5 Tips For Writing Conflict Emails
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
Credit Eco to Go Podcast - The Results are In: Consumers Really Do Respond Better to Digital Communications
Tackling Modern Attachment and Link Challenges in G-Suite, Slack, and Teams
PODCAST: Williams Mullen's Benefits Companion - Cybersecurity Considerations for Retirement Plan Sponsors
Business Email Compromise
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Employment Law This Week®: Recalibrating Federal Agencies, Marijuana Legalization, the Changing Nature of Work - Monthly Rundown
#BigIdeas2020: NLRB’s Actions Impact Employers in 2020 - Employment Law This Week® - Trending News
[WEBINAR] Public Records Act - Taming the Email Tiger
II-29- E-Mail Curfews, the DOL’s New Self-Audit Program, Social Media Discovery, and Other Noteworthy Employment Law Trends and Developments
Day 18 of One Month to More Effective Continuous Improvement-Email Sweeps for Continuous Improvement
Polsinelli Podcast - Avoiding Professional Liability
Getting more followers on social media may be an important goal for your law firm. That’s because a growing number of followers is a sign of expanding reach and exposure. As your firm scales, you should see a similar trend...more
Chances are, as a law firm marketer, events are part of your marketing mix. Whether entertaining clients at a golf event, displaying your attorney’s knowledge at a conference, networking, or getting your brand out there is...more
Text-messages-as-evidence has been a hot topic in the popular press lately. The Secret Service apparently lost some volume of text messages surrounding January 6 events even after congressional committees had requested...more
Lead generation for lawyers is one of the most important things you can spend time on. There’s no one-size-fits-all approach. Instead, savvy marketers will create a strategy based on proven channels and an effective...more
Delaware Court of Chancery Finds that Director’s Email on Outside Email System Remains Confidential; Delaware Supreme Court Overrules Longstanding Precedent Regarding Derivative Versus Direct Standing; SEC Files Crowdfunding...more
Just as the distinction between an individual’s status as independent contractor versus employee can have serious ramifications for wage, tax, and other legal issues, the same can be true for claims relating to unfair...more
The Fair Debt Collection Practices Act (FDCPA) was passed to protect the rights of debtors and give guidance to collections agencies in their collection efforts. Although it meant to provide clarity, the FDCPA contains many...more
Attempting to align the Texas legal system with current realities, effective December 31, 2020, Rule 106 of the Texas Rules of Civil Procedure is amended to allow substitute service by “social media, email, or other...more
We often think of phony financial institution emails as a bad actor’s phishing scheme of choice to capture confidential bank account numbers or other private financial information. While those phishing emails certainly do...more
A new study by Check Point Research shows that cyber criminals are using well-known brands to lure victims into clicking on nefarious links, providing personal information or credentials, or getting users to transfer money....more
While I recently published this, I cannot stress the importance of due diligence and care before clicking on links in emails. Phishing scams are out of control. If you do nothing else, hover over any links before clicking....more
Two recent murder cases have again highlighted the use of electronic forensics to solve cases that only a few decades ago, would have been difficult to crack in the relatively short time frame between the crime and the...more
Can a former employer’s alleged misconduct defeat a request for injunctive relief against former employees when those departing workers take confidential information and clients to another employer? A federal appeals court...more
Over the holidays, it’s likely that you or a loved one received some type of computer or device that connects to internet websites, email, and applications. Or that pictures were taken and stored on such a device, or that...more
This week the Securities and Exchange Commission (SEC) issued an investigative report that outlined cyber incidents that nine public companies had experienced, causing fraudulent losses totaling more than $100 million. The...more
Your company has entered into a contract with a smaller, foreign company to do business. While your relationship starts off strong, it quickly sours when you discover that the smaller company’s quality standards do not meet...more
Over 30 workers at a Japanese insurance company are losing their jobs following the company’s adoption of IBM’s Watson Explorer, an artificial intelligence system that will perform an important back office function at the...more
I never knew that since 2006, October has been designated as National Bullying Prevention Awareness Month. According to the Department of Health and Human Service’s website, “This year’s Bullying Prevention Awareness Month...more
We, as a society, are gradually moving away from paper bank statements, jars with money in them, and instructions to loved ones scribbled on notepads. With the growth of our online presence, our lives can be governed almost...more
Last week, the Ninth Circuit limited the scope of the Computer Fraud and Abuse Act (CFAA) in affirming a grant of summary judgment against the defendant in Facebook, Inc. v. Power Ventures, Inc., et. al. and affirmed the rule...more
In a fascinating, must-read article, a Google design ethicist explains the techniques that engineers and entrepreneurs employ to keep us hooked on the web. A majority of U.S. adults—62%—now get their news on social...more
A recent ruling shows that plaintiffs must act fast when using a federal criminal statute for a civil suit. The U.S. Court of Appeals for the Second Circuit in August addressed the proper application of the statute of...more
Facebook. Twitter. LinkedIn. YouTube. Blogs. Email. Texts. Social media and the “E-Workplace” have become a fact of life for all employers. Companies have learned that these social media sites can be powerful marketing tools,...more
Three things you should know on this Privacy Tuesday: Over 110,000 Facebook Uses Hit With Malware - Cybercriminals are targeting Facebook users with malware embedded in videos that are pushed to their timeline...more
Introduction - If the National Labor Relations Board seemed to be on the ropes in 2013, it certainly came out swinging in 2014. Last year, we reported that the Board faced a number of serious legal battles. Although...more