Work This Way: A Labor & Employment Law Podcast | Episode 43: How Employers Can Navigate White Collar Crime with Erica Barnes & Christian Dysart of Maynard Nexsen
Harassment in the Celebrity Workplace: Insights From It Ends With Us — Hiring to Firing Podcast
Managing Employee Compliance in Highly Regulated Industries — Hiring to Firing Podcast
California Employment News: Effective Disciplinary Procedures and Policies (Podcast)
California Employment News: Effective Disciplinary Procedures and Policies
Effective Harassment Trainings: Best Approaches With Insights from NCIS — Hiring to Firing Podcast
How to Combat Corporate Theft: Office Space - Hiring to Firing Podcast
SEC Settles with Activision for $35 Million - Employment Law This Week®
California Employment News: Starting a Workplace Investigation (Part 1)
JONES DAY TALKS®: The eBay Cyberstalking Case: Mitigating the Compliance Risks of Employee Misconduct
The ABCs of Employee Theft [More With McGlinchey Ep. 7]
Day 1 of One Month to Better Investigations and Reporting-Introduction to Investigations and Internal Reporting
Day 22 of One Month to Better Compliance Through HR-10 Questions to Better Operationalize Compliance
Day 11 of One Month to Better Compliance Through HR-the Fair Process Doctrine
In recent years, internal investigations into employee complaints and employee conduct have been on the rise across a variety of industry sectors. Employment (or workplace) investigations can take many forms, and can be...more
In Site Jab v. Hiscox Insurance Company, Inc., United States District Judge Lee H. Rosenthal recently tackled whether a business owner’s insurance policy provided coverage for theft of information, including confidential...more
The Ponemon Institute recently issued its 2020 Cost of insider Threats Global Report, which finds that the frequency and cost of insider threats is continued to increase. Sponsored by ObserveIT and IBM, the 2020 report is the...more
Data security and privacy is a hot global topic right now. New laws that closely regulate data security practices seem to be popping up everywhere in order to account for all of the data people transmit electronically daily....more