Selling Cyber Insurance to Professional Services Firms
Rod Beckstrom Discusses Cyber Security and Metasploit
Look At Business Strategy Before the Bribe
Corruption Risk in the Defense Sector
Why You Should Have a White Collar Litigator on Speed Dial
Big Data: A Good Return on Investment for Your Business?
A Front-Line Interview on "the Currency of Impact" with Author Dorie Clark
FCPA Compliance and Ethics Report-Episode 198-Leona Lewis on her new podcast, the Masters of Disaster
Cyber Caremark: Protecting Your Board from Shareholder Derivative Litigation After a Data Loss Event
Why We Say Yes to Corruption
What will happen at my mediation?
How Ethical Behaviors Can "All Go So Wrong."
Information-sharing legislation is coming: Senator Chambliss shares 4 top points for companies
FCPA Compliance and Ethics Report-Episode 190-Interview with Vivian Carpenter, author of The Fifth Letter
Front Line Interview Episode 1. Alison Taylor: Organizations, Compliance & Corruption
FCPA Compliance and Ethics Report-Episode 189-Compliance Evangelist
The Social Engineering Cyber Exposure
Taking A Proactive Approach to Cyber Security
An FCPA Journey to the Darkside & Steps to Protect Your Organization
What is a hostile work environment?
Your company has been sued – what do you need to consider to comply with data preservation requirements? How do you address litigation holds, ediscovery and data retention? Robert Brownstone, litigation attorney and chair of...more
Preserving company E-mail that may be relevant in litigation is important for every business. Failure to do so can open a company to liability for breaching the duty to preserve evidence.
Sending a notice to employees who...more
Part Four in a multi-part series on the topic.
Searching for evidence in the form of email, text messages and instant messaging is increasingly important in lawsuits. However, requests for this type of evidence during the...more
Part Three in a multi-part series on the topic.
In Part One of this series, we discussed California’s Electronic Discovery Act. Part Two discussed the importance in legal proceedings of electronic information from social...more
California’s Electronic Discovery Act was signed into law on June 29, 2009, establishing procedures for parties to discover electronically stored information (“ESI”) from opposing parties for use as evidence in state court...more
By William S. Cherry, III
A 2010 litigation trends survey warns, “Companies Expect More Litigation.” Federal statistics indicate that the number of employees suing employers rose 35% from 2007 to 2011. A study conducted...more
Purchasing fraud is one of the most prevalent forms of occupational theft, but forensic accountants can help businesses detect and stop it. And, as one recent court case illustrates, valuation experts using sound methodology...more
In this issue: The Vivendi Ruling: Revisiting Three Key Issues (and Adding Two More); Delaware Chancery Court Update: Recent Decisions Shed New Light on Stapled Financing Offered by Financial Advisors, Duties of Directors...more
Our bi-monthly newsletter for attorneys featuring articles re: ACFE report highlighting the importance of antifraud controls; Authentication issues: Who creates ESI; Rule 26 Amendments extending greater work product...more
Class Action Against Whole Foods for "Case Discount" Problems Certified by the Northern District of Ohio...more
Corporate legal departments are facing budget reductions for 2009. At the same time, 71% of NLJ 250 firms are raising rates. What can corporate counsel do to meet their budgets?
This lively roundtable discussion between...more
Find a Business Organization Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top