Compliance Tip of the Day: Podcasting for Compliance Training
Compliance Tip of the Day: Compliance Training Frequency
Compliance Tip of the Day: Using Supply Chain to Innovate in Compliance
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
Work This Way: A Labor & Employment Law Podcast | Episode 46: The 2025 Greenville SHRM Conference with Tyler Clark and Brittany Goforth of GSHRM
Compliance tip of the Day: Communication Through Persuasion
Compliance Tip of the Day: Middle Managers as the Eyes and Ears of Compliance
Joe Green & Monica Rodriguez Kuniyoshi on Integrating Generative AI with Your Experts - Passle CMO Series Podcast RE-RELEASE:
Compliance Tip of the Day – Role of Chatbots in Compliance
FCPA Compliance Report: Kristy Grant-Hart on A 360° Review of the Future of Compliance
Compliance Tip of the Day: Embedded Compliance
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Law School Toolbox Podcast Episode 496: The Early BigLaw Recruiting Timeline (w/Sadie Jones)
Whistleblower Challenges and Employer Responses: One-on-One with Alex Barnard
Compliance Tip of the Day: Compliance By Design
Podcast - Parting Thoughts: Be a "Peddler of Common Sense"
Podcast - How to Use Humor and Anger Effectively in the Courtroom
Podcast - At Trial, Less Is More
Enhancing Workplace Feedback: Lessons From Harry Potter — Hiring to Firing Podcast
Podcast - Voice and Delivery
We have published a client guide to legal professional privilege under English law. This guide comprises: A decision tree: intended as a quick reference to help determine which documents can legitimately be withheld on...more
It is not uncommon for employers to discover that a departing employee has downloaded information before walking out the door. But the mere fact that an employee downloaded information does not necessarily mean the...more
The number one risk for trade secrets exfiltration is from insider threats—employees, contractors, or even executives with access to sensitive information who either intentionally or accidentally compromise it. Sometimes it’s...more
As legal and business professionals focused on protecting intellectual property—especially those of us in business litigation—it's crucial to stay attuned to the expanding influence of generative AI (“GenAI”). While patents...more
The protection of trade secrets and confidential information is critical to the success of many organizations. Employers must remain vigilant against the growing risk of sensitive information being compromised, especially...more
Law firms handle confidential information and documents that require diligent protection. The stakes are high, the regulations and their sources are vast, and technology is sophisticated and ever-changing....more
California courts are readying new standards for court interpreters with most changes focused on ethical behavior during remote and hybrid court proceedings. The proposed revisions to the Professional Standards and Ethics for...more
The latest phenomenon in artificial intelligence (“AI”), generative AI such as ChatGPT, has changed the world as we know it. While some fear AI will replace workers and others praise its efficiency and productivity, there is...more
When it comes to the true source of a company’s value, it’s not necessarily in the products or the services they offer, nor is it in the brand they’ve carefully developed. The core of a company’s value is in the trade secrets...more
We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more
In this webinar, discover why data security is more than a checkbox and gain insights into the risks and best practices that can safeguard your organization. Join industry experts as they delve into the risks, laws and...more
During a recent employment law webinar, Haynsworth Sinkler Boyd discussed considerations for employers when conducting workplace investigations. To help employers conduct more effective and efficient workplace investigations,...more
Perhaps you’ve asked an employee to take notes during a Zoom meeting, but they complained the task is difficult to manage while collaborating with teammates. Maybe you intended to document everything that transpired during an...more
As part of this program, our presenter will share best practices for resolving technology disputes through arbitration and mediation and will also review provisions that should be included in an arbitration clause or an...more
Whether your organization has deployed a generative AI tool for your employees or hasn’t (yet) hopped on the bandwagon, the time is now for you to create a workplace policy governing the use of the technology. Many...more
It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more
Technology disputes are often quite complex, and they frequently require a speedy and cost-efficient resolution. Some organizations are adopting special rules for technology arbitrations, while others rely on their...more
The Freedom of Information Act allows government agencies to release any record in their possession unless one of nine exemptions applies. Exemption #4—the focus of this webinar—protects information considered “trade secrets...more
Despite strengthening security across and beyond the business, many legal organizations overlook a critical vulnerability with surprising frequency – the risk presented by third parties. Cybersecurity risk is further...more
The Canadian Institute’s 13th Annual Law of Policing Conference, Eastern Edition is returning to Toronto on May 4 – 5, 2022. For 2 days, chiefs of police, in-house counsel, and a wide-variety of government and civilian...more
Privacy Litigation Webinar Series Part 1 - Our Global Privacy & Cybersecurity team will be hosting a monthly webinar series on key issues and developments in privacy litigation. Confidentiality is a fundamental...more
Companies often hire employees to develop new products, improve processes, create new technologies, and develop new markets. But how should employers address the ownership of intellectual property created by their employees...more
NFTs – or non-fungible tokens – are increasingly popular among artists, sports figures, and the video game industry. But NFTs (some selling for upwards of eight figures) are not just for gamers, Mark Cuban, and the ultra...more
Biotechnology companies in the healthcare/pharmaceutical realm are in an exceptionally competitive field, with many companies competing against each other for a chance to market similar innovative therapeutics. These...more
Employers in every sector use restrictive covenants to guard against loss of institutional knowledge, relationships, and training. These restrictive covenants come in three forms: “non-competition,” “non-solicitation,” and...more