Cyber security guide to the 10 most disruptive enterprise technologies – See more at: http://www.information-age.com/technology/security/123458260/cyber-security-guide-10-most-disruptive-enterprise-technologies#sthash.hNSgMi8Y.dpuf Cyber security guide to the 10 most disruptive enterprise technologies Deploying the latest and greatest technologies in an enterprise is one of the most effective ways of gaining competitive advantage, increasing efficiency, attracting the best talent, and, ultimately, driving new…
What Do Lawyers and In-House Counsel Really Think About Litigation Finance? Litigation finance—when investors back pending legal cases in exchange for a cut of the proceeds—continues to gain traction here in the U.S. despite lingering concerns that the practice may violate historic prohibitions on third-party funding of lawsuits, as WSJ reported on Monday. How much…
What To Do When The Partner Track Closes For senior associates up for partner, firms have become increasingly focused on business potential and less so on an associate’s ability to out class others in the courtroom or at the negotiating table. In the days of yore, the partner track in Biglaw was oftentimes a reward…
Laval police caught muddying cars in apparent Bill 3 protest Man who posted video to Facebook says officers were dirtying cars to protest proposed pension reforms. Laval police are investigating after a video was posted to Facebook that shows two of their squad cars racing through a muddy construction site and spattering a third cruiser parked nearby. Charles Ledoux…
REPORT: Russian Hackers Stole 1.2 Billion Internet Credentials A cybersecurity firm said it has uncovered about 1.2 billion Internet logins and passwords and more than 500 million email addresses amassed by a Russian crime ring, the largest known collection of such stolen data, the New York Times reported on Tuesday. Hold Security of Milwaukee, Wisconsin,…
The Top 25 Most Influential 2014 – Corporate-Commercial [Read more…] How General Counsel Can Prepare For Corporate Inversion Corporate inversions have been used for years as a powerful vehicle to optimize a company’s tax strategy. Inversion is the practice of reincorporating a company in a foreign country with lower corporate tax rates for the…
Temporary foreign worker agency Actyl Group sues McDonald’s Canada A company that recruits temporary foreign workers on behalf of Canadian employers has filed a lawsuit against McDonald’s Canada, alleging breach of contract and defamation of character. Graeme Young, the Manitoba lawyer representing Actyl Group Inc., which has recruited temporary foreign workers for McDonald’s in Western Canada, told…
Cyber security entrepreneurs: balancing secrecy and publicity As an address, “Nimrod House, Enigma Business Park”, seems particularly appropriate for a company involved in encryption and secure communications for the British military. A German Enigma machine was used by Allied codebreakers to decipher intelligence in the second world war, while the Nimrod was a UK maritime…
Are police becoming less keen on enforcing Canada’s pot laws? Police appear to be losing their zeal for investigating marijuana-related offences – particularly those related to cases of trafficking and production. While they are still searching people for pot and laying charges of possession, statistics suggest they are increasingly less likely to go to the…
Big Law, Big Problems: The Bright Future For Small Firms The era of the small law firm is dawning. When I graduated from Yale Law in 2010, the majority of my classmates accepted positions as associates at major law firms in major metropolises. They worked themselves silly at the very bottom of the totem pole. Four…
An Exit Interview With DuPont GC Tom Sager Law firm preferred providers. Alternative fees. Diversity. If you want to bone up on most of the innovations in the modern American legal department, just Google the name “Tom Sager” and follow the links. Sager has been the consummate corporate and general counsel. Sager is an institution,…
Foreign workers program challenged in court A husband and wife who own two chain restaurants in Labrador have launched a constitutional challenge against Ottawa’s move to keep them from hiring foreign workers and place their businesses on an online blacklist. This is the first legal action against the federal government’s revamped temporary foreign workers program…
Join Our Mailing List
Receive exclusive discounts, offers and agenda updates directly to your inbox.
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.