Category Archives: Data Issues

Subscribe to Data Issues RSS Feed

Cloud Computing 101: Tips to Control Waste

In an industry poised to exceed $250 billion in the the coming years, there isn’t a better time to review your cloud deals to ensure your company is getting maximum value for its cloud spend. As Ian Barker reports, companies are wasting an enormous amount of money on cloud services. These excess costs can be reduced … Continue reading this entry

Tech Startups Play Critical Role in Development of Self-Driving Cars, According to Foley Survey

tech startups
Automakers and suppliers have been joined by a growing list of early-stage and established technology companies from outside the traditional automotive supply base in the race to build a truly connected car, and ultimately the first completely autonomous vehicle.… Continue reading this entry

Looking Ahead: Top Issues Impacting the Tech Industry in 2017

As technology continues to reshape how business gets done and the way people live their lives, there are many reasons to be excited about the tech industry’s prospects heading into 2017. The more than 300 executives, investors, and advisors that recently convened in Boston for Foley & Lardner’s annual FoleyTECH Boston 2016 conference, discussed the … Continue reading this entry

Tips for Protecting Your Company Against Cyberattacks

Cybersecurity has become, as it should, an extremely important topic on company boards’ agendas. The main question on everyone’s mind is: “How can we eliminate this problem?” The answer, unfortunately, is that you can’t. Hackers are becoming more sophisticated, and their knowledge evolves with every new technology. As discussed by a panel of experts at … Continue reading this entry

Three Trending Topics in IoT: Privacy, Security, and Fog Computing

Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the year 2015 has IoT enthusiasts particularly excited. This year, IoT has taken center stage at … Continue reading this entry

Acquisition of HERE – a Prime Example of How IP Can “Drive” Value

Earlier this month, the news reported that several automakers, including BMW, Audi and Daimler, agreed to acquire HERE Global (Nokia’s map business) for $2.8 billion. Reuters reported that HERE’s primary competitor is Google Maps, and that the automakers outbid Uber and Baidu. Why would the automakers pay billions for an alternative to Google Maps? What … Continue reading this entry

Mark Your Calendars: 2015 FOLEYTech Summit

Join us on October 1, 2015 as we explore how the evolution of technology has transformed business and altered the investing landscape. Our 11th annual FOLEYTech Summit will bring together tech entrepreneurs, executives, managers, investors and advisers.… Continue reading this entry

Top Three Cybersecurity Misconceptions

Cybersecurity is an issue that should be top-of-mind for all companies. But there are three misconceptions about cybersecurity that can put companies at significant risk. In this video, Foley Partner Michael Overly discusses these misconceptions and how companies should change their views of and approaches to cybersecurity.… Continue reading this entry

Taking Control of Cybersecurity: What Emerging Companies Need to Know

Security breaches have become all too common, and cyberattacks are not limited to the assaults on big companies that are reported in the news. With the global economic cost of cybercrime totaling more than $400 billion per year, cybersecurity has become a priority for executives and board members. Companies of all sizes across all industries should be … Continue reading this entry

IoT – It’s All About the Data, Right?

A few weeks ago, the FTC released a report on the Internet of Things (IoT). IoT refers to “things” such as devices or sensors – other than computers, smartphones, or tablets – that connect, communicate or transmit information with or between each other through the Internet. This year, there are estimated to be over 25 … Continue reading this entry

Regulatory Challenges Facing the mHealth Industry

Innovations in health care technology have created unique challenges for developers and investment companies. Among others, changing FDA guidelines, data security, and reimbursement are all substantial issues facing the rapidly evolving mobile health (mHealth) industry. At the 2014 FOLEYTech Summit, Foley special counsel Monica Chmielewski assembled a panel of industry leaders – Mary Modahl, Chief … Continue reading this entry

Tips for Protecting Your Data

With the global economic cost of cybercrime totaling more than $400 billion per year and breaches affecting companies ranging from retailers (e.g. Target, Walmart and Staples) and restaurants (Dairy Queen and Jimmy John’s) to tech companies (Snapchat), banks (JPMorgan), electronics and entertainment enterprises (Sony Corporation) and even NASA, companies of all sizes across all industries … Continue reading this entry

Big Companies Should Think and Act Like Startups to Keep Data Safe

With data security breaches now a shockingly common part of modern life, businesses of all sizes are scrambling to bolster their defenses. In this guest commentary in the Boston Business Journal, we explain how businesses can fight against data breaches by taking tips from startups, and even the hackers themselves. Here’s how: Think opportunity, not crisis. … Continue reading this entry

No, Seriously: Don't Forget the Minimum Wage

Start-up companies are often in cost-saving mode, but when it comes to employees, be prepared to pay at least a minimum wage. Many companies forget about it. All companies, regardless of size, must pay either the applicable state minimum wage (currently $8.00 per hour in Massachusetts) or $455 per week of salary for someone who … Continue reading this entry

Key Questions to Ask When Preparing a Data Breach Response Plan (Part II)

Following up on last week’s post, we return to the wide range of questions about a company’s operations that can guide a team building a data breach response plan to cover many of the risks encountered in the wake of a breach. Who are the key stakeholders? Many parts of an organization may be impacted – … Continue reading this entry

Key Questions to Ask When Preparing a Data Breach Response Plan (Part I)

As many companies have learned first-hand, data breaches and security incidents can arise at any time, and when they do, they can quickly consume an organization. Although companies often don’t get advance warning before a data breach occurs, you can better equip your organization to respond to the myriad of issues arising in the wake … Continue reading this entry

Defensive Publication: An Alternate Way of Maintaining Your Turf in a Competitive Marketplace

It is common knowledge that the bread-and-butter of emerging startups lies in securing exclusive rights to key aspects of their implicated technology. Staking claims to valuable IP assets via direct ownership or exclusive licensing remains a huge priority, especially in light of the America Invents Act’s First Inventor to File regime. The flipside to maintaining … Continue reading this entry

Big Data: Show Me the Money

As we covered in prior blog posts, on Tuesday, November 5, 2013, Foley & Lardner LLP hosted the ninth annual FoleyTech Summit in Boston. One of the breakout sessions at FoleyTech featured a panel discussion of leading innovators in the realm financing for “Big Data” processing companies, called “Big Data: Finding the Money.” The panel … Continue reading this entry

Are You Ready For California’s “Do Not Track” Requirements?

Over the last several months, California has passed several new privacy and data protection laws that impact operators of websites, online services and mobile applications around the country, including a law establishing an “Internet Eraser” for minors, and changes to the state’s data breach notification requirements. The latest bill, which amends the California Online Privacy … Continue reading this entry

Envision the Future: Today's Approach to Tomorrow's Solutions

Earlier this week, Foley hosted over 240 attendees in Boston at our 9th annual FOLEYTech Summit,  titled Envision the Future: Today’s Approach to Tomorrow’s Solutions. The Summit focused on how collectively entrepreneurs, private equity investors, venture capitalists, attorneys, accountants, board members and community resources can successfully grow technology companies, specifically in the Health Care IT, … Continue reading this entry

Think Before You Share, Part II: Can I Get My Data Back?

Following up on last week’s post, relationships with technology providers – even the best ones – don’t last forever, so it is important to understand whether (and how) you can get your data back when the relationship comes to an end.  You may be surprised to learn that many contracts are silent on this issue.… Continue reading this entry

Think Before You Share, Part I: Can They Use My Data, and If So, For What?

Increasingly, software vendors and professional services providers (for example, consultants and software implementation vendors) request or require access to their customers’ data as part of delivering their products and services. This kind of data sharing can produce powerful, low-cost products and services – but it is not without risk. Before you share your data with … Continue reading this entry