FCPA Compliance and Ethics Report-Episode 3-Interview with Marie Patterson, Vice President of Marketing for Hiperos
What you need to know about Canada's new Anti-Spam Law (CASL)
Why Ending FCC Blackout Rules May Be Broadcast TV's Demise
FCC Proposes New Rules On Local Wireless Siting
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
What to expect from FCC Post-Governement Shutdown
Employer Social Media Policies – Interview with Mitch Danzig, Member, Member, Mintz Levin
Jason Maloni on Data Security
JOBS Act Implementation Regulations
Ernest DelBuono on Aviation
Jack Deschauer on Government Investigations
Polsinelli Podcast - Public Policy Issues in 2013
Condo Adviser: Condominium Rules and Enforcement
Condo Adviser: What is 'FHA approved,' exactly?
Condo Owners and Dealing with Uncooperative Management Companies
Reserve Funds: Purposes and Common Mistakes
Instapundit: America's IP Laws Need to be "Pruned Back"
Polsinelli Podcast - Social Media at Work - What's Allowed and What Isn't?
Release of new book on the 'Best Practices Under the FCPA and Bribery Act"
[Legal Perspective] When Is It NOT Okay to Delete Your Social Media Account?
Big data is only going to get bigger, my friends....more
Who ultimately owns the data? How will your data be shared? Wouldn’t health insurance companies love access to your fit monitor data to set their premiums?...more
Bring your own device policies in the workplace aren’t novel. Companies have experimented and implemented policies requiring employees to use their own personal phones, computers and tablets in the scope of their employment...more
Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more
In this LEVICK Daily video interview, LEVICK Senior Vice President Jason Maloni discusses the key forensic and communications challenges that accompany instances of data loss and...more
While many cases focus on electronic evidence available on employee laptops and behind corporate firewalls, massive volumes of electronic evidence can be found on the servers of companies that provide electronic processing...more
In this issue:
- The Firm’s Ediscovery Team Attorneys
- Case Insights
- Editor’s Corner
- Excerpt from Peerless Industries, Inc. v. Crimson Av, LLC, Case No. 1:11-cv-1768, 2013 U.S. Dist. LEXIS...more
Gatto v. United Air Lines, Inc., 2013 WL 1285285 (D.N.J. Mar. 25, 2013).
In this personal injury dispute, the defendants sought spoliation sanctions arising out of the plaintiff’s destruction of relevant social media...more
Potts v. Dollar Tree Stores, Inc., 2013 WL 1176504 (M.D. Tenn. March 20, 2013).
In this employment dispute, the defendant filed a motion to compel discovery of the plaintiff’s personal computer and any “Facebook and/or...more
Cell phones and tablets have become the modern day Swiss Army Knife, the key to survival when navigating the treacherous trails of daily life. Not only can these devices guide you through the vast array of potential...more
What Does a Child Pornography Case Tell You About Computer Evidence? was published in the November 2012 Palm Beach Bar Bulletin and discusses the recent United States v. Seiver case as well as the simple steps for lawyers,...more
Originally published in Laches (Aug. 2011).
1. SOCIAL MEDIA INFORMATION IS GENERALLY DISCOVERABLE
Social media has dramatically changed how humans interact with each other and the digital footprint left by...more
Highlighted in Forbes’ Law & Technology Blog as one of Eight Great Law & Technology Resources, Orange Legal Technologies’ Unfiltered Orange Weekly eDiscovery News Updates provide readers with a trusted compilation of key...more
"Reproduced with permission from Law Business Research. This article was first published in Getting the Deal Through - e-Commerce 2013 (published in July 2012; contributing editor:
Robert Bond of Speechly Bircham LLP)....more
Find a Communications & Media Author »
Back to Top