5 Tips For Writing Conflict Emails
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
Credit Eco to Go Podcast - The Results are In: Consumers Really Do Respond Better to Digital Communications
Tackling Modern Attachment and Link Challenges in G-Suite, Slack, and Teams
PODCAST: Williams Mullen's Benefits Companion - Cybersecurity Considerations for Retirement Plan Sponsors
Business Email Compromise
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Employment Law This Week®: Recalibrating Federal Agencies, Marijuana Legalization, the Changing Nature of Work - Monthly Rundown
#BigIdeas2020: NLRB’s Actions Impact Employers in 2020 - Employment Law This Week® - Trending News
[WEBINAR] Public Records Act - Taming the Email Tiger
II-29- E-Mail Curfews, the DOL’s New Self-Audit Program, Social Media Discovery, and Other Noteworthy Employment Law Trends and Developments
Day 18 of One Month to More Effective Continuous Improvement-Email Sweeps for Continuous Improvement
Polsinelli Podcast - Avoiding Professional Liability
Confidentiality is a key consideration in any commercial endeavour. To retain a competitive edge in the market, a business will often do its utmost to maintain the confidentiality of client information and business...more
Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more
Focused on getting their businesses in a position to thrive, few emerging companies think about how documents and document management policies can cause significant future litigation exposure. We have found that emails, IMs,...more
The Federal Trade Commission (FTC) has reported a three-fold increase in consumer reports about scams arising on social media since last year as well as a spike around the time the COVID-19 pandemic began. This includes...more
Can an email be directed to a particular state? No, said a Texas court in Enerquest Oil & Gas, LLC v. Antero Resources Corporation. The court questioned “the very premise of the contention that an email can be sent to a...more
Can a former employer’s alleged misconduct defeat a request for injunctive relief against former employees when those departing workers take confidential information and clients to another employer? A federal appeals court...more
Non-solicitation agreements are commonly used by employers to restrict former employees from soliciting clients following termination of the employment relationship. Courts throughout the country have different takes on the...more
In a recently developing story, on June 20, 2018, automaker and renewable energy giant Tesla filed suit against its now former employee Martin Tripp in the U.S. District Court for the District of Nevada. ...more
Twenty-five years ago most companies’ greatest fear of espionage was employee theft at the photocopy machine at 2 in the morning. The company playbook could not be forwarded in an email or put on a thumb drive in a matter of...more
Having just celebrated its one-year anniversary, the Defend Trade Secrets Act (DTSA) triggered an uptick in federal litigation concerning the fight to protect corporate trade secrets. Though no court has issued the elusive ex...more
What’s in a name? Obviously a lot, as businesses in all industries invest significant time and money to protect their reputations. But, in some sectors, the line between positive and pejorative can be quite thin. Take...more
Recently I shared the podium with an FBI agent who was asked what frustrated him the most when trying to help businesses with trade secret theft. His answer was a surprise: they fire the guy too fast! He explained that when...more
What if employers could read employees’ minds? Cybersecurity firm Stroz Friedberg has developed technology that some might say can do just that. The software, Scout, reads employee emails to determine if an employee is...more
Question: My company recently terminated an employee, and we are very worried she accessed her email inappropriately in the days before she was fired. The timing of it all is … well, quirky. Here’s what happened: The...more
In this week’s episode of Silicon Valley, Richard enjoyed an unprecedented run of success, culminating with the official launch of Pied Piper’s platform. Richard has suffered so many setbacks, it’s little wonder he is...more
Over the last decade, communication via email and text has become a vital part of how many of us communicate in the workplace. In fact, most employees could not fathom the idea of performing their jobs without the use of...more
In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more
Imagine that you are the General Director of a company (the Russian equivalent of an American CEO), and your information security department finds out that an employee, who you have long suspected of industrial espionage, has...more
Today’s hackers and ex-employees steal secrets with USB drives, personal email accounts, and computer networks, making computer forensics critical in detecting trade secret theft....more
Sometimes we can learn valuable employment law lessons from even the non-employment law court decisions. What happens if the boardroom meeting to discuss your company’s trade secrets ends up as pillow talk between an...more
Last month, a federal appeals court issued a ruling permitting an employer in Connecticut to pursue a claim against a former employee who allegedly misappropriated the employer's confidential information from outside the...more
In a decision that could make it easier for U.S. companies to enforce claims against employees who commit cyber theft from remote locations, including from beyond U.S. borders, the Second Circuit breathed life into a...more