The American Heritage College Dictionary defines the following two terms:
- Risk (n): The possibility of suffering harm or loss; danger.
- Management (n): The act, manner or practice of managing; handling, supervision or control.
When I put these two terms together, I understand that risk management means controlling the possibility of suffering harm, loss or danger. Whoever coined this business phrase is laughing. Out loud. Continue Reading
Guest Blogger: Mark E. Harrington, general counsel and corporate secretary at Guidance Software, Inc., oversees worldwide legal responsibility for Guidance Software. Before joining Guidance Software, Harrington held senior legal positions at technology companies such as Intel, as well as at the law firm of Munger, Tolles, and Olson.
“What you don’t know can hurt you” has never been truer than in the new age of rising corporate risk, as uncertainty over claim valuation, potential liability, and the increasing array of insider and outsider threats to sensitive data is causing even the best GCs to lose sleep. With legal and information technology (IT) mentalities merging and general counsel now effectively becoming the “barometer for the business,” the best medicine is establishing the ability to make early judgment calls on risk exposure, mitigation and claim valuation. Continue Reading
On Sun.,Oct. 27, volunteers from the Association of Corporate Counsel (ACC), in conjunction with its annual conference in downtown Los Angeles, participated in a day of service.
About 35 in-house counsel, and ACC friends and family members volunteered their people-power and creativity in partnership with the Los Angeles Conservation Corps (LA Corps). The group planted Crepe Myrtle trees, painted storage bins, and installed water-wise plants within a community garden on the campus of Norwood Elementary School in South Los Angeles. Continue Reading
Guest Blogger: Juli Greenberg is corporate counsel of Heartland Payment Systems.
The core concept behind Big Data is that consumers aren’t the customers anymore; they are the product. Companies are learning to capitalize on collecting, storing, using, sharing and selling information about the consumers who purchase or use their products and services. For instance, mobile applications provide useful services for consumers, such as free map applications or social networking utilities, but often as a vehicle to collect data about those consumers for purposes unrelated to the mobile application. Continue Reading
Guest Blogger: Audra Dial is partner at Kilpatrick Townsend & Stockton, LLP.
The US Attorney General recently stated: “There are only two categories of companies affected by trade secret theft. Those that know they’ve been compromised — and those that don’t know it yet.”
With the click of a mouse and the insertion of a USB drive, trade secrets can be instantly compromised. The threat is particularly acute when competitors sense vulnerabilities — whether they are disgruntled employees, questionable business partners or unsophisticated contractors. Statistics confirm that nearly three-quarters of all trade secret misuse involves insiders. Continue Reading