Cyber security guide to the 10 most disruptive enterprise technologies – See more at: http://www.information-age.com/technology/security/123458260/cyber-security-guide-10-most-disruptive-enterprise-technologies#sthash.hNSgMi8Y.dpuf Cyber security guide to the 10 most disruptive enterprise technologies Deploying the latest and greatest technologies in an enterprise is one of the most effective ways of gaining competitive advantage, increasing efficiency, attracting the best talent, and, ultimately, driving new…
What Do Lawyers and In-House Counsel Really Think About Litigation Finance? Litigation finance—when investors back pending legal cases in exchange for a cut of the proceeds—continues to gain traction here in the U.S. despite lingering concerns that the practice may violate historic prohibitions on third-party funding of lawsuits, as WSJ reported on Monday. How much…
Temporary foreign worker changes side-swipe fashion industry Canada’s fashion industry appears to be the latest sector of the economy side-swiped by changes announced earlier this summer to the Temporary Foreign Worker Program. Fashion industry companies that hire foreign models say they have been lumped into the same category as employers who hire low-skilled workers in the…
FinCEN proposes to expand financial institution customer due diligence requirements The proposal would require financial institutions to identify beneficial owners of legal entities and codify existing customer due diligence guidance. In a continuing initiative to strengthen the customer due diligence (CDD) requirements imposed on regulated financial institutions under the Bank Secrecy Act (BSA),[1] on July 30,…
What To Do When The Partner Track Closes For senior associates up for partner, firms have become increasingly focused on business potential and less so on an associate’s ability to out class others in the courtroom or at the negotiating table. In the days of yore, the partner track in Biglaw was oftentimes a reward…
Laval police caught muddying cars in apparent Bill 3 protest Man who posted video to Facebook says officers were dirtying cars to protest proposed pension reforms. Laval police are investigating after a video was posted to Facebook that shows two of their squad cars racing through a muddy construction site and spattering a third cruiser parked nearby. Charles Ledoux…
REPORT: Russian Hackers Stole 1.2 Billion Internet Credentials A cybersecurity firm said it has uncovered about 1.2 billion Internet logins and passwords and more than 500 million email addresses amassed by a Russian crime ring, the largest known collection of such stolen data, the New York Times reported on Tuesday. Hold Security of Milwaukee, Wisconsin,…
The Top 25 Most Influential 2014 – Corporate-Commercial [Read more…] How General Counsel Can Prepare For Corporate Inversion Corporate inversions have been used for years as a powerful vehicle to optimize a company’s tax strategy. Inversion is the practice of reincorporating a company in a foreign country with lower corporate tax rates for the…
Temporary foreign worker agency Actyl Group sues McDonald’s Canada A company that recruits temporary foreign workers on behalf of Canadian employers has filed a lawsuit against McDonald’s Canada, alleging breach of contract and defamation of character. Graeme Young, the Manitoba lawyer representing Actyl Group Inc., which has recruited temporary foreign workers for McDonald’s in Western Canada, told…
Banks Burdened With Compliance Costs Outsource Home Loans As banks lose money on mortgages and retreat from the business, PHH Corp. is rushing to cash in. PHH, the biggest U.S. outsourcer of home loans, processes and originates mortgages on behalf of small banks and some of the world’s largest financial firms, including Morgan Stanley and…
Cyber security entrepreneurs: balancing secrecy and publicity As an address, “Nimrod House, Enigma Business Park”, seems particularly appropriate for a company involved in encryption and secure communications for the British military. A German Enigma machine was used by Allied codebreakers to decipher intelligence in the second world war, while the Nimrod was a UK maritime…
Are police becoming less keen on enforcing Canada’s pot laws? Police appear to be losing their zeal for investigating marijuana-related offences – particularly those related to cases of trafficking and production. While they are still searching people for pot and laying charges of possession, statistics suggest they are increasingly less likely to go to the…
Join Our Mailing List
Receive exclusive discounts, offers and agenda updates directly to your inbox.
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.