SlideShare a Scribd company logo
Eric E. Packel, Andrew Cripe, Daniel L. Farris, Scott M.
Gilbert, Matt Todd
Diamond Datascram Diaries:
Diamond Datascram Development
Datascram Development
• General Privacy Issues
• Internal Issues and Risks
• Product and Customer Privacy Issues and Strategies
• Protecting the program
• Patent?
• Copyright?
• Trademark?
• Trade Secret
• The Human Resources System
• Employment Agreements and Restrictive Covenant Drafting
Press Release
Tech Expert Launches Diamond Datascram
Skokie, IL, March 1, 2017/Newswire/--
Diamond Datascram, founded by nationally honored software developer Damien
Diamond, announces the launch of Datascram™. Datascram is an amazing new
software solution which identifies and prioritizes data, providing businesses with a
summary of outdated or unnecessary data which then can be easily and permanently
deleted or moved offsite. Analysis and surveys show that 52% of information stored
by organizations is considered dark data whose value is not known. Another 33% of
data is essentially obsolete or redundant. Datascram pulls information from the
business’ systems, applies algorithms and removes or culls that redundant and dark
data.
Make data scram. Forever
The Company is based in Skokie, IL but intends to operate nationwide.
Diamond Datascram
Diamond Datascram
Overview of Privacy Issues
For Technology-Enabled Companies:
 Internal Privacy & Security Compliance
– Personnel
– Customer Data
– Intellectual Property Protection
 Product/Customer Privacy & Security Considerations
– Privacy By Design
– Customer Compliance
Internal Privacy Issues
 Privacy Program Development
– Security Program
– Personnel Data
– Industry Regulations/Standards Compliance (HIPAA, ISO, NIST, PCI)
– Multinational Regimes (EU – GDPR, Privacy Shield, APAC, etc.)
– Vendor Management
 Initial Steps
– Gap Analysis/Privacy Assessment
– Policy Development
– Employee Training
– Exercises and Audits
Internal Privacy Risks
 The Cyber Skills Gap is Growing
– Companies are investing more than ever in cyber security
– Despite that fact, the number of successful attacks is increasing
– Cybercriminals are becoming more sophisticated at a faster rate
 Phishing Example
– In 60% of cases, attackers compromise an organization in minutes
– Median time to first click is 1:22
– 50% of recipient open the email within the first hour, 23% click
through
 99.9% of attacks exploit known vulnerabilities
Product Privacy Issues
 Customer Compliance
– Develop Using Privacy By Design
– Build to a Standard
– Consider Customer Controls
– Solve for Security and Onward Transfer
 Risks
– Eliminating Data that Must be Retained (Regulatory or Policy)
– Impact on IP (Old Data is Sometimes Useful in Product Development)
– Protected Data (PHI, PII, Personal Data)
– Breach
Mitigation Strategies
 Use the NIST Framework or ISO 27001/2 as a
Guide for Cybersecurity Planning
 Due Diligence – internal/external (vendors)
 Operational
 Contractual
 Cyber-Insurance
Operational Strategies
 Privacy by Design/Security by Design
 “Minimum Necessary”
– Don’t collect more than what you need
– Don’t retain longer than you need it
 Adopt/Adhere to Written Data Security Compliance Program
– Adopt Framework Standards
– Flow down to contractors
 Technical controls: (e.g. encryption on all devices/unless can justify why not)
 Physical security (e.g., data center security; geographically remote data centers)
 Administrative safeguards (cybersecurity training/ regular risk assessments/ risk
mitigation plans/audits)
 Breach notification plan/Incident Response Plan
 Readiness for new cyber-threats (Chinese hackers, economic espionage)
 Cyber-insurance
The Datascram Program
What protections apply?
• Patent?
• Trademark?
• Copyright?
• Trade Secret
High Level Distinctions
Patents:
• Limited duration property right
• Related to invention
• Granted by U.S. Patent and Trademark Office
• Public disclosure after grant
Protectable Materials for
Patents
• Machines
• Manufactured articles
• Industrial processes
• Chemical compositions
Trademarks
• Word, phrase, symbol, design
• Distinguishes and identifies the source of
goods from one party to another
Copyright
Protects original works of authorship such as:
• Literary
• Dramatic
• Musical
• Artistic
Patent Protection
• Authority for patents
• Patent process
• Applicability to a situation
17
Authority for a Patent
U.S. Constitution – Article 1, Section 8, Clause 8
The Congress shall have power ... To promote the progress of science and
useful arts, by securing for limited times to authors and inventors the exclusive
right to their respective writings and discoveries;
United States Code, Title 35
Patentability governed by Sections 100 – 105
101 – Patentable Subject Matter (process, machine, manufacture, or
composition of matter)
102 – Novelty (anticipation/prior art)
103 – Obviousness (person of ordinary skill in the art)
18
 Application
– Provisional
– Non-Provisional
 Office Action
– Non-Final
– Final
 Issue Fee
 Grant
 Term: For patents filed after 1995, 20 years from the
earliest filing date of the application on which the patent
was granted…
19
Patent Process
Patent Components
 Inventor
 Assignee
 Date (Priority/Filing/Issue)
 Cited References, etc.
 Abstract (Short Summary)
 Figures/Drawings
 Background (Problem)
 Summary (Overview)
 Detailed Description
 Claims
The Human Resources System
 An Effective “Human Resources System” starts with
comprehensive Workforce Visibility
– Employees and Owners
– Interns (or, “Interns”/free labor)
– Contingent Workers
– Consultants, Independent Contractors & Vendors
 Adopt scalable and practical approach (the system needs to
grow with the Company)
 Consider the “Terms and Conditions” applicable to all
Company “Human Resources”
– Legal duties & classifications (FLSA, tax code, etc.)
– Non-Employee agreement terms critical
Workforce Policies
 Why/When Written Policies?
 What Must You Include?
 What Needs Updating—and Why?
Written Policies? The Basics
 Define Expectations/Culture
 Help Avoid Certain Contract Claims
 Can Help Provide A Good Defense
 Comply with Law
Certain Policies are “Musts”
 Anti-Harassment/EEO/anti-retaliation
 FMLA
 Confidentiality
 Open Door/Hotline
 Drug/Alcohol
 No Right to Privacy/Monitoring
 Wages/TO
 “Musts” expand with Company
Certain Policies are Nice to
Have
 Will depend on business
needs & culture:
 Vacation/sick leave, PTO
 Code of ethics & business
conduct
 Standards of personal
conduct (dress code,
attendance, etc.)
The times they are a-changing
 Firearms policies
 Social media policies
 Workplace violence prevention (and domestic
violence leave)
 Drug testing and medical or legal marijuana
 Compliance complaint and investigations
processes & hotlines (a challenge at start up!)
Remember Section 7
 Section 7 provides that
“employees shall have the
right to self-organization, to
form, join, or assist labor
organizations, to bargain
collectively . . . And to engage
in other concerted activities
for the purpose of collective
bargaining or other mutual
aid or protection.”
Confidentiality
Not OK:
-”Do not discuss ‘customer or
employee information’ outside
of work including ‘phones
numbers and addresses”
-”Never publish or disclose
confidential or other
proprietary information.
Never publish or report on
conversations that are meant
to be internal”
OK:
-”No unauthorized disclosure of
‘business secrets’ or other
confidential information”
-”Do not disclose confidential
financial data, or other non-public
proprietary company information. Do
not share confidential information
regarding business partners, vendors
or customers”
Conduct Toward Fellow
Employees
Not OK:
-”Don’t pick fights online”
-”Material that is fraudulent,
harassing, embarrassing,
sexually explicit, profane,
obscene, intimidating,
defamatory, or otherwise
unlawful or inappropriate may
not be sent by email.”
OK:
-”Making inappropriate
gestures, including staring”
-”No use of racial slurs,
derogatory comments, or
insults”
-”Threatening, intimidating,
coercing, or otherwise
interfering with the job
performance of fellow
employees or visitors”
Interaction with Third Parties
(including media)
Not OK:
-”Employees not authorized to speak
to representatives of the print
and/or electronic media about
company matters” “unless
designated to do so by HR, and must
refer all media inquiries to the
company media hotline”
-”If you are contacted by any gov’t
agency you should contact the Law
Dep’t immediately for assistance”
OK:
-”The company strives to anticipate
and manage crisis situations in order
to reduce disruption to our
employees and to maintain our
reputation as a high quality
company. To best serve these
objectives, the company will respond
to the news media in a timely and
professional manner only through
the designated spokespersons.”
Company Logos, Copyrights
and Trademarks
Not OK:
-”Do not use Company logos,
trademarks, graphics, or
advertising materials in social
media”
-Company logos and
trademarks may not be used
without written consent”
OK:
-”Respect all copyright and other
intellectual property laws. For
company’s protection (and your
own), it is critical that you show
proper respect for the laws
governing copyright, fair use of
copyrighted material owned by
others, trademarks and other
intellectual property, including
Employers, copyrights, trademarks
and brands”
Employment Agreements and
Restrictive Covenants
• Q: Who needs an employment agreement?
• A: Not everybody.
• Consider less restrictive means:
• Offer Letters
• RCA / NDA
• Employee Handbook / Policies
Employment Agreements
The Basics
• Title and Duties
• Other employment
• Term
• At-will or defined time period
• If at-will, what is the consideration?
• Compensation
• Any bonus structure must be clear or linked to a plan.
• Stock / Equity awards must be carefully worded and consistent with
any governing plan documents
• Benefits
• Health Insurance, Vacation, Auto Allowance, Expenses
• Compliance with other policies
Employment Agreements
Additional Considerations
 Severance?
– Define Cause – Under what conditions will severance not be owed?
– Preconditions, i.e. executing a waiver and release
 Restrictive Covenants
 Intellectual Property
 Return of Property
 Governing Law and Venue Selection
 Arbitration
 Incorporation of other Agreements
 Attorneys’ Fees
 Non-Disclosure / Confidentiality
 Intellectual Property and Inventions
 Non-Compete
 Non-Solicit
– Clients and Customers
– Vendors and Suppliers
– Employees and Contractors
Restrictive Covenants
What Falls Under That Umbrella?
 Geographic and Temporal Scope
– Where and for how long?
– Consider job duties.
 Scope of the Restriction
– What can’t be done?
– Who can’t it be done with?
 Will the covenants adapt to the employee’s
changing roles with the Company?
Proper Tailoring is Critical
Know the State of Affairs
 State law typically governs enforceability.
– California and North Dakota – Nope.
– Some states have unique rules, i.e. Illinois,
Louisiana, Oklahoma, South Dakota.
 Have you considered consideration?
 Choice of Law and Venue
Fast Start Employment Services
for Start-Ups
To receive your
complimentary copy of
this document, please
contact your Polsinelli
Labor and Employment
attorney, or email
national Practice Chair
Nancy Rafuse at
nrafuse@polsinelli.com.
Keep Your Secrets Secret
 Simply having a confidentiality provision is not
adequate – employers must take
demonstrable steps to protect their secrets.
– Password protection.
– Usage restrictions, including personal email
addresses.
– Limited distribution and access.
Datascram Dominance
Next time – Datascram has caught on like fire! Looking to go public and
global. Competition for top talent is fierce! Topics next time:
• HR considerations with Mergers and Acquisitions
• Hiring from Competitors
• Staffing Arrangements
• Global HR/Legal Issues
SAVE THE DATE – MAY 9, 2017
Polsinelli provides this material for informational purposes only. The material
provided herein is general and is not intended to be legal advice. Nothing
herein should be relied upon or used without consulting a lawyer to consider
your specific circumstances, possible changes to applicable laws, rules and
regulations and other legal issues. Receipt of this material does not establish
an attorney-client relationship.
Polsinelli is very proud of the results we obtain for our clients, but you should
know that past results do not guarantee future results; that every case is
different and must be judged on its own merits; and that the choice of a
lawyer is an important decision and should not be based solely upon
advertisements.
© 2016 Polsinelli PC. In California, Polsinelli LLP.
Polsinelli is a registered mark of Polsinelli PC

More Related Content

What's hot

Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10
Rob Levey
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
Ashish Jain
 
(Webinar Slides) How to Start and Grow an IP Practice
(Webinar Slides) How to Start and Grow an IP Practice(Webinar Slides) How to Start and Grow an IP Practice
(Webinar Slides) How to Start and Grow an IP Practice
MyCase Legal Case and Practice Management Software
 
Workplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and MethodsWorkplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and Methods
cmilliken09
 
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Financial Poise
 
SNW Fall 2009
SNW Fall 2009SNW Fall 2009
SNW Fall 2009
Jeff Kubacki
 
Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases
 Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases
Ten Common e-Discovery Mistakes to Avoid in Wage and Hour CasesNadia Brannon
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
university of education,Lahore
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
Raymond Cunningham
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 
Mwlug Compliance And E Discovery Policies
Mwlug   Compliance And E Discovery PoliciesMwlug   Compliance And E Discovery Policies
Mwlug Compliance And E Discovery Policies
LotusDR
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Shawn Tuma
 
Engineering Ethics - Rights of engineers
Engineering Ethics - Rights of engineersEngineering Ethics - Rights of engineers
Engineering Ethics - Rights of engineers
Donalduo
 
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley
 
Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
Silvia Afrima Chandra
 
Cyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach ResponseCyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach Response
Shawn Tuma
 
An information management update for in house counsel
An information management update for in house counselAn information management update for in house counsel
An information management update for in house counsel
Dan Michaluk
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
Raymond Cunningham
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
UNIVERSITAS TEKNOKRAT INDONESIA
 

What's hot (20)

Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
(Webinar Slides) How to Start and Grow an IP Practice
(Webinar Slides) How to Start and Grow an IP Practice(Webinar Slides) How to Start and Grow an IP Practice
(Webinar Slides) How to Start and Grow an IP Practice
 
Workplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and MethodsWorkplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and Methods
 
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
 
SNW Fall 2009
SNW Fall 2009SNW Fall 2009
SNW Fall 2009
 
Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases
 Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases
Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Mwlug Compliance And E Discovery Policies
Mwlug   Compliance And E Discovery PoliciesMwlug   Compliance And E Discovery Policies
Mwlug Compliance And E Discovery Policies
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
 
Engineering Ethics - Rights of engineers
Engineering Ethics - Rights of engineersEngineering Ethics - Rights of engineers
Engineering Ethics - Rights of engineers
 
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
 
Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
 
Cyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach ResponseCyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach Response
 
An information management update for in house counsel
An information management update for in house counselAn information management update for in house counsel
An information management update for in house counsel
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
 

Viewers also liked

The Ruby Files: The Terminator. You Won't Be Back.
The Ruby Files: The Terminator. You Won't Be Back.The Ruby Files: The Terminator. You Won't Be Back.
The Ruby Files: The Terminator. You Won't Be Back.
Polsinelli PC
 
Mitigating litigation risk at the deal table webinar part 1
Mitigating litigation risk at the deal table webinar part 1Mitigating litigation risk at the deal table webinar part 1
Mitigating litigation risk at the deal table webinar part 1
Polsinelli PC
 
Government Investigations and Enforcement Actions
Government Investigations and Enforcement ActionsGovernment Investigations and Enforcement Actions
Government Investigations and Enforcement Actions
Polsinelli PC
 
OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...
OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...
OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...
Polsinelli PC
 
Fraud & Abuse: 2016 Year in Review
Fraud & Abuse: 2016 Year in ReviewFraud & Abuse: 2016 Year in Review
Fraud & Abuse: 2016 Year in Review
Polsinelli PC
 
False Claims Act for Labor and Employment and Health Care Practitioners
False Claims Act for Labor and Employment and Health Care PractitionersFalse Claims Act for Labor and Employment and Health Care Practitioners
False Claims Act for Labor and Employment and Health Care Practitioners
Polsinelli PC
 
Successor and Alter-Ego Liability
Successor and Alter-Ego LiabilitySuccessor and Alter-Ego Liability
Successor and Alter-Ego Liability
Polsinelli PC
 
The Ruby Files: A Whisper, a Wink, and a 40 Year-Old Aptitude Flunky
The Ruby Files: A Whisper, a Wink, and a 40 Year-Old Aptitude FlunkyThe Ruby Files: A Whisper, a Wink, and a 40 Year-Old Aptitude Flunky
The Ruby Files: A Whisper, a Wink, and a 40 Year-Old Aptitude Flunky
Polsinelli PC
 
Are you following_the_script may 2015
Are you following_the_script may 2015Are you following_the_script may 2015
Are you following_the_script may 2015
Polsinelli PC
 
Cloud computing and hipaa navigating and mitigating the inevitable data breach
Cloud computing and hipaa   navigating and mitigating the inevitable data breachCloud computing and hipaa   navigating and mitigating the inevitable data breach
Cloud computing and hipaa navigating and mitigating the inevitable data breach
Polsinelli PC
 
Hot topics in employment law SHRM presentation April 8, 2015
Hot topics in employment law   SHRM presentation April 8, 2015Hot topics in employment law   SHRM presentation April 8, 2015
Hot topics in employment law SHRM presentation April 8, 2015
Polsinelli PC
 
Mitigating Litigation Risk at the Deal Table M&A Part II
Mitigating Litigation Risk at the Deal Table M&A Part II Mitigating Litigation Risk at the Deal Table M&A Part II
Mitigating Litigation Risk at the Deal Table M&A Part II
Polsinelli PC
 
Kansas City Labor and Employment Roundtable
Kansas City Labor and Employment RoundtableKansas City Labor and Employment Roundtable
Kansas City Labor and Employment Roundtable
Polsinelli PC
 
Claims by acquirers sellers and unsuccessful bidders
Claims by acquirers sellers and unsuccessful biddersClaims by acquirers sellers and unsuccessful bidders
Claims by acquirers sellers and unsuccessful bidders
Polsinelli PC
 
The Ruby Files: Transition and the Fight for Bathroom Equality
The Ruby Files: Transition and the Fight for Bathroom EqualityThe Ruby Files: Transition and the Fight for Bathroom Equality
The Ruby Files: Transition and the Fight for Bathroom Equality
Polsinelli PC
 
The Ruby Files: The Case of the Disappearing Secrets and an Independent Contr...
The Ruby Files: The Case of the Disappearing Secrets and an Independent Contr...The Ruby Files: The Case of the Disappearing Secrets and an Independent Contr...
The Ruby Files: The Case of the Disappearing Secrets and an Independent Contr...
Polsinelli PC
 
M&A Stockholder Claims
M&A Stockholder ClaimsM&A Stockholder Claims
M&A Stockholder Claims
Polsinelli PC
 
Life Cycle of the Employee: Recruitment, Talent
Life Cycle of the Employee: Recruitment, Talent Life Cycle of the Employee: Recruitment, Talent
Life Cycle of the Employee: Recruitment, Talent
Polsinelli PC
 
Life cycle of employee training and development - may 2015
Life cycle of employee   training and development - may 2015Life cycle of employee   training and development - may 2015
Life cycle of employee training and development - may 2015
Polsinelli PC
 
The Ruby Files: Managing the Challenging Employee
The Ruby Files: Managing the Challenging EmployeeThe Ruby Files: Managing the Challenging Employee
The Ruby Files: Managing the Challenging Employee
Polsinelli PC
 

Viewers also liked (20)

The Ruby Files: The Terminator. You Won't Be Back.
The Ruby Files: The Terminator. You Won't Be Back.The Ruby Files: The Terminator. You Won't Be Back.
The Ruby Files: The Terminator. You Won't Be Back.
 
Mitigating litigation risk at the deal table webinar part 1
Mitigating litigation risk at the deal table webinar part 1Mitigating litigation risk at the deal table webinar part 1
Mitigating litigation risk at the deal table webinar part 1
 
Government Investigations and Enforcement Actions
Government Investigations and Enforcement ActionsGovernment Investigations and Enforcement Actions
Government Investigations and Enforcement Actions
 
OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...
OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...
OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...
 
Fraud & Abuse: 2016 Year in Review
Fraud & Abuse: 2016 Year in ReviewFraud & Abuse: 2016 Year in Review
Fraud & Abuse: 2016 Year in Review
 
False Claims Act for Labor and Employment and Health Care Practitioners
False Claims Act for Labor and Employment and Health Care PractitionersFalse Claims Act for Labor and Employment and Health Care Practitioners
False Claims Act for Labor and Employment and Health Care Practitioners
 
Successor and Alter-Ego Liability
Successor and Alter-Ego LiabilitySuccessor and Alter-Ego Liability
Successor and Alter-Ego Liability
 
The Ruby Files: A Whisper, a Wink, and a 40 Year-Old Aptitude Flunky
The Ruby Files: A Whisper, a Wink, and a 40 Year-Old Aptitude FlunkyThe Ruby Files: A Whisper, a Wink, and a 40 Year-Old Aptitude Flunky
The Ruby Files: A Whisper, a Wink, and a 40 Year-Old Aptitude Flunky
 
Are you following_the_script may 2015
Are you following_the_script may 2015Are you following_the_script may 2015
Are you following_the_script may 2015
 
Cloud computing and hipaa navigating and mitigating the inevitable data breach
Cloud computing and hipaa   navigating and mitigating the inevitable data breachCloud computing and hipaa   navigating and mitigating the inevitable data breach
Cloud computing and hipaa navigating and mitigating the inevitable data breach
 
Hot topics in employment law SHRM presentation April 8, 2015
Hot topics in employment law   SHRM presentation April 8, 2015Hot topics in employment law   SHRM presentation April 8, 2015
Hot topics in employment law SHRM presentation April 8, 2015
 
Mitigating Litigation Risk at the Deal Table M&A Part II
Mitigating Litigation Risk at the Deal Table M&A Part II Mitigating Litigation Risk at the Deal Table M&A Part II
Mitigating Litigation Risk at the Deal Table M&A Part II
 
Kansas City Labor and Employment Roundtable
Kansas City Labor and Employment RoundtableKansas City Labor and Employment Roundtable
Kansas City Labor and Employment Roundtable
 
Claims by acquirers sellers and unsuccessful bidders
Claims by acquirers sellers and unsuccessful biddersClaims by acquirers sellers and unsuccessful bidders
Claims by acquirers sellers and unsuccessful bidders
 
The Ruby Files: Transition and the Fight for Bathroom Equality
The Ruby Files: Transition and the Fight for Bathroom EqualityThe Ruby Files: Transition and the Fight for Bathroom Equality
The Ruby Files: Transition and the Fight for Bathroom Equality
 
The Ruby Files: The Case of the Disappearing Secrets and an Independent Contr...
The Ruby Files: The Case of the Disappearing Secrets and an Independent Contr...The Ruby Files: The Case of the Disappearing Secrets and an Independent Contr...
The Ruby Files: The Case of the Disappearing Secrets and an Independent Contr...
 
M&A Stockholder Claims
M&A Stockholder ClaimsM&A Stockholder Claims
M&A Stockholder Claims
 
Life Cycle of the Employee: Recruitment, Talent
Life Cycle of the Employee: Recruitment, Talent Life Cycle of the Employee: Recruitment, Talent
Life Cycle of the Employee: Recruitment, Talent
 
Life cycle of employee training and development - may 2015
Life cycle of employee   training and development - may 2015Life cycle of employee   training and development - may 2015
Life cycle of employee training and development - may 2015
 
The Ruby Files: Managing the Challenging Employee
The Ruby Files: Managing the Challenging EmployeeThe Ruby Files: Managing the Challenging Employee
The Ruby Files: Managing the Challenging Employee
 

Similar to The Diamond Datascram Diaries: Diamond Datascram Development

UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final
nycgarcia
 
Inventor boot camp 2010
Inventor boot camp 2010Inventor boot camp 2010
Inventor boot camp 2010
dr2tom
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
Jim Brashear
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
asundaram1
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
nykobap01
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
pixvilx
 
Maximizing and protecting ip
Maximizing and protecting ipMaximizing and protecting ip
Maximizing and protecting ip
Nerve2012
 
Maximizing and protecting ip
Maximizing and protecting ipMaximizing and protecting ip
Maximizing and protecting ipeophiladelphia
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media Rockstar
 
Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical
mallisonshavon
 
ACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD Webcast
Logikcull.com
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance
Dovetail Software
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Perficient, Inc.
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
Social Media and The Law
Social Media and The LawSocial Media and The Law
Social Media and The Law
Our Social Times
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
Marc S. Sokol
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacysalehnia
 

Similar to The Diamond Datascram Diaries: Diamond Datascram Development (20)

UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final
 
Inventor boot camp 2010
Inventor boot camp 2010Inventor boot camp 2010
Inventor boot camp 2010
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
Maximizing and protecting ip
Maximizing and protecting ipMaximizing and protecting ip
Maximizing and protecting ip
 
Maximizing and protecting ip
Maximizing and protecting ipMaximizing and protecting ip
Maximizing and protecting ip
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
 
Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical
 
#7 Insurance
#7 Insurance#7 Insurance
#7 Insurance
 
ACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD WebcastACEDS-Driven March 2015 BYOD Webcast
ACEDS-Driven March 2015 BYOD Webcast
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Social Media and The Law
Social Media and The LawSocial Media and The Law
Social Media and The Law
 
Introduction to trade secret
Introduction to trade secretIntroduction to trade secret
Introduction to trade secret
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 

More from Polsinelli PC

Tax Cuts & Job Act Implications for Small Business Investments Companies
Tax Cuts & Job Act Implications for Small Business Investments Companies Tax Cuts & Job Act Implications for Small Business Investments Companies
Tax Cuts & Job Act Implications for Small Business Investments Companies
Polsinelli PC
 
Preventing Compliance Quagmires in Senior Living Communities: Part 1 - Can So...
Preventing Compliance Quagmires in Senior Living Communities: Part 1 - Can So...Preventing Compliance Quagmires in Senior Living Communities: Part 1 - Can So...
Preventing Compliance Quagmires in Senior Living Communities: Part 1 - Can So...
Polsinelli PC
 
Life After Escobar – Recent Developments In False Claims Act Litigation
Life After Escobar – Recent Developments In False Claims Act LitigationLife After Escobar – Recent Developments In False Claims Act Litigation
Life After Escobar – Recent Developments In False Claims Act Litigation
Polsinelli PC
 
The Emerald Series: Emily's Road to the Ideal Workplace Get to Work (Off the ...
The Emerald Series: Emily's Road to the Ideal Workplace Get to Work (Off the ...The Emerald Series: Emily's Road to the Ideal Workplace Get to Work (Off the ...
The Emerald Series: Emily's Road to the Ideal Workplace Get to Work (Off the ...
Polsinelli PC
 
Big Decisions: ACO Participation Reforming and Unwinding in 2019
Big Decisions: ACO Participation Reforming and Unwinding in 2019Big Decisions: ACO Participation Reforming and Unwinding in 2019
Big Decisions: ACO Participation Reforming and Unwinding in 2019
Polsinelli PC
 
Tax Cuts & Jobs Act Implications for Banking Institutions
Tax Cuts & Jobs Act Implications for Banking Institutions Tax Cuts & Jobs Act Implications for Banking Institutions
Tax Cuts & Jobs Act Implications for Banking Institutions
Polsinelli PC
 
340B Drug Pricing Under the Microscope
340B Drug Pricing Under the Microscope340B Drug Pricing Under the Microscope
340B Drug Pricing Under the Microscope
Polsinelli PC
 
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & SecurityThe Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
Polsinelli PC
 
The Emerald Series: It's (not) in the Handbook
The Emerald Series: It's (not) in the HandbookThe Emerald Series: It's (not) in the Handbook
The Emerald Series: It's (not) in the Handbook
Polsinelli PC
 
Health Care "Prime" - The Future of the Ownership, Organization, Payment, and...
Health Care "Prime" - The Future of the Ownership, Organization, Payment, and...Health Care "Prime" - The Future of the Ownership, Organization, Payment, and...
Health Care "Prime" - The Future of the Ownership, Organization, Payment, and...
Polsinelli PC
 
The Trump Labor Board Goes Back to the Future
The Trump Labor Board Goes Back to the FutureThe Trump Labor Board Goes Back to the Future
The Trump Labor Board Goes Back to the Future
Polsinelli PC
 
Fraud and Abuse - 2017 Year in Review
Fraud and Abuse - 2017 Year in ReviewFraud and Abuse - 2017 Year in Review
Fraud and Abuse - 2017 Year in Review
Polsinelli PC
 
Health Care Policy Forecast: What to Expect in 2018
Health Care Policy Forecast: What to Expect in 2018Health Care Policy Forecast: What to Expect in 2018
Health Care Policy Forecast: What to Expect in 2018
Polsinelli PC
 
Lessons learned from litigating real estate development projects
Lessons learned from litigating real estate development projectsLessons learned from litigating real estate development projects
Lessons learned from litigating real estate development projects
Polsinelli PC
 
Blockchain in Health Care
Blockchain in Health CareBlockchain in Health Care
Blockchain in Health Care
Polsinelli PC
 
Mitigating Risk When Managing High Dose, Chronic Pain Patients
Mitigating Risk When Managing High Dose, Chronic Pain Patients Mitigating Risk When Managing High Dose, Chronic Pain Patients
Mitigating Risk When Managing High Dose, Chronic Pain Patients
Polsinelli PC
 
The Feds Are Coming! Session One: The Rules Have Changed
The Feds Are Coming! Session One: The Rules Have ChangedThe Feds Are Coming! Session One: The Rules Have Changed
The Feds Are Coming! Session One: The Rules Have Changed
Polsinelli PC
 
Diamond Datascram Decimated
Diamond Datascram DecimatedDiamond Datascram Decimated
Diamond Datascram Decimated
Polsinelli PC
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning
Polsinelli PC
 
Class Actions Close-Up
Class Actions Close-UpClass Actions Close-Up
Class Actions Close-Up
Polsinelli PC
 

More from Polsinelli PC (20)

Tax Cuts & Job Act Implications for Small Business Investments Companies
Tax Cuts & Job Act Implications for Small Business Investments Companies Tax Cuts & Job Act Implications for Small Business Investments Companies
Tax Cuts & Job Act Implications for Small Business Investments Companies
 
Preventing Compliance Quagmires in Senior Living Communities: Part 1 - Can So...
Preventing Compliance Quagmires in Senior Living Communities: Part 1 - Can So...Preventing Compliance Quagmires in Senior Living Communities: Part 1 - Can So...
Preventing Compliance Quagmires in Senior Living Communities: Part 1 - Can So...
 
Life After Escobar – Recent Developments In False Claims Act Litigation
Life After Escobar – Recent Developments In False Claims Act LitigationLife After Escobar – Recent Developments In False Claims Act Litigation
Life After Escobar – Recent Developments In False Claims Act Litigation
 
The Emerald Series: Emily's Road to the Ideal Workplace Get to Work (Off the ...
The Emerald Series: Emily's Road to the Ideal Workplace Get to Work (Off the ...The Emerald Series: Emily's Road to the Ideal Workplace Get to Work (Off the ...
The Emerald Series: Emily's Road to the Ideal Workplace Get to Work (Off the ...
 
Big Decisions: ACO Participation Reforming and Unwinding in 2019
Big Decisions: ACO Participation Reforming and Unwinding in 2019Big Decisions: ACO Participation Reforming and Unwinding in 2019
Big Decisions: ACO Participation Reforming and Unwinding in 2019
 
Tax Cuts & Jobs Act Implications for Banking Institutions
Tax Cuts & Jobs Act Implications for Banking Institutions Tax Cuts & Jobs Act Implications for Banking Institutions
Tax Cuts & Jobs Act Implications for Banking Institutions
 
340B Drug Pricing Under the Microscope
340B Drug Pricing Under the Microscope340B Drug Pricing Under the Microscope
340B Drug Pricing Under the Microscope
 
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & SecurityThe Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
 
The Emerald Series: It's (not) in the Handbook
The Emerald Series: It's (not) in the HandbookThe Emerald Series: It's (not) in the Handbook
The Emerald Series: It's (not) in the Handbook
 
Health Care "Prime" - The Future of the Ownership, Organization, Payment, and...
Health Care "Prime" - The Future of the Ownership, Organization, Payment, and...Health Care "Prime" - The Future of the Ownership, Organization, Payment, and...
Health Care "Prime" - The Future of the Ownership, Organization, Payment, and...
 
The Trump Labor Board Goes Back to the Future
The Trump Labor Board Goes Back to the FutureThe Trump Labor Board Goes Back to the Future
The Trump Labor Board Goes Back to the Future
 
Fraud and Abuse - 2017 Year in Review
Fraud and Abuse - 2017 Year in ReviewFraud and Abuse - 2017 Year in Review
Fraud and Abuse - 2017 Year in Review
 
Health Care Policy Forecast: What to Expect in 2018
Health Care Policy Forecast: What to Expect in 2018Health Care Policy Forecast: What to Expect in 2018
Health Care Policy Forecast: What to Expect in 2018
 
Lessons learned from litigating real estate development projects
Lessons learned from litigating real estate development projectsLessons learned from litigating real estate development projects
Lessons learned from litigating real estate development projects
 
Blockchain in Health Care
Blockchain in Health CareBlockchain in Health Care
Blockchain in Health Care
 
Mitigating Risk When Managing High Dose, Chronic Pain Patients
Mitigating Risk When Managing High Dose, Chronic Pain Patients Mitigating Risk When Managing High Dose, Chronic Pain Patients
Mitigating Risk When Managing High Dose, Chronic Pain Patients
 
The Feds Are Coming! Session One: The Rules Have Changed
The Feds Are Coming! Session One: The Rules Have ChangedThe Feds Are Coming! Session One: The Rules Have Changed
The Feds Are Coming! Session One: The Rules Have Changed
 
Diamond Datascram Decimated
Diamond Datascram DecimatedDiamond Datascram Decimated
Diamond Datascram Decimated
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning
 
Class Actions Close-Up
Class Actions Close-UpClass Actions Close-Up
Class Actions Close-Up
 

Recently uploaded

RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
OmGod1
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
BRELGOSIMAT
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
Purushottam Jha
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
OmGod1
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
Introducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdfIntroducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdf
AHRP Law Firm
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
patrons legal
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
KHURRAMWALI
 

Recently uploaded (20)

RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Introducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdfIntroducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdf
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
 

The Diamond Datascram Diaries: Diamond Datascram Development

  • 1. Eric E. Packel, Andrew Cripe, Daniel L. Farris, Scott M. Gilbert, Matt Todd Diamond Datascram Diaries: Diamond Datascram Development
  • 2. Datascram Development • General Privacy Issues • Internal Issues and Risks • Product and Customer Privacy Issues and Strategies • Protecting the program • Patent? • Copyright? • Trademark? • Trade Secret • The Human Resources System • Employment Agreements and Restrictive Covenant Drafting
  • 3. Press Release Tech Expert Launches Diamond Datascram Skokie, IL, March 1, 2017/Newswire/-- Diamond Datascram, founded by nationally honored software developer Damien Diamond, announces the launch of Datascram™. Datascram is an amazing new software solution which identifies and prioritizes data, providing businesses with a summary of outdated or unnecessary data which then can be easily and permanently deleted or moved offsite. Analysis and surveys show that 52% of information stored by organizations is considered dark data whose value is not known. Another 33% of data is essentially obsolete or redundant. Datascram pulls information from the business’ systems, applies algorithms and removes or culls that redundant and dark data. Make data scram. Forever The Company is based in Skokie, IL but intends to operate nationwide.
  • 6. Overview of Privacy Issues For Technology-Enabled Companies:  Internal Privacy & Security Compliance – Personnel – Customer Data – Intellectual Property Protection  Product/Customer Privacy & Security Considerations – Privacy By Design – Customer Compliance
  • 7. Internal Privacy Issues  Privacy Program Development – Security Program – Personnel Data – Industry Regulations/Standards Compliance (HIPAA, ISO, NIST, PCI) – Multinational Regimes (EU – GDPR, Privacy Shield, APAC, etc.) – Vendor Management  Initial Steps – Gap Analysis/Privacy Assessment – Policy Development – Employee Training – Exercises and Audits
  • 8. Internal Privacy Risks  The Cyber Skills Gap is Growing – Companies are investing more than ever in cyber security – Despite that fact, the number of successful attacks is increasing – Cybercriminals are becoming more sophisticated at a faster rate  Phishing Example – In 60% of cases, attackers compromise an organization in minutes – Median time to first click is 1:22 – 50% of recipient open the email within the first hour, 23% click through  99.9% of attacks exploit known vulnerabilities
  • 9. Product Privacy Issues  Customer Compliance – Develop Using Privacy By Design – Build to a Standard – Consider Customer Controls – Solve for Security and Onward Transfer  Risks – Eliminating Data that Must be Retained (Regulatory or Policy) – Impact on IP (Old Data is Sometimes Useful in Product Development) – Protected Data (PHI, PII, Personal Data) – Breach
  • 10. Mitigation Strategies  Use the NIST Framework or ISO 27001/2 as a Guide for Cybersecurity Planning  Due Diligence – internal/external (vendors)  Operational  Contractual  Cyber-Insurance
  • 11. Operational Strategies  Privacy by Design/Security by Design  “Minimum Necessary” – Don’t collect more than what you need – Don’t retain longer than you need it  Adopt/Adhere to Written Data Security Compliance Program – Adopt Framework Standards – Flow down to contractors  Technical controls: (e.g. encryption on all devices/unless can justify why not)  Physical security (e.g., data center security; geographically remote data centers)  Administrative safeguards (cybersecurity training/ regular risk assessments/ risk mitigation plans/audits)  Breach notification plan/Incident Response Plan  Readiness for new cyber-threats (Chinese hackers, economic espionage)  Cyber-insurance
  • 12. The Datascram Program What protections apply? • Patent? • Trademark? • Copyright? • Trade Secret
  • 13. High Level Distinctions Patents: • Limited duration property right • Related to invention • Granted by U.S. Patent and Trademark Office • Public disclosure after grant
  • 14. Protectable Materials for Patents • Machines • Manufactured articles • Industrial processes • Chemical compositions
  • 15. Trademarks • Word, phrase, symbol, design • Distinguishes and identifies the source of goods from one party to another
  • 16. Copyright Protects original works of authorship such as: • Literary • Dramatic • Musical • Artistic
  • 17. Patent Protection • Authority for patents • Patent process • Applicability to a situation 17
  • 18. Authority for a Patent U.S. Constitution – Article 1, Section 8, Clause 8 The Congress shall have power ... To promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries; United States Code, Title 35 Patentability governed by Sections 100 – 105 101 – Patentable Subject Matter (process, machine, manufacture, or composition of matter) 102 – Novelty (anticipation/prior art) 103 – Obviousness (person of ordinary skill in the art) 18
  • 19.  Application – Provisional – Non-Provisional  Office Action – Non-Final – Final  Issue Fee  Grant  Term: For patents filed after 1995, 20 years from the earliest filing date of the application on which the patent was granted… 19 Patent Process
  • 20. Patent Components  Inventor  Assignee  Date (Priority/Filing/Issue)  Cited References, etc.  Abstract (Short Summary)  Figures/Drawings  Background (Problem)  Summary (Overview)  Detailed Description  Claims
  • 21. The Human Resources System  An Effective “Human Resources System” starts with comprehensive Workforce Visibility – Employees and Owners – Interns (or, “Interns”/free labor) – Contingent Workers – Consultants, Independent Contractors & Vendors  Adopt scalable and practical approach (the system needs to grow with the Company)  Consider the “Terms and Conditions” applicable to all Company “Human Resources” – Legal duties & classifications (FLSA, tax code, etc.) – Non-Employee agreement terms critical
  • 22. Workforce Policies  Why/When Written Policies?  What Must You Include?  What Needs Updating—and Why?
  • 23. Written Policies? The Basics  Define Expectations/Culture  Help Avoid Certain Contract Claims  Can Help Provide A Good Defense  Comply with Law
  • 24. Certain Policies are “Musts”  Anti-Harassment/EEO/anti-retaliation  FMLA  Confidentiality  Open Door/Hotline  Drug/Alcohol  No Right to Privacy/Monitoring  Wages/TO  “Musts” expand with Company
  • 25. Certain Policies are Nice to Have  Will depend on business needs & culture:  Vacation/sick leave, PTO  Code of ethics & business conduct  Standards of personal conduct (dress code, attendance, etc.)
  • 26. The times they are a-changing  Firearms policies  Social media policies  Workplace violence prevention (and domestic violence leave)  Drug testing and medical or legal marijuana  Compliance complaint and investigations processes & hotlines (a challenge at start up!)
  • 27. Remember Section 7  Section 7 provides that “employees shall have the right to self-organization, to form, join, or assist labor organizations, to bargain collectively . . . And to engage in other concerted activities for the purpose of collective bargaining or other mutual aid or protection.”
  • 28. Confidentiality Not OK: -”Do not discuss ‘customer or employee information’ outside of work including ‘phones numbers and addresses” -”Never publish or disclose confidential or other proprietary information. Never publish or report on conversations that are meant to be internal” OK: -”No unauthorized disclosure of ‘business secrets’ or other confidential information” -”Do not disclose confidential financial data, or other non-public proprietary company information. Do not share confidential information regarding business partners, vendors or customers”
  • 29. Conduct Toward Fellow Employees Not OK: -”Don’t pick fights online” -”Material that is fraudulent, harassing, embarrassing, sexually explicit, profane, obscene, intimidating, defamatory, or otherwise unlawful or inappropriate may not be sent by email.” OK: -”Making inappropriate gestures, including staring” -”No use of racial slurs, derogatory comments, or insults” -”Threatening, intimidating, coercing, or otherwise interfering with the job performance of fellow employees or visitors”
  • 30. Interaction with Third Parties (including media) Not OK: -”Employees not authorized to speak to representatives of the print and/or electronic media about company matters” “unless designated to do so by HR, and must refer all media inquiries to the company media hotline” -”If you are contacted by any gov’t agency you should contact the Law Dep’t immediately for assistance” OK: -”The company strives to anticipate and manage crisis situations in order to reduce disruption to our employees and to maintain our reputation as a high quality company. To best serve these objectives, the company will respond to the news media in a timely and professional manner only through the designated spokespersons.”
  • 31. Company Logos, Copyrights and Trademarks Not OK: -”Do not use Company logos, trademarks, graphics, or advertising materials in social media” -Company logos and trademarks may not be used without written consent” OK: -”Respect all copyright and other intellectual property laws. For company’s protection (and your own), it is critical that you show proper respect for the laws governing copyright, fair use of copyrighted material owned by others, trademarks and other intellectual property, including Employers, copyrights, trademarks and brands”
  • 32. Employment Agreements and Restrictive Covenants • Q: Who needs an employment agreement? • A: Not everybody. • Consider less restrictive means: • Offer Letters • RCA / NDA • Employee Handbook / Policies
  • 33. Employment Agreements The Basics • Title and Duties • Other employment • Term • At-will or defined time period • If at-will, what is the consideration? • Compensation • Any bonus structure must be clear or linked to a plan. • Stock / Equity awards must be carefully worded and consistent with any governing plan documents • Benefits • Health Insurance, Vacation, Auto Allowance, Expenses • Compliance with other policies
  • 34. Employment Agreements Additional Considerations  Severance? – Define Cause – Under what conditions will severance not be owed? – Preconditions, i.e. executing a waiver and release  Restrictive Covenants  Intellectual Property  Return of Property  Governing Law and Venue Selection  Arbitration  Incorporation of other Agreements  Attorneys’ Fees
  • 35.  Non-Disclosure / Confidentiality  Intellectual Property and Inventions  Non-Compete  Non-Solicit – Clients and Customers – Vendors and Suppliers – Employees and Contractors Restrictive Covenants What Falls Under That Umbrella?
  • 36.  Geographic and Temporal Scope – Where and for how long? – Consider job duties.  Scope of the Restriction – What can’t be done? – Who can’t it be done with?  Will the covenants adapt to the employee’s changing roles with the Company? Proper Tailoring is Critical
  • 37. Know the State of Affairs  State law typically governs enforceability. – California and North Dakota – Nope. – Some states have unique rules, i.e. Illinois, Louisiana, Oklahoma, South Dakota.  Have you considered consideration?  Choice of Law and Venue
  • 38. Fast Start Employment Services for Start-Ups To receive your complimentary copy of this document, please contact your Polsinelli Labor and Employment attorney, or email national Practice Chair Nancy Rafuse at nrafuse@polsinelli.com.
  • 39. Keep Your Secrets Secret  Simply having a confidentiality provision is not adequate – employers must take demonstrable steps to protect their secrets. – Password protection. – Usage restrictions, including personal email addresses. – Limited distribution and access.
  • 40. Datascram Dominance Next time – Datascram has caught on like fire! Looking to go public and global. Competition for top talent is fierce! Topics next time: • HR considerations with Mergers and Acquisitions • Hiring from Competitors • Staffing Arrangements • Global HR/Legal Issues SAVE THE DATE – MAY 9, 2017
  • 41. Polsinelli provides this material for informational purposes only. The material provided herein is general and is not intended to be legal advice. Nothing herein should be relied upon or used without consulting a lawyer to consider your specific circumstances, possible changes to applicable laws, rules and regulations and other legal issues. Receipt of this material does not establish an attorney-client relationship. Polsinelli is very proud of the results we obtain for our clients, but you should know that past results do not guarantee future results; that every case is different and must be judged on its own merits; and that the choice of a lawyer is an important decision and should not be based solely upon advertisements. © 2016 Polsinelli PC. In California, Polsinelli LLP. Polsinelli is a registered mark of Polsinelli PC