Understanding the Different Mandates Between Legal and Compliance February 3 2015
Cullen & Dykman Sees Colleges Calling for Title IX Help v
Uncovering the “Why” in FCPA Compliance Issues
Compliance Training for Employees: Trends in GRC
AB1825 Training and Anti-Harassment and Discrimination Training
Corcoran: Infighting on Compensation Costs BigLaw Time and Money
Polsinelli Podcasts - Safely Navigating the ADA, FMLA & Worker's Compensation Laws
Has the Affordable Care Act influenced COBRA? What if my employer fails to offer COBRA?
“You Want More Time Off?” – Dealing with Employees’ Medical Leave Requests Under the FMLA and ADA
Private Equity Fees and Expenses
Planning For The Exit – What’s Your Exit Strategy?
How Did The NFL Get This So Wrong?
Polsinelli Podcasts - Can Your Employee Wear That to Work? EEOC Updated Guidelines
How to Avoid Corruption Risks in China
Polsinelli Podcasts - The Virtual World and Wage and Hour Issues
Dr. John A.C. Cartner Discusses the Implementation of the Maritime Labour Convention on its First Anniversary
How to Monitor, Audit and Improve Your Anti Corruption Compliance Program
Winston & Strawn's Kessler Sees Change and Opportunity in College Athletics
Anti-Corruption Due Diligence Practical Steps to Protect Your Company from Third Party Risks
How Ed O'Bannon Just Disrupted College Athletics
For the uninitiated, Dropbox and other similar tools—such as SkyDrive, Google Drive, or Cubby—allow a user to log in to an account, upload documents or files to the cloud, and then access or download them from any device,...more
Pero v. Norfolk S. Ry., Co., 2014 WL 6772619 (E.D. Tenn. Dec. 1, 2014).
In this employment law case, the plaintiff filed a motion to compel the production of a video that the plaintiff claimed demonstrated the setting...more
From reliable surveys and less dependable anecdotes in most major markets, including the UK and the US, opinions point to the almost inevitable expansion of BYOD – Bring Your Own Device – as a cost-saving model for employers....more
It's a commonplace occurrence in Silicon Valley for skilled employees to move from one company to another, followed quickly by a civil trade secret lawsuit alleging that the employee stole trade secrets from his prior...more
As one who presumably has no nude selfies, you may not be too concerned about a “hack” like the one that continues to afflict celebrities like Jennifer Lawrence and Kate Upton. But that doesn’t mean there aren’t still plenty...more
Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more
According to PC Magazine, “[i]n the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive.” Cloud-based computing has become a very popular tool...more
This week's headlines charged employers with preserving and protecting data in the workplace. This advice is timely given that this week is “Tax Identity Theft Awareness Week,” a time when employers are reminded to safeguard...more
German companies sometimes are required to collect data for legitimate business purposes, including for compliance, to investigate malfeasance, for adjudication of claims and to protect personal data of customers from misuse....more
The need to stay connected these days applies not only to our social universe, but also to our business universe. The result is a trend known as “bring your own device” or “BYOD.” BYOD is the practice where employees use...more
Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more
PTSI, Inc. v. Haley, 2013 WL 2285109 (Pa. Super. Ct. May 24, 2013).
In this employment law case, the plaintiff appealed a trial court’s denial of motion for sanctions against the defendants who allegedly erased...more
Lazette v. Kulmatycki, 2013 WL 2455937 (N.D. Ohio June 5, 2013).
In this employment law case, the federal district court held that the Stored Communications Act (SCA) can apply if an employer reads personal emails from...more
Gordon v. Kaleida Health, 2013 WL 2250579 (W.D.N.Y. May 21, 2013).
In this action brought under the Fair Labor Standards Act, the plaintiffs motioned for a court order requiring the parties to meet and confer on the...more
Potts v. Dollar Tree Stores, Inc., 2013 WL 1176504 (M.D. Tenn. March 20, 2013).
In this employment dispute, the defendant filed a motion to compel discovery of the plaintiff’s personal computer and any “Facebook and/or...more
This article discusses that, in addition to civil liability that employment lawyers tend to be alert for in departing employee scenarios, departing employees can also be criminally liable for theft, misappropriation, or other...more
Cisco’s 2011 Connected World Technology Report found that 70% of young professional employees disregard their employer’s technology policies on a regular basis. This presents significant litigation and public relations risks...more
Tips for obtaining social media during litigation, and using for your client's advantage....more
In this issue: NLRB Report Provides Guidance to Employers on Social Media Issues; Rough Waters: Repeat Infringer Policies and the DMCA Safe Harbors; What Every Company Should Know About E Discovery and Social Media; CDA...more
Pre-litigation practice pointers for locating, obtaining, and protecting the wealth of often-overlooked information that is voluntarily disclosed via social and other electronic media content. Published in the September 2011...more
This article, published in the June 2011 issue of the newsletter of the Maryland Chapter of the Federal Bar Association, discusses the powerful tool that social media has become. Social media is too difficult to ignore and...more
According to the third district appellate court in Holmes v. Petrovich, 2011 DJDAR 671, your office privacy is a lonely public roadway. And where the limits are clearly posted, you had better obey—no matter what kind of...more
The pen has become even mightier since Facebook and its kin stepped into the courtroom.
Today, courts consider social media posts to be beyond the purview of the right of privacy - and fully admissible in court. Now, with...more
A quick checklist...more
This short 15 slide presentation provides the framework for developing and discussing Electronic Discovery in Employment Law.
Find a Labor & Employment Author »
Back to Top