In the April 12, 2018 edition of The Legal Intelligencer, Edward Kang, Managing Member of Kang Haggerty, writes Court Provides Guidance on the Authentication of Social Media Posts, Or Does It? Facebook has been making headlines lately over claims it shared personal data on more than 87 million people to the political…
Articles Posted in Technology
Mergers and Acquisitions (UPDATE)
Google is back in the news with another large sale M&A transaction, but this time, as the seller. In May of 2012, Google purchased Motorola for $12.5 billion in an effort to create a new means of producing hardware to operate the Android operating system. Well this week, it seems…
A Market of Acquisitions and Mergers
Many large corporations continue to flex their financial strength even in the modern economy, serving as an example to many smaller businesses that 2014 is the perfect time to expand. Recently, mega giant Google bought smart home device designing… A Market of Acquisitions and Mergers Many large corporations continue to flex…
Litigation Holds and Governor Christie
When dealing with legal matters, company records and data pertaining to litigation is of vital importance in the resolution of the matter at hand. When a company becomes aware that it is involved in, or may become involved in, litigation, a litigation hold should… Litigation Holds When dealing with legal matters,…
Personal Mobile Devices in the Workplace
by Jacklyn Fetbroyt Companies seeking to improve efficiency and employee interaction for work purposes have slowly begun to implement policies allowing employees to use laptops, tablets, and mobile devices in the work place. One issue that arises with BYOD policies is with regard to the employee’s compensation. First, who will…
Wyndham Challenges Cyber Security Reach of Federal Trade Commission
A large part of society’s current foundation in the 21st century is unquestionably built upon the storage of billions of pieces of data that can be found and transferred in mere seconds. With this great power comes the burden of developing and implementing tight forms of cyber security to hinder…