fcpa Compliance and Ethics Report-Episode 106-interview with Gini Deitrich
A Moment of Simple Justice - Snitching Ain't Easy
Polsinelli Podcasts - Be Careful What you Put in Writing - What Companies Need to Know About Document Retention
Jail Time for Revenge Porn Offenses?
FCPA Compliance and Ethics Report-Episode 3-Interview with Marie Patterson, Vice President of Marketing for Hiperos
What you need to know about Canada's new Anti-Spam Law (CASL)
Why Ending FCC Blackout Rules May Be Broadcast TV's Demise
FCC Proposes New Rules On Local Wireless Siting
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
What to expect from FCC Post-Governement Shutdown
Employer Social Media Policies – Interview with Mitch Danzig, Member, Member, Mintz Levin
JOBS Act Implementation Regulations
Polsinelli Podcast - Public Policy Issues in 2013
Condo Adviser: Condominium Rules and Enforcement
Condo Adviser: What is 'FHA approved,' exactly?
Condo Owners and Dealing with Uncooperative Management Companies
Reserve Funds: Purposes and Common Mistakes
Instapundit: America's IP Laws Need to be "Pruned Back"
Polsinelli Podcast - Social Media at Work - What's Allowed and What Isn't?
Release of new book on the 'Best Practices Under the FCPA and Bribery Act"
Welcome to Privacy Tuesday – here are five privacy & security bits and bytes to start your week:
1) California AG’s Data Breach Report: Who Is Handling Your Patients’ Confidential Health Information? -
There are 1.3 billion people on Facebook, half a billion “tweets” every day, and countless other ways to communicate that did not even exist five years ago. In response to this social media revolution, smart companies are...more
Insurance companies are increasingly the subject of Telephone Consumer Protection Act (TCPA) lawsuits. Any insurance company that communicates with its customers, job applicants, and others by phone or text using an automated...more
Compiled by @ComplexD from online public domain resources, provided for your review/use is this week’s update of key industry news, views, and events highlighting key electronic discovery related stories, developments, and...more
Pro-actively drafting cybersecurity policies and protocols is like doing a will for yourself, or an employee manual for your company. The thought process is that there is nothing imminently pressing that requires me to think...more
Does a party named as an additional insured under an insurance policy also qualify as an ”insured” under the policy for purposes of the interinsured exclusion? That was the question in a recent property damage case decided by...more
Social media postings, messages and records are subject to discovery in lawsuits. But like other forms of discovery, there are limits.
Courts don’t like fishing expeditions and will use state and federal laws to deny...more
In This Issue:
- Brinker: Meal and Rest Periods Clarified, But...
- Dodd-Frank and Bankruptcy Law
- New Faces: Points from the President
- Celebrity Brands: To Wed or Not to Wed?
- How Safe is your...more
Find a Communications & Media Author »
Back to Top