Privacy and Data Security

The Telephone Consumer Protection Act (TCPA) covers unsolicited calls and texts, aimed at protecting consumers from harassing and unwanted communications. With the April 2021 Facebook SCOTUS case[1] (see 

Continue Reading Don’t Have a Do-Not-Call Policy? Every SMS You Send Could Violate the TCPA and Come With A Private Right of Action

Chinh H. Pham and Brian J. Assessor co-authored an article titled “5 Trends to Watch in 2021: Emerging Technologies.” Trends include digital health, agribusiness, batteries, data and privacy, and artificial
Continue Reading 5 Trends to Watch in 2021: Emerging Technologies

From floating infrastructure to biohacking, floating solar farms to AgTech, projects that are first of their kind bring with them exciting opportunities, but also unique legal complexities. In this recent
Continue Reading Maneuvering ‘Unicorns’ – Opportunities and Risks of Unprecedented Projects


Continue Reading Selecting, Clearing, and Protecting Your IP–a Top Priority for Startups, StartupSac

This GT Advisory considers the application of state unclaimed property laws to cryptocurrencies, and the potential implications and challenges of such application for both industry participants and state unclaimed property
Continue Reading Cryptocurrencies and Unclaimed Property: Potential Implications of State Escheat Laws for the Blockchain Technology Industry

2018 was a year of transformation for the blockchain industry. While the market continued to see technological advancements in smart contracts, platform functionality, scalability and security, regulators took a firmer
Continue Reading Blockchain & Cryptocurrency Newsletter – Winter 2019

Migration is already underway, but some of the world’s largest organizations are still reluctant. They handle proprietary data and a staggering volume of transactions.  They want to marshal information and deliver nuanced results.  But a lack of appreciation for the Cloud’s promise, together with questions surrounding security and cost, make many CTOs and COOs cling to legacy systems.

shutterstock_110126165_778x360

At the surface, the Cloud is seemingly straightforward even for occasional users; using encryption and/or password protection, individuals log on to a website, smartphone app, or similar “thin” interface. They may send an email, manage ‘Internet-of-things’ controls, reserve a seat, store a document, access a data base, or subscribe to an online tool for accounting or lead tracking.  While it’s clear that the “back office” intelligence sits someplace else, users probably don’t appreciate the architecture.

Understanding the Cloud’s capabilities and shortcomings is key to a thoughtful migration strategy. Can organizations really save money by replacing their on-premise solutions?  How do they comply with regulations around the world addressing the collection, use and transfer of personal data?  When migrating, do they retain control of their systems?  What about cyber security?  Here’s a simplified description for non-technologists!


Continue Reading Cloud Migration Demystified