News & Analysis as of

Sensitive Business Information Policies and Procedures

NAVEX

Part 3: 4 Characteristics of a Successful Whistleblower Hotline

NAVEX on

So far, in this three-part series, we discussed the various kinds of whistleblowing hotlines and the key components that comprise of a whistleblower hotline. In part three, we’ll discuss the four characteristics of a...more

Mitratech Holdings, Inc

HR Compliance & Remote Employee Engagement: Where the Two Meet (Part 2)

Mitratech Holdings, Inc on

Businesses know there are distinct challenges when balancing remote work, employee engagement, and HR compliance. Unfortunately, many cannot focus on all three things, and one, two, or even all three get lost. Not focusing on...more

HaystackID

[Webcast Transcript] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories

HaystackID on

Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more

StoneTurn

Shifting Cyber Landscape – Crisis Awareness as a Means to Prevent and Prepare

StoneTurn on

Crises and uncertainty are inevitable forces in modern business, particularly in cyber and digital. General counsels and legal risk executives are well suited to lead preparedness and resiliency for future crises, uniting key...more

Proskauer - Minding Your Business

The Sound of “Silent Attorneys”: DOJ Alleges Google Fakes Attorney-Client Privilege by CCing Lawyers Who Never Respond

If a request for legal advice goes unanswered, is it really a request for legal advice? According to the U.S. Department of Justice and several state attorneys general (“DOJ Plaintiffs”) in an antitrust action against...more

Ankura

Implementing the NIST Privacy Framework – Govern Function

Ankura on

The National Institute of Standards and Technology (NIST) Privacy Framework is a widely known control set used to assist organizations in identifying privacy risks within their business environment and allocating resources to...more

Snell & Wilmer

Protecting Your Trade Secrets in the COVID-19 Environment

Snell & Wilmer on

In addition to the many complications, concerns and changes that working in the COVID-19 environment brings, it is important to evaluate the impact it plays on a company’s internal workings, one of which is a company’s trade...more

Hogan Lovells

Practical business tips to weather COVID-19: Employees trade secret protection policies and procedures

Hogan Lovells on

The risk of disclosure of sensitive business information significantly increases with more employees working remotely due to COVID-19 as information is accessed outside the office. ...more

Sheppard Mullin Richter & Hampton LLP

“Internet of Things” Guidance to be Added to Cybersecurity Requirements for Agencies and Federal Contractors

In 2019, cybersecurity has become top-of-mind for most federal government contractors and agencies that share sensitive information. In addition to updated Department of Defense guidance and procedures for evaluating...more

Fisher Phillips

Lessons You Can Learn From the Chadbourne Litigation and Ensuing Discovery Disputes

Fisher Phillips on

When you combine an increased social awareness of pay disparity issues with an influx of new pay equity legislation at the state and local level, it’s no surprise that lawsuits involving large and high-profile employers are...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide