Hiring Smarter: Best Practices for Interviews: What's the Tea in L&E?
California Employment News: Gathering Information in a Workplace Investigation – Part 2 (Featured)
Compliance Tip of the Day: Risk Assessments and Internal Controls
FCPA Compliance Report: The Role of Culture and Data in Fraud Risk Management - A Conversation with Vincent Walden
Compliance Tip of the Day: Podcasting for Compliance Training
Compliance Tip of the Day: Compliance Training Frequency
Compliance Tip of the Day: Using Supply Chain to Innovate in Compliance
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
Work This Way: A Labor & Employment Law Podcast | Episode 46: The 2025 Greenville SHRM Conference with Tyler Clark and Brittany Goforth of GSHRM
Compliance tip of the Day: Communication Through Persuasion
Compliance Tip of the Day: Middle Managers as the Eyes and Ears of Compliance
Joe Green & Monica Rodriguez Kuniyoshi on Integrating Generative AI with Your Experts - Passle CMO Series Podcast RE-RELEASE:
Compliance Tip of the Day – Role of Chatbots in Compliance
FCPA Compliance Report: Kristy Grant-Hart on A 360° Review of the Future of Compliance
Compliance Tip of the Day: Embedded Compliance
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Law School Toolbox Podcast Episode 496: The Early BigLaw Recruiting Timeline (w/Sadie Jones)
Whistleblower Challenges and Employer Responses: One-on-One with Alex Barnard
Compliance Tip of the Day: Compliance By Design
Podcast - Parting Thoughts: Be a "Peddler of Common Sense"
As recent innovations in automotive technology continue to fuel unprecedented growth across the industry, companies must adapt their privacy and confidentiality capabilities to safeguard highly valuable trade secrets. With...more
We have published a client guide to legal professional privilege under English law. This guide comprises: A decision tree: intended as a quick reference to help determine which documents can legitimately be withheld on...more
The number one risk for trade secrets exfiltration is from insider threats—employees, contractors, or even executives with access to sensitive information who either intentionally or accidentally compromise it. Sometimes it’s...more
Law firms handle confidential information and documents that require diligent protection. The stakes are high, the regulations and their sources are vast, and technology is sophisticated and ever-changing....more
Perhaps you’ve asked an employee to take notes during a Zoom meeting, but they complained the task is difficult to manage while collaborating with teammates. Maybe you intended to document everything that transpired during an...more
Despite strengthening security across and beyond the business, many legal organizations overlook a critical vulnerability with surprising frequency – the risk presented by third parties. Cybersecurity risk is further...more
The spread of the novel coronavirus (COVID-19) across the globe remains a significant concern in the workplace. Employers are confronting difficult questions regarding how to handle leave and accommodation, immigration,...more
During a particularly good episode of The Office, Michael Scott burned his foot, made a screaming SOS call to the receptionist imploring the good people of Dunder-Mifflin for assistance, wrapped his leg in bubble wrap, and...more
Fear of the coronavirus is causing many employers to permit—or in some cases mandate—employees to work remotely. While this measure is designed to minimize the risk of virus transmission, it presents an altogether different...more
With confirmed cases in New Hampshire, Massachusetts, and Rhode Island, it appears the 2019 Novel Coronavirus (“COVID-19”), often referred to as the “Coronavirus,” may present significant issues for employers throughout New...more
Employers are doing their best to respond to the 2019 New Coronavirus (2019-nCoV) epidemic. The outbreak that began in China has rapidly evolved into a global crisis. It has caused turbulence in financial markets, forced...more
Businesses are increasingly relying on the cloud to store confidential and sensitive information. One-third of information technology budgets are used for cloud services. Rapid growth in cloud storage is expected over the...more
When conducting social media training, a common concern I run across has to do with attorneys and staff being afraid they will post something that will get them in trouble. Consequently, they hold back from using these tools...more
Recently, popular Southern California juice and aguas frescas chain Green Crush filed suit against up-and-coming rival juice bar Paradise Splash and several individuals. The lawsuit, filed in the U.S. District Court for the...more
On Monday, November 2, 2015, Andrew Ceresney, Director of the SEC’s Division of Enforcement, gave a speech at the SIFMA Compliance & Legal Society New York Regional Seminar in which he sought to address what he views as the...more
Data breaches are all over the news, but those stories most often cover high-profile cybersecurity breaches that result from the malicious efforts of hackers or other outsiders. Just as insidious, and more likely to occur,...more