Polsinelli Podcasts - Can Your Employee Wear That to Work? EEOC Updated Guidelines
How to Avoid Corruption Risks in China
Polsinelli Podcasts - The Virtual World and Wage and Hour Issues
Dr. John A.C. Cartner Discusses the Implementation of the Maritime Labour Convention on its First Anniversary
How to Monitor, Audit and Improve Your Anti Corruption Compliance Program
Winston & Strawn's Kessler Sees Change and Opportunity in College Athletics
Anti-Corruption Due Diligence Practical Steps to Protect Your Company from Third Party Risks
How Ed O'Bannon Just Disrupted College Athletics
FCPA Compliance Programs A Review of Best Practices
Creating a Culture of Ethics and Compliance
Conducting Interviews in an Internal Investigation 2 13 14, 9 03 AM
Polsinelli Podcasts - How Employers Fared With the U.S. Supreme Court This Term
Building an Anti Corruption Compliance Program Practical Steps 2 18 14, 9 02 AM
Internal Investigations: Soup to Nuts (March 13, 2014)
Employment Law Issues for Health Care Employers
Polsinelli Podcasts – Are Your Employees Texting While Driving?
The Role of a Chief Compliance Officer: Navigating the Compliance Landscape (March 18, 2014)
Employee Benefits Issues in California Following the U.S. Supreme Court's Same-Sex Marriage Decisions
Designing Cost Effective Risk Assessment Programs May 21, 2014
Managing Your Internal Investigation Program June 3 2014
Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more
According to PC Magazine, “[i]n the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive.” Cloud-based computing has become a very popular tool...more
This week's headlines charged employers with preserving and protecting data in the workplace. This advice is timely given that this week is “Tax Identity Theft Awareness Week,” a time when employers are reminded to safeguard...more
German companies sometimes are required to collect data for legitimate business purposes, including for compliance, to investigate malfeasance, for adjudication of claims and to protect personal data of customers from misuse....more
Bring your own device policies in the workplace aren’t novel. Companies have experimented and implemented policies requiring employees to use their own personal phones, computers and tablets in the scope of their employment...more
The need to stay connected these days applies not only to our social universe, but also to our business universe. The result is a trend known as “bring your own device” or “BYOD.” BYOD is the practice where employees use...more
Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more
PTSI, Inc. v. Haley, 2013 WL 2285109 (Pa. Super. Ct. May 24, 2013).
In this employment law case, the plaintiff appealed a trial court’s denial of motion for sanctions against the defendants who allegedly erased...more
Lazette v. Kulmatycki, 2013 WL 2455937 (N.D. Ohio June 5, 2013).
In this employment law case, the federal district court held that the Stored Communications Act (SCA) can apply if an employer reads personal emails from...more
Gordon v. Kaleida Health, 2013 WL 2250579 (W.D.N.Y. May 21, 2013).
In this action brought under the Fair Labor Standards Act, the plaintiffs motioned for a court order requiring the parties to meet and confer on the...more
Potts v. Dollar Tree Stores, Inc., 2013 WL 1176504 (M.D. Tenn. March 20, 2013).
In this employment dispute, the defendant filed a motion to compel discovery of the plaintiff’s personal computer and any “Facebook and/or...more
This article discusses that, in addition to civil liability that employment lawyers tend to be alert for in departing employee scenarios, departing employees can also be criminally liable for theft, misappropriation, or other...more
Cisco’s 2011 Connected World Technology Report found that 70% of young professional employees disregard their employer’s technology policies on a regular basis. This presents significant litigation and public relations risks...more
Tips for obtaining social media during litigation, and using for your client's advantage....more
In this issue: NLRB Report Provides Guidance to Employers on Social Media Issues; Rough Waters: Repeat Infringer Policies and the DMCA Safe Harbors; What Every Company Should Know About E Discovery and Social Media; CDA...more
Pre-litigation practice pointers for locating, obtaining, and protecting the wealth of often-overlooked information that is voluntarily disclosed via social and other electronic media content. Published in the September 2011...more
This article, published in the June 2011 issue of the newsletter of the Maryland Chapter of the Federal Bar Association, discusses the powerful tool that social media has become. Social media is too difficult to ignore and...more
According to the third district appellate court in Holmes v. Petrovich, 2011 DJDAR 671, your office privacy is a lonely public roadway. And where the limits are clearly posted, you had better obey—no matter what kind of...more
The pen has become even mightier since Facebook and its kin stepped into the courtroom.
Today, courts consider social media posts to be beyond the purview of the right of privacy - and fully admissible in court. Now, with...more
A quick checklist...more
This short 15 slide presentation provides the framework for developing and discussing Electronic Discovery in Employment Law.
Article discusses discoverability of information posted on social networking web sites, including Facebook and MySpace, and analyzes how discovery disputes and potential admissibility at trial of this information may be...more
Find a Labor & Employment Author »
Back to Top