Close Contact Us Now
Tap Here To Call Us

Articles Posted in Technology

Updated:

Legal Intelligencer: Court Provides Guidance on the Authentication of Social Media Posts, Or Does It?

In the April 12, 2018 edition of The Legal Intelligencer, Edward Kang, Managing Member of Kang Haggerty, writes Court Provides Guidance on the Authentication of Social Media Posts, Or Does It? Facebook has been making headlines lately over claims it shared personal data on more than 87 million people to the political…

Updated:

Mergers and Acquisitions (UPDATE)

Google is back in the news with another large sale M&A transaction, but this time, as the seller. In May of 2012, Google purchased Motorola for $12.5 billion in an effort to create a new means of producing hardware to operate the Android operating system.  Well this week, it seems…

Updated:

A Market of Acquisitions and Mergers

Many large corporations continue to flex their financial strength even in the modern economy, serving as an example to many smaller businesses that 2014 is the perfect time to expand.  Recently, mega giant Google bought smart home device designing… A Market of Acquisitions and Mergers Many large corporations continue to flex…

Updated:

Litigation Holds and Governor Christie

When dealing with legal matters, company records and data pertaining to litigation is of vital importance in the resolution of the matter at hand.  When a company becomes aware that it is involved in, or may become involved in, litigation, a litigation hold should… Litigation Holds When dealing with legal matters,…

Updated:

Personal Mobile Devices in the Workplace

by Jacklyn Fetbroyt Companies seeking to improve efficiency and employee interaction for work purposes have slowly begun to implement policies allowing employees to use laptops, tablets, and mobile devices in the work place.  One issue that arises with BYOD policies is with regard to the employee’s compensation.  First, who will…

Updated:

Wyndham Challenges Cyber Security Reach of Federal Trade Commission

A large part of society’s current foundation in the 21st century is unquestionably built upon the storage of billions of pieces of data that can be found and transferred in mere seconds.  With this great power comes the burden of developing and implementing tight forms of cyber security to hinder…