unable to establish a basis for federal jurisdiction was thus limited to state court. Although every state but two has adopted a variation of the Uniform Trade Secrets Act, these statutory variations and differing court interpretations created uncertainty in the application of trade secret law, an area of growing importance for companies increasingly dependent on electronic security.

Continue Reading Husch Blackwell Files One of First Lawsuits Brought Under the Defend Trade Secrets Act of 2016 (DTSA)