Main Menu Back to Page
{ Banner Image }

SEC-Regulated Companies Should Address Cybersecurity to Avoid Enforcement Risks

If 2018 was any indication, cybersecurity compliance should be high on the list of SEC-regulated companies’ priorities in 2019. Take, for example, the SEC’s 2018 enforcement action against Voya Financial Advisor, Inc. (“Voya”) for violation of the Red Flags Rule, which resulted in a $1 million settlement. Read More ›

Categories: Compliance, Cybersecurity

Three Steps to Forming a Charity or 501(c)(3) Organization

There are three general steps to forming a charity. If these steps have not occurred, your organization may not be tax-exempt and your donors may not be entitled to tax benefits. Below is a brief summary of the steps.  Read More ›

Categories: Non-profit, Tax-Exempt Organizations

Are Boards of Directors Responsible for Cybersecurity?

Whose responsibility within a company is cybersecurity? Should key decisions fall to IT, or should higher management be involved more heavily in day-to-day cybersecurity risk management? Given the large fines and compliance obligations facing companies today, it’s probably obvious to most that data privacy and security is not just a technology issue. Read More ›

Categories: Cybersecurity, Digital Assets

How are Businesses Preparing for Proposed Federal Data Privacy Legislation? Part One: Understanding Current Proposals

Federal data privacy legislation in the United States is looking increasingly likely to pass in the foreseeable future. This renewed outlook is a stark change for those who remember previous legislative proposals, like the 2009 Personal Data Privacy and Security Act that never received a floor vote. Read More ›

Categories: Cybersecurity, Privacy

Cybersecurity and Data Privacy Considerations in Due Diligence

Data privacy and cybersecurity concerns are changing the way potential investors and acquirers evaluate a target company through due diligence. Data and security related risks can be extremely costly – especially those that are not uncovered in due diligence. Read More ›

Categories: Cybersecurity, Did you Know?, Digital Assets, Privacy

Why Public WiFi is a Health Hazard

In the age of the mobile device, public WiFi is something that most of us will regularly use; whether in a coffee shop getting some extra work done or just waiting in an office area. The risks of this "free" commodity, however, are coming in faster than security specialists can deal with them. Read More ›

Categories: Cybersecurity, Did you Know?, Digital Assets

Ohio Enacts Unique Safe Harbor to Reduce Data Breach Litigation Risks

On November 2, 2018, Ohio became the most recent state to update its data breach laws by enacting the Ohio Data Protection Act. Read More ›

Categories: Cybersecurity, Digital Assets

Legal Essentials: Shifting Focus to Data Protection, Cybersecurity and Vendor Management

For an introduction to these areas, visit Taylor's previous video, an Introduction to Data Privacy, Cybersecurity and Third Party Vendor Management. 

In recent years, security risks and data breaches have increased and businesses are working to be better equipped to respond to emergency cyber attack and breach situations.  Read More ›

Categories: Cloud Computing, Cybersecurity, IT Contracts, Privacy

Legal Essentials: Biggest Mistakes when Dealing with Copyrights

What is a copyright? A copyright is a form of intellectual property that grants the creator of an original work exclusive rights to determine and decide whether, and under what conditions, the original work may be used by others. Read More ›

Categories: Copyright, Intellectual Property

Enforceability and Incorporation of Online Terms and Conditions

As the business world becomes increasingly more digital, more and more businesses are providing their standard terms and conditions online. Frequently, businesses will then attempt to incorporate those online terms and conditions into their written contracts. Read More ›

Categories: Compliance, Contracts