Angle
IPBM Decision Support: Using Metrics For Operational Success
3 Mins
A key component of IP operational maturity that we have been describing in this series is the recognition of the vital role data plays in operational success. Today’s business environment demands high performance while consistently reducing costs....
Read MoreSupporting the Hybrid Work Environment: Three Market Trends
3 Mins
The business world has changed drastically over recent years. A hybrid work model is now the new norm – especially in corporate settings. The virtual trend is even emerging in industries such as legal and healthcare which have been traditionally...
Read MoreIPBM: The Unifying Framework Behind IP Management
3 Mins
The first two installments in this series explained the evolution of the Intellectual Property Business Management (IPBM) model, noting that it is not a platform or “collaboration portal,” but rather a paradigm designed from the ground up to...
Read MoreCanada’s Long Awaited Privacy Bill Introduced: How Does it Stack Up?
4 Mins
There has been chatter in Canada for nearly two years about initiating comprehensive legislative reform to the country’s data privacy landscape. The process recently ramped up this June with the introduction of a bill to pass the Digital Charter...
Read MoreIPBM Evolves: Innovation Goes Social
3 Mins
Having described the modern Intellectual Property Business Management (IPBM) model in our prior post, we now focus on a key driver in the shift toward IPBM - the challenge of cultivating and protecting innovation . Nurturing the participation of...
Read MoreRemaining Compliant Amidst Challenges When Using Chat Applications in the Workplace
4 Mins
Communication is different in the modern workplace. Gone are the days of phone calls and email being the primary channels of interaction. Many organizations are frequently utilizing chat applications like Microsoft Teams for internal communication...
Read MoreHow to Handle Privilege When Producing Documents to the Government in Antitrust Matters
4 Mins
The identification of privileged content remains one of the most time-intensive undertakings of any discovery project. In recent years, there have been significant developments in the ability to use analytics tools and artificial intelligence (AI)...
Read MoreInternational Data Transfers: Knowing Which Rules Apply to Comply
3 min
While countries all over the globe continue to make data privacy strides, comparing similarities and differences between the EU and U.K. is important in light of Brexit. It is also crucial to know the differences as they impact transfers with the...
Read MoreElevating Cyber Risk Analysis During M&A Due Diligence
4 Mins
Before a deal closes on a merger or acquisition, due diligence investigation will ensue to confirm goal alignment and identify any obstacles present. There are several integral components of this process such as identifying transaction purpose...
Read MoreMandated Cyber and Privacy CLE for New York Attorneys – Will Other States Follow Suit?
3 Mins
The majority of U.S. states require attorneys with active law licenses to complete continuing legal education (CLE) credits. The number of hours, reporting deadlines, and topic requirements differ between jurisdictions. It is not only important...
Read MorePlanning for a Remediation: Proactive Considerations for Financial Institutions
3 Mins
Financial institutions are more regularly dealing with voluntary remediations and public consent order activity due to heightened scrutiny by regulators and changing internal policies. These events can be complex and also time consuming when...
Read More