News

Many big data and technology companies consider “bug bounty” programs – incentive-based initiatives that reward “ethical” hackers who report data security bugs or vulnerabilities – attractive and cost-effective tools for weeding out security flaws....

For years, the National Industrial Security Program Operating Manual has required Government Contracting Agencies (GCA) to complete a National Interest Determination (NID) before granting access to Proscribed Information to a company that is...

With technology today, there are lots of electronic devices law firm employees can use to communicate and to complete legal work. From desktops, laptops, cell phones and tablets, all of these devices can be used to perform legal duties or communicate...

What are Accessory Structures? Real estate can have “accessories” too. A homeowner may construct a gazebo or storage shed to “accessorize” their home. Owners of an apartment complex might construct carports or a swimming pool. A restaurant may...

On Thursday, August 30, 2018, the Jacksonville Chapter of ACEDS held a panel discussion on “Data Destruction Minefields and Defensibility” at GuideWell Source. The panel, moderated by ACEDS Jax Board Member, Serena Selzer, covered topics ranging from...

The effective date for public calendar year filers to comply with the new lease accounting standard (ASC Topic 842) is fast approaching. The new standard will have a significant impact on how entities manage, account for and report impacts of lease...

We live in a digital era with smart phones, smart TV’s, and even smart homes. Every business in the world has the ability to now automate many of their processes. However, even with the availability of automation, there are still organizations...

Pages