Close X
Attorney Spotlight

After finishing her first year as an associate at Bass, Berry & Sims, find out what advice Margaret Dodson offers to new attorneys. Read more>

Search

Close X

Experience

Search our Experience

Experience Spotlight

On December 1, 2016, Parker Hannifin Corporation and CLARCOR Inc. announced that the companies have entered into a definitive agreement under which Parker will acquire CLARCOR for approximately $4.3 billion in cash, including the assumption of net debt. The transaction has been unanimously approved by the board of directors of each company. Upon closing of the transaction, expected to be completed by or during the first quarter of Parker’s fiscal year 2018, CLARCOR will be combined with Parker’s Filtration Group to form a leading and diverse global filtration business. Bass, Berry & Sims has served CLARCOR as primary corporate and securities counsel for 10 years and served as lead counsel on this transaction. Read more here.

CLARCOR
Close X

Thought Leadership

Enter your search terms in the relevant box(es) below to search for specific Thought Leadership.
To see a recent listing of Thought Leadership, click the blue Search button below.

Thought Leadership Spotlight

Blueprint for an IPO

Companies go public to raise capital to fuel growth, pay down debt and provide liquidity to shareholders. Although all issuers and offerings are different, the basic process of going public remains relatively constant. Blueprint for an IPO identifies the key players, details the process and identifies the obligations companies will face after going public.

Read now

Privacy Perils: What's in Your Container?

Firm Publication

Publications

July 21, 2017

The use of "containers" in web application development is growing, but not without potentially increasing threats to the security of the data we store in our apps and devices. Containers are stand-alone packages of software that include everything needed to run the bundle. Their portability and resilience, and more importantly the fact that they allow software to run efficiently when moved between different computing environments, make containers an increasingly attractive tool for web developers. But when apps and devices – including Uber, Google, Yelp, and Android and iPhone technology – employ containers that store personal information, some experts warn that the security of our information is at risk. For example, standalone containers operate as "black boxes," making it easy for hackers to capture information without evidence of intrusion. Containers may not be integrated with an organization's existing risk and governance structure. It's also difficult for developers – when containers show up – to verify their integrity. The use of containers is already widespread, and everyone from vendors to C-suite teams to consumers should be aware of the potential vulnerabilities in these tools and to advocate for ways to bolster the security of container software. This just serves as a reminder for everyone to be vigilant about entering personal data on devices and apps and to have strict password protection processes.

Privacy Perils imageCheck out our series, Privacy Perils, to learn what steps you can take to guard your personal and company data. For more information about this topic and other cyber security concerns, please contact Bob Brewer, Tony McFarland, Elizabeth Warren or a member of our Privacy & Data Security team.


Related Services

Notice

Visiting, or interacting with, this website does not constitute an attorney-client relationship. Although we are always interested in hearing from visitors to our website, we cannot accept representation on a new matter from either existing clients or new clients until we know that we do not have a conflict of interest that would prevent us from doing so. Therefore, please do not send us any information about any new matter that may involve a potential legal representation until we have confirmed that a conflict of interest does not exist and we have expressly agreed in writing to the representation. Until there is such an agreement, we will not be deemed to have given you any advice, any information you send may not be deemed privileged and confidential, and we may be able to represent adverse parties.