FCPA Compliance and Ethics Report-Episode 124, The Oscars and Compliance, Part I with Jay Rosen
fcpa Compliance and Ethics Report-Episode 106-interview with Gini Deitrich
A Moment of Simple Justice - Snitching Ain't Easy
Polsinelli Podcasts - Be Careful What you Put in Writing - What Companies Need to Know About Document Retention
Jail Time for Revenge Porn Offenses?
FCPA Compliance and Ethics Report-Episode 3-Interview with Marie Patterson, Vice President of Marketing for Hiperos
What you need to know about Canada's new Anti-Spam Law (CASL)
Why Ending FCC Blackout Rules May Be Broadcast TV's Demise
FCC Proposes New Rules On Local Wireless Siting
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
Employer Social Media Policies – Interview with Mitch Danzig, Member, Member, Mintz Levin
JOBS Act Implementation Regulations
Polsinelli Podcast - Public Policy Issues in 2013
Condo Adviser: Condominium Rules and Enforcement
Condo Adviser: What is 'FHA approved,' exactly?
Condo Owners and Dealing with Uncooperative Management Companies
Reserve Funds: Purposes and Common Mistakes
Instapundit: America's IP Laws Need to be "Pruned Back"
Polsinelli Podcast - Social Media at Work - What's Allowed and What Isn't?
Release of new book on the 'Best Practices Under the FCPA and Bribery Act"
Managing litigation effectively, including controlling legal costs, especially litigation costs, is important for business owners, small and large. A recent article in InsideCounsel suggests that an important part of...more
On January 1, 2013, new rules governing indemnification in construction contracts went into effect under SB 474 in California. The new law impacts commercial real estate, and public and residential projects.
The big picture...more
The US Supreme Court sometimes makes news by refusing to hear cases, not by taking them. That was certainly the case on May 29, 2012 when the Supreme Court declined to hear a case in which Minnesota’s high court upheld state...more
The same tools and practices that help technology users maintain and administer their computer systems in an efficient and confidential manner may also be used improperly to spoil digital data and other evidence that is...more
Find a Communications & Media Author »
Back to Top