article thumbnail

Why Law Firms Need IT Policies

Kraft Kennedy

The answers to these and hundreds of other questions should be documented and considered integra l to the operations of all organizations, especially in industries where work product and client data are highly sensitive, and highly valuable. Is it acceptable to use your family computer to access your firm’s work product?

article thumbnail

Why Are We Still Classifying Companies by Industry?

Harvard Business

They have expanded far beyond the “Information Technology” tag attached to them by GICS. Today, technology is just a standard part of corporate infrastructure, like operations or marketing. But Information Technology doesn’t seem like the right category to group them into.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTI Consulting Interviews and Culture

Management Consulted

Litigation technology. Intellectual property. They did much of the work piecing together Mr. Madoff’s money trail and just recently flew over to Puerto Rico for the Puerto Rico Government, who hired FTI to improve operations of utilities and highway units (2014). Intellectual Property. Intellectual Property.

article thumbnail

The Brattle Group Interviews and Culture

Management Consulted

Intellectual property. Successful RAs come with a solid quantitative foundation and a comprehensive understanding of coursework in economics, computer science, operations research, mathematics, engineering, and statistics. Each day at The Brattle Group brings opportunities to make an impact. Practice Areas. Commercial damages.

Groups 100
article thumbnail

Data Breaches Aren’t Just an IT Issue - SPONSOR CONTENT FROM VERIZON

Harvard Business

And you probably won’t even know you’ve been affected until it’s too late to prevent significant damage to your company’s finances, operations, and reputation. Physical theft and loss : Laptops, USB drives, printed papers, and other information assets that are stolen or disappear.

Data 28
article thumbnail

Backdoor Government Decryption Hurts My Business and Yours

Harvard Business

Nowadays, cyberattacks come from a wide range of actors — from individual cybercriminals using ransomware to extort money from your local dentist, to sophisticated foreign states attempting to steal intellectual property. firms lose $15.4 million yearly due to hacking attacks , double the global average of $7.7 jurisdiction.

article thumbnail

Where Trump Does (and Doesn’t) Have Leverage with China

Harvard Business

He has two levels to operate on: first, directly influencing corporate investment and buying decisions, and second, diplomatic engagement with trading partners. information technology companies to disclose their proprietary source code, which is their core competitive advantage. Further, China seeks to force U.S.