Bar Exam Toolbox Podcast Episode 318: Quick Tips -- The Final Two-Week Bar Exam Countdown
Navigating Employee Integration in Mergers and Acquisitions: Lessons From Pretty Woman — Hiring to Firing Podcast
Work This Way: An Employment Law Video Podcast | Episode 51: Smarter Recruiting Strategies with Rhiannon Poore of Forge Search
California Employment News: Creating the Report for a Workplace Investigation – Part 4 (Featured)
Compliance Tip of the Day: Assessing Internal Controls
Compliance Tip of the Day: COSO Objective 5 – Monitoring Activities
Compliance Tip of the Day: COSO Objective 3 – Control Activities
Compliance Tip of the Day – COSO Objective 1 – Control Environment
Hiring Smarter: Best Practices for Interviews: What's the Tea in L&E?
Compliance Tip of the Day: Code of Conduct as an Internal Control
California Employment News: Gathering Information in a Workplace Investigation – Part 2 (Featured)
Compliance Tip of the Day: Risk Assessments and Internal Controls
FCPA Compliance Report: The Role of Culture and Data in Fraud Risk Management - A Conversation with Vincent Walden
Compliance Tip of the Day: Podcasting for Compliance Training
Compliance Tip of the Day: Compliance Training Frequency
Compliance Tip of the Day: Using Supply Chain to Innovate in Compliance
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
Work This Way: A Labor & Employment Law Podcast | Episode 46: The 2025 Greenville SHRM Conference with Tyler Clark and Brittany Goforth of GSHRM
Compliance tip of the Day: Communication Through Persuasion
Compliance Tip of the Day: Middle Managers as the Eyes and Ears of Compliance
Many employers have turned to geolocation tools like GPS devices to monitor employees’ whereabouts and movements – especially those working remotely or in field-based roles. While these tools provide an effective way to boost...more
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more
Join us for an insightful webinar that explores the crucial question of ownership when it comes to implementing Information Governance (IG) during migrations. As organizations migrate their data to modern platforms like...more
E-discovery has become a critical aspect of the legal landscape, and organizations rely heavily on effective data management strategies to navigate the complex process of identifying, collecting, and producing electronic...more
Court rulings in the past few years have codified what people working in ediscovery have known all along: Slack (and other collaboration app data) is discoverable during litigation and should be preserved the same as email as...more
When it comes to ensuring enterprise data is safe, understanding recent rulings from different regulatory bodies and how they affect your organization is a vital first step, followed by reasonable measures to further...more
Organizations create and share enormous volumes of sensitive information, and with the rise of SaaS applications and collaboration tools, this information can exist in many places: emails, Slack messages, Jira tickets,...more
If your organization uses Slack for business communications, how are you preserving Slack data for potential litigation? Until this year, there was only one way to guarantee the preservation of Slack data: by collecting it...more
Every minute spent on Zoom produces a potentially critical piece of ESI. But with 3.3 trillion minutes spent on meetings alone this past year, it can be hard to figure out what data is most relevant and how to find it. In...more
Companies and consumers alike are under perpetual assault from bad actors as IoT, work from home, and cloud migration – all intended to improve productivity – have expanded the cyber attack surface. The continually evolving...more
Placing defensible legal holds on Slack data has always required collecting the data to an external repository to preserve it while maintaining information governance policies, until now. Slack has added the ability to create...more
From communication tools like Slack and Microsoft Teams, to collaboration tools like Box, Dropbox, and GSuite, organizations across the globe are relying heavily on cloud applications to get their work done. This is causing...more
The proliferation of short messages falling into the scope of discovery or disclosure is unabated. These can be mobile SMS texts or instant messages from popular applications such as WhatsApp, Viber, Slack, Skype and MS...more
Perhaps no COVID-19 phenomenon will have a more lasting impact than the virtual office. Many employers recently marked the first anniversary of the decision to ask their employees to work from home in an effort to combat the...more
Social media (“SoMe”) is so enmeshed in our daily lives it is difficult to imagine the time when we didn’t have it. Through our phones, computers and tablets, social media provides instant communication and connection, with...more
In 2003 Judge Shira Scheindlin wrote “once a party reasonably anticipates litigation, it must suspend its routine document retention/destruction policy and put in place a 'litigation hold' to ensure the preservation of...more
More and more companies are implementing Slack to get work done efficiently. From file sharing to messaging threads, to video calls and more, Slack is loaded with intricate, multi-faceted functions that boost productivity....more
The words “hodgepodge” and “patchwork” are overused in the world of risk and compliance, but they’re certainly appropriate for describing the myriad data privacy regulations popping up around the world. In 2018, the world...more
Modern business communications and the way people interact have rapidly evolved and continue to change. Multimedia, collaborative workspaces, and social media are making communications more dynamic, interactive, and...more
E-discovery is an important aspect of litigation. Well-established data gathering protocols and workflow procedures pertaining to electronic data are important. Meticulous record-keeping, workflow procedures, and processes...more
In this episode, the third of three building on Akin Gump’s annual Top 10 Topics for Directors report, partner Michelle Reed discusses the critical question of cybersecurity and the corporate world. Among the topics covered: ...more
The Background: Technology has transformed the way that directors receive and review information and communicate with each other and with management. The Issue: Although many modern board practices are more secure and...more
In this webinar, Best Best & Krieger LLP attorney Christine Wood explains how public agencies can create an email retention policy that helps reduce PRA production costs. This webinar covers the basics of a good email...more
Data minimization can be a powerful – and seemingly simple – data security measure. The term refers to retaining the least amount of personal information necessary in order for an organization to function....more
Many security risks can be avoided or mitigated by implementing sufficient internal security controls which are tailored to the organization’s size, needs, and specific industry. The Federal Trade Commission (“FTC”) sets...more