Consumer Finance Monitor Podcast Episode: Private Civil Consumer Financial Services Litigation to Partially Fill CFPB Void - Part 1
The Litigation Landscape Explained
(Podcast) The Briefing: About Face – Courts Weigh AI Face-Swapping Technology and Celebrity Rights
The Briefing: About Face – Courts Weigh AI Face-Swapping Technology and Celebrity Rights
5 Key Takeaways | State Sales Tax in 2024: What Every Retailer Needs to Know
Monumental Win in Data Breach Class Action: A Case Study — The Consumer Finance Podcast
Ad Law Tool Kit Show – Episode 6 – Mitigating Class Action Exposure
Mass Torts vs. Class Actions: A Tale of Two Strategies
Fierce Competition Podcast | Letter From London: The Rise of UK Class Actions and the Competition Appeal Tribunal
JONES DAY TALKS®: Collective Actions in Spain: A Look Around and the View Ahead
Entertainment Law Update Episode 160 – August/September 2023
JONES DAY TALKS®: Class Actions Worldview Guide: Part 1–The United States and European Union
Eleventh Circuit Grants en banc Review to Resolve Controversial TCPA Standing Ruling
2022 Year in Review and Look Ahead Crossover With FCRA Focus - The Consumer Finance Podcast
2022 Year in Review and Look Ahead Crossover With The Consumer Finance Podcast - FCRA Focus
Fifth Circuit Affirms District Court’s Striking of Class Allegations
Podcast: California Employment News - The Basics of Wage Statement Compliance (Part 1)
California Employment News: The Basics of Wage Statement Compliance (Part 1)
What Is Mass Arbitration and How Should Companies Protect Themselves? - The Consumer Finance Podcast
Webinar Recording – Assessing the Surge in Wiretap Litigation
Concerns about claims of legal professional privilege over third-party investigation reports produced in the course of responding to cyberattacks, and the extent to which such reports can be shielded from disclosure in legal...more
In a fairly short opinion and order, the district court in Weston v. DocuSign, Inc. analyzed whether the parties were entitled to the production of text messages from former employees’ personal devices and potential piercing...more
By now, companies across all industries have become familiar with the lifecycle and stages of a ransomware incident. Generally, once an attack is contained, remediation and rebuilding will follow. Shortly after, the crisis...more