[Podcast] Hosted Payload Episode 2
The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics
Is the TCPA Unconstitutional? [More With McGlinchey, Ep. 18]
Podcast: Conductive Discussions: Recent FRAND & Trade Secret Enforcement Trends Affecting the Semiconductor Industry
E17: Carpenter Decision Builds Up Privacy from #SCOTUS
Won’t You Be My Neighbor?
A Valuable Discussion About Property Values
The TCPA: Basics, Targeted Industries, and Trends
New Jersey to consider allowing police to search cell phones to combat distracted driving
Instapundit: America's IP Laws Need to be "Pruned Back"
In a record year, there are bound to be numerous interesting enforcement actions and principles. I picked out a few to highlight....more
Employment Law attorneys Mark Pihart, Laura Pfeiffer and Rachel Brygger discuss details of Minnesota's new Hands-Free Bill and what employers will need to do to stay in compliance....more
We begin the New Year with a three-part series on the FCPA: (1) A review of FCPA enforcement in 2016; (2) Trends from 2016 FCPA enforcement; and (3) Predictions for FCPA enforcement in 2017....more
In April of this year, the National Labor Relations Board’s new expedited election rules went into effect. Under the new rules, employers are required to provide unions with “available” personal e-mail addresses and personal...more
Late last week, Lyft and First National Bank (FNB) were notified by the Federal Communications Commission (FCC) that they had violated the Telephone Consumer Protection Act (TCPA) when they required users to opt in to...more
The Telephone Consumer Protection Act (“TCPA”) was enacted to protect consumers from intrusive robocalls, but Congress probably did not foresee that it would result in a windfall for plaintiff’s lawyers. Virtually every...more
The Federal Communications Commission (FCC) disappointed many with its July 1, 2015 Declaratory Ruling and Order on the Telephone Consumer Protection Act (“TCPA”). The TCPA prohibits, amongst other things, using an automated...more
To conclude this week’s posts, I wanted to list some of the more prevalent social media tools, explain what they are and how you might use them in a compliance program. (As usual I got carried away so this series will...more
I continue my exploration of the use of social media in doing compliance by taking a look at a very innovative social media solution to a difficult compliance issue around, of all things, honey. This example shows how...more
The buzz at Georgetown Law’s recent Advanced eDiscovery Institute on Information Governance and Big Data (November 21-22, 2013) made it crystal clear to attending corporate C-suiters: Bring Your Own Device (BYOD) is here to...more
Recent workplace surveys report that as many as 87% of employees use personal electronic devices for work, raising compliance, data loss, and security risks for their employers. As a result, designing a workable...more