Customer lists, marketing plans, pricing structures, production processes, recipes, formulae, and more. State and federal law protects this knowledge so long as you treat it like the sensitive [...]
Rapid development and seismic changes in the utilization and distribution of Information Technology have led the AICPA Professional Ethics Executive Committee to organize a task force to review [...]
Cybercrime Update – Spear Phishing May Not Be Computer Fraud; Check Your Cyber Insurance
In Information and Business Technology PostedSpear Phishing, also known as “business email compromise” or BEC is rampant and the most likely method for defrauding a company. The typical scenario is an employee of a company receives an email [...]
Trademarks protect the usage of a name, phrase, logo or design that indicates the origin or source of goods or services. Brand names and signature logos are prime examples. Trademarks can often [...]
Movement to services is exploding across all business segments. One of the main motivators for this move is enhanced security as compared to on premise resources. However, cloud services come [...]
Take Care When Executing Electronically Signed Documents A favorite phishing ploy is the use of fake DocuSign or other electronic signature emails which, when you click on the link to the [...]
The Metaverse is coming. Is it the next Internet? Time will tell. But if history is a lesson for the future, it may be the wild west for IP rights in its early stages. I am sure many of you are [...]
On May 23, 2022, the United States Supreme Court issued a unanimous decision in Morgan v. Sundance, Inc., and rejected a court-created rule that benefitted defendants (typically employers), that [...]
Securing Sensitive Employee and Customer Information with a Written Plan
In Information and Business Technology, Intellectual Property PostedBusinesses are increasingly operating online and, as a result, are collecting more personal and confidential information. Because of this, it is more important than ever for businesses to be [...]
As of April 1, 2022, banking institutions now have 36 hours to report a computer-security incident to their federal regulators (FDIC, Office of the Comptroller of the Currency, or the Federal [...]