[Podcast] Defining Our Vision and Values
DE Under 3: OFCCP Walks Back Its Earlier “Pay Equity” Directive
JONES DAY TALKS®: International Litigation: Confidentiality and Legal Privilege under French Law
Writing a book as a Big Law partner - Legally Contented Ep. 2 - Christopher Ruhland
Internal Investigations in the Asia-Pacific Region
Cyberside Chats: Preserving Legal Privilege After a Cybersecurity Incident
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
Client Confidentiality in the Age of Coronavirus [More with McGlinchey Ep. 2]
Jones Day Presents: Strategies for Dealing with the IRS: The IRS Examination
Day 15 of One Month to Better Investigations and Reporting-the Parameters of Privileges
Day 2 of One Month to Better Investigations and Reporting-Selection of Investigative Counsel
Your Cyber Minute: Attorney-client privilege in the midst of a cybersecurity breach
Insurance Companies and the Attorney-Client Privilege in Arizona
Attorney Client Privilege
Polsinelli Podcast - Social Media at Work - What's Allowed and What Isn't?
Do You Need A Lawyer for a Federal Grand Jury Subpoena?
Law Enforcement Has Been Using GTO Data - First of Two Posts on Evolving Issues Regarding Real Estate and Money Laundering - The U.S. Government Accountability Office (“GAO”) has issued a report on the status and...more
The Situation: On August 22, 2019, the German Ministry of Justice and Consumer Protection presented the draft Corporate Sanctions Act ("CSA"), a bill that would establish corporate criminal liability in Germany. The...more
There has been much attention — and rightfully so — on the impact of the #MeToo movement within the workplace. That impact has significantly changed employment policies and practices from large national corporations to small...more
In this episode, Michael McKay and Carla DewBerry discuss the practical implications of responding to an investigative inquiry by governmental officials. In particular, entities that find themselves as the subject of a...more
The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more
After a security incident is identified organizations often consider whether to share information concerning the incident with government agencies. If the incident involved criminal conduct, federal law enforcement agencies –...more