Find Practices and Attorneys:

Search

Contact Info

1 North Franklin
Suite 1200
Chicago, Illinois 60606
Phone: (312) 938-4070
Fax: (312) 540-1162

From the Press Room

  • The following activities will be affected: 1. Business curfew on non-essential businesses In effect nightly from 10:00 PM-6:00 AM Last call for serving liquor at 9:00 PM Take-out and curb-side pick-up at restaurants still permitted 2. Bars, breweries, and taverns without a food license are prohibited from operating any indoor… Read More →
    With COVID-19 numbers spiking amid an apparent pandemic wave, Gov. J.B. Pritzker today mandated the partial shutdown for establishments in Region 7 (Will and Kankakee counties) and Region 8 (DuPage and Kane counties). The new rules go into effect on Oct. 23. Mitigation measures taking effect October 23 in Regions… Read More →
    The U.S. Small Business Administration has released a simpler loan forgiveness application for Paycheck Protection Program (PPP) loans of $50,000 or less. This action streamlines the PPP forgiveness process to provide financial and administrative relief to America’s smallest businesses. The Application: https://www.sba.gov/sites/default/files/2020-10/PPP%20Loan%20Forgiveness%20Application%20Form%203508S.pdf?utm_medium=email&utm_source=govdelivery Instructions: https://www.sba.gov/sites/default/files/2020-10/PPP%20Loan%20Forgiveness%20Application%20Form%203508S%20Instructions.pdf?utm_medium=email&utm_source=govdelivery We are available to answer your… Read More →
    TIME FOR CYBERSECURITY: 12 STEPS TO IMPROVE YOUR INFORMATION SECURITY PRACTICES Step 7. Preparedness for Information Security Incidents. Developing a proper data breach response plan should be an integral part of your information security policy. Once an information security incident is discovered and confirmed, an investigation to determine the scope… Read More →
    TIME FOR CYBERSECURITY: 12 STEPS TO IMPROVE YOUR INFORMATION SECURITY PRACTICES  Step 5. Information Security Awareness Training. Once information security policies are developed, a business entity should communicate them to the entire workforce and then conduct employee training sessions. Regular employee trainings might cover lessons learned from previous information security… Read More →
    TIME FOR CYBERSECURITY: 12 STEPS TO IMPROVE YOUR INFORMATION SECURITY PRACTICES Step 3. Segment Your Network. Not all information collected from data subjects, namely your customers and clients, is personally identifiable information (“PII”) and requires identical security measures. Knowing your information inventory and classifying information according to the level of… Read More →