[Podcast] Defining Our Vision and Values
DE Under 3: OFCCP Walks Back Its Earlier “Pay Equity” Directive
JONES DAY TALKS®: International Litigation: Confidentiality and Legal Privilege under French Law
Writing a book as a Big Law partner - Legally Contented Ep. 2 - Christopher Ruhland
Internal Investigations in the Asia-Pacific Region
Cyberside Chats: Preserving Legal Privilege After a Cybersecurity Incident
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
Client Confidentiality in the Age of Coronavirus [More with McGlinchey Ep. 2]
Jones Day Presents: Strategies for Dealing with the IRS: The IRS Examination
Day 15 of One Month to Better Investigations and Reporting-the Parameters of Privileges
Day 2 of One Month to Better Investigations and Reporting-Selection of Investigative Counsel
Your Cyber Minute: Attorney-client privilege in the midst of a cybersecurity breach
Insurance Companies and the Attorney-Client Privilege in Arizona
Attorney Client Privilege
Polsinelli Podcast - Social Media at Work - What's Allowed and What Isn't?
Do You Need A Lawyer for a Federal Grand Jury Subpoena?
An organization that has suffered a data breach likely does not want to have to disclose potentially embarrassing or harmful information, especially in a lawsuit resulting from the breach. Simply involving an attorney in...more
The last two Privilege Points have described yet another losing effort to protect a data breach investigation and related communications. In Leonard v. McMenamins Inc., Case No. C22-0094-KKE, 2023 U.S. Dist. LEXIS 217502...more
What Happened- Come on, you know what happened, right? For those denied the joy of Roald Dahl and his take on bad parents, here is an overview. Willy Wonka, the owner of Wonka’s Chocolates, is a unique and secretive...more
We asked our global white collar crime team for their views on the key challenges in 2024 for in‑house investigations teams and white collar crime lawyers, and how to manage the associated risks. Here is what they said. ...more
Background Note: International discovery exercises and investigations can be a complex and challenging process for cybersecurity, information governance, and eDiscovery professionals. Navigating the different laws and...more
The DE OFCCP Week in Review (WIR) is a simple, fast and direct summary of relevant happenings in the OFCCP regulatory environment, authored by experts John C. Fox, Candee Chambers and Cynthia L. Hackerott. In today’s edition,...more
Please join us on November 5 for a dynamic CLE discussion to navigate internal investigations across the media and entertainment industries. The program will keep you engaged with perspectives from across our Labor &...more
SCOTUS: Accessing Private Database for Improper Purpose Not Violation of Computer Fraud and Abuse Act. In a recent Supreme Court case, Van Buren v. United States, the Court narrowed the applicability of the Computer Fraud...more
In ongoing multidistrict litigation concerning Capital One’s 2019 data breach, Capital One succeeded in defeating a motion to compel disclosure of a privileged root cause analysis conducted by PwC. In contrast to an earlier...more
Big data can mean big problems in the ediscovery and compliance world – and those problems can be exponentially more complicated when personal data is involved. Sifting through terabytes of data to ensure that all personal...more
As we previously reported, the Magistrate Judge in In re: Capital One Customer Data Security Breach Litigation, found that a forensic report that Capital One had claimed was protected by the privilege and work product...more
Judge Davis of the BLS ordered Facebook to produce documents to Massachusetts Attorney General Maura Healey (AG). The AG obtained the order while investigating Facebook’s policies and protections related to user data. The...more
On May 26, 2020, a United States Magistrate Judge in the Eastern District of Virginia ordered Capital One to disclose to class action plaintiffs a report prepared by Mandiant, a cyber forensics firm, for Capital One’s outside...more
A May 26, 2020 order by U.S. Magistrate Judge John F. Anderson (E.D. Va.) that attorney work product protection did not preclude production of a forensic vendor's data breach investigation report to plaintiffs in the Capital...more
The United States District Court for the Eastern District of Virginia (Court) has held that a cyber-forensic investigation report was not protected by the attorney work product doctrine and ordered Capital One to produce it...more
While much of the corporate legal world has been focused on the effects of the COVID-19 pandemic, a little-noticed case working its way through the federal courts in Washington, D.C. threatens to whittle down the scope of...more
On January 30, the US Department of Defense (DoD) released version 1.0 of the Cybersecurity Maturity Model Certification (CMMC) framework, which will require DoD contractors and subcontractors to obtain third-party...more
An individual that provides information to an attorney may normally assume that the information provided to the attorney will be kept confidential under the attorney-client privilege. That said, according to the Internal...more
With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more
Information is one of your company’s most valuable assets. It is critical to remain vigilant to protect against the latest cybersecurity threats and to comply with expansive privacy obligations. Join us in New York City for...more
In order to provide an overview for busy in-house counsel and compliance professionals, we summarize below some of the most important international anti-corruption developments from the past month, with links to primary...more
Lawyers are advisors and advocates. Clients trust lawyers to preserve secrets, confidential matters that when disclosed could cause financial or reputational damage. A significant element of legal representation involves...more
Q: Who in a company is vital for cybersecurity management? Seth Berman: Cybersecurity is everyone’s responsibility. The board and senior management must set the priorities and shape the culture, but even the lowest-level...more
Companies have always taken the position that an employee’s use of company e-mail is not private, and can be accessed and reviewed by the company at any time. There have been a large number of court cases, which have held...more
The Background: Technology has transformed the way that directors receive and review information and communicate with each other and with management. The Issue: Although many modern board practices are more secure and...more