5 Tips For Writing Conflict Emails
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
Credit Eco to Go Podcast - The Results are In: Consumers Really Do Respond Better to Digital Communications
Tackling Modern Attachment and Link Challenges in G-Suite, Slack, and Teams
PODCAST: Williams Mullen's Benefits Companion - Cybersecurity Considerations for Retirement Plan Sponsors
Business Email Compromise
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Employment Law This Week®: Recalibrating Federal Agencies, Marijuana Legalization, the Changing Nature of Work - Monthly Rundown
#BigIdeas2020: NLRB’s Actions Impact Employers in 2020 - Employment Law This Week® - Trending News
[WEBINAR] Public Records Act - Taming the Email Tiger
II-29- E-Mail Curfews, the DOL’s New Self-Audit Program, Social Media Discovery, and Other Noteworthy Employment Law Trends and Developments
Day 18 of One Month to More Effective Continuous Improvement-Email Sweeps for Continuous Improvement
Polsinelli Podcast - Avoiding Professional Liability
Just as the distinction between an individual’s status as independent contractor versus employee can have serious ramifications for wage, tax, and other legal issues, the same can be true for claims relating to unfair...more
Legal Cybersecurity - One of the core advantages that drives parties to arbitrate is the promise of confidentiality. Unlike public court proceedings, arbitrations provide parties with a private forum through which to air and...more
Q: What is the current rule on whether an employee can use our company’s email system to distribute union material? Also, are we permitted to require employees to keep workplace investigations confidential without running...more
The National Labor Relations Board (NLRB) issued two decisions on December 17, 2019, that reversed prior precedent on key workplace issues. In these decisions, the NLRB held that (1) employers may prohibit employees from...more
The question of when parties to a potential transaction actually become bound to each other is obviously an important one, and sometimes the answer can be surprising, or less than entirely clear. A recent Texas Court of...more
The use of email in modern transactions is pervasive. Few negotiating parties consider, however, the possibility that those emails may create a binding obligation when the transaction requires finalization through a formal...more
Recent, highly publicized data security incidents highlight the continued vulnerability of corporate information systems. Notably, employees who fall prey to sophisticated phishing e-mails and other scams often contribute to...more