5 Tips For Writing Conflict Emails
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
Credit Eco to Go Podcast - The Results are In: Consumers Really Do Respond Better to Digital Communications
Tackling Modern Attachment and Link Challenges in G-Suite, Slack, and Teams
PODCAST: Williams Mullen's Benefits Companion - Cybersecurity Considerations for Retirement Plan Sponsors
Business Email Compromise
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Employment Law This Week®: Recalibrating Federal Agencies, Marijuana Legalization, the Changing Nature of Work - Monthly Rundown
#BigIdeas2020: NLRB’s Actions Impact Employers in 2020 - Employment Law This Week® - Trending News
[WEBINAR] Public Records Act - Taming the Email Tiger
II-29- E-Mail Curfews, the DOL’s New Self-Audit Program, Social Media Discovery, and Other Noteworthy Employment Law Trends and Developments
Day 18 of One Month to More Effective Continuous Improvement-Email Sweeps for Continuous Improvement
Polsinelli Podcast - Avoiding Professional Liability
The digital revolution has irrevocably transformed the way we conduct business, and investigations are no exception. The surge in remote work models has rendered traditional on-site data collection methods increasingly...more
Email has been an essential part of professional marketing since it was invented. Though tools have gotten more sophisticated and the best practices for using them have evolved, email is still one of the most effective...more
Federal regulators have cracked down on the use of texts messages and messaging platforms for business communications, using their broad authority to root out record retention violations, resulting in significant fines and...more
Many organizations give employees the ability to work from anywhere, adding convenience and flexibility to work and personal schedules. However, with this flexibility comes responsibility—the responsibility to protect the...more
It’s not a heat wave, it’s a wave of hot eDiscovery case law disputes! Our August 2023 monthly webinar of cases covered by the eDiscovery Today blog discusses six disputes including a motion to compel a forensic examination...more
The world of workforce communication looks vastly different from 2020, including an increased blur between personal and business communications due to remote work environments and access to instant messaging and...more
Join Ricoh and forensics subject matter expert Peter Garza as we give you an insider’s look into the latest in forensics across the evolving digital landscape. Making sense of data collection from the fully remote workplace...more
After collecting, analyzing the volume of data found on devices can be overwhelming. Attorneys and eDiscovery practitioners need the ability to gather insights across a variety of data sources, especially third-party...more
Earlier this month, New York Governor Kathy Hochul signed into a law a bill that will require New York private sector employers to provide written notice to employees before engaging in electronic monitoring of their...more
FOREWORD - On behalf of the new and expanding Goodwin London litigation team I am delighted to welcome you to our first ever ‘Litigation Insights’: a series of quarterly updates on important and interesting developments...more
Many companies that transitioned to a work-from-home environment in early 2020 may have reasonably anticipated a return to the normalcy of in-office operations by the end of the year. Yet as 2021 commences, remote work has...more
Last week, the Illinois Appellate Court issued three separate opinions addressing the scope of the Illinois Freedom of Information Act (FOIA). The opinions provide additional guidance related to what constitutes a reasonable...more
Are digital natives, those who were born in an era when electronic devices were prevalent and in their hands from the moment they were old enough to hold them, better equipped in this current era of social and digital media?...more
What starts online won't stop there - There aren't many college basketball games that change the share price of a Fortune 100 company. But in February 2019, Duke University freshman star Zion Williamson blew out one of his...more
SDNY Rejects Standing under “Increased Risk” Theory Where Data Not Targeted or Stolen - The Southern District of New York rejected a settlement that would have resolved a class action based on the unauthorized (and...more
As an employer or manager, have you ever collected a resigning employee’s employer-owned laptop or cellphone and discovered that the employee left a personal email account automatically logged in? Did you have the urge to...more
What Does Rule 26 Say about Scope and Proportionality? In 2015, when the Federal Rules of Civil Procedure were amended, the issue of scope and Rule 26 was a hot topic of discussion, mainly around the issue of costs. But...more
Two recent murder cases have again highlighted the use of electronic forensics to solve cases that only a few decades ago, would have been difficult to crack in the relatively short time frame between the crime and the...more
On January 29, 2019, the Delaware Supreme Court provided guidance to the Court of Chancery regarding the scope of a stockholder’s inspection rights under Section 220 of the Delaware General Corporation Law or similar LLC or...more
Since a 2013 Illinois Appellate Court decision, City of Champaign v. Madigan, Illinois public bodies have known that three categories of emails and text messages sent to or from personal technology devices are “public...more
As the number and sophistication of social engineering attacks increases, victims are examining their insurance policies to see if they are covered. In The Brick Warehouse LP v. Chubb Insurance Company of Canada, 2017 ABQB...more
Here’s a great idea offered by the National Cyber Security Alliance and the Better Business Bureau: while you are doing your spring cleaning, don’t forget to do a digital spring cleaning too—that is, your computer, cellphone...more
It is now the norm to see passersby glued to their phones as they make their morning trek into work. And when those employees head home, they are often unable to “leave work at the office” as they continue to respond to...more
Any system is only as strong as its weakest link. If your employees aren’t up to date on their cybersecurity hygiene, then it doesn’t matter how much money you spend on technological defences—there’s a gap in your protection....more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more