Features
Trade Secrets and Whistleblower Disclosures
A national bank client calls you and says that an internal auditor employee, who has signed stringent confidentiality and non-disclosure agreements, has…
Features
Information Security: The Human Factor
Law firms must be diligent about their information security — not just via protection through technology, but by training staff on what to look for and how to react to cybersecurity threats. Most security breaches arise out of human error or negligence. Educating users is one of the best defenses.
Features
Employment Law Issues in PA's Medical Marijuana Act
The Medical Marijuana Act (MMA) puts Pennsylvania among the growing number of states permitting the use of marijuana for prescribed medicinal purposes. The MMA, like all state laws purporting to "legalize" marijuana use, squarely conflicts with federal law, which still considers marijuana to be a Schedule 1 substance under the Controlled Substances Act, with no legitimate medical uses.
Features
Data Breaches by Employees<br><b><i><font="-1">How to Keep Your Company Out of the Headlines</b></i></font>
The more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider (employee) threats. Insider threats can be malicious, but often they are accidental.
Features
Death of DOL Fiduciary Rule May Not Be Imminent
If one follows the recent onslaught of articles and blogs, Donald Trump's election to the presidency has placed a target squarely on the back of a DOL rule that imposes a fiduciary standard on those who provide investment advice in connection with employer retirement plans and IRAs. Yet reports of the rule's demise may be premature.
Features
Using Background Checks to Hire and Retain Employees
The ability to hire and retain a competent, responsible workforce distinguishes the great human resources managers from the merely mediocre ones. Retention is highly valued in most successful businesses because hiring on limited information often comes down to more luck than skill, and nobody wants to engage in hiring more often than absolutely necessary.
Features
Do Your Employment Practices Violate Antitrust Law? They Might!
Did you know that your employment practices could violate antitrust law? This is the message to be gleaned from joint guidance recently issued by the Federal Trade Commission and the Department of Justice Antitrust Division.
Features
The Meaning of 'Sex'<br><i><font size="-1">LGBTQ Rights Under the Legal Microsope</i><br><i>Part Two of a Two-Part Article</font></i>
The Supreme Court's decision in <i>Gloucester County School Board v. G.G.</i> is likely to have a significant impact on federal workplace discrimination laws, despite the fact that the case does not implicate the employment relationship, or involve employment law.
Features
Injunction of the DOL's Overtime Rule and Its Appeal
Is the Department of Labor's overtime rule now dead? Will the overtime rule be modified to a more modest version? Much uncertainty remains regarding the recently announced overtime rule in both the legal and the political sphere.
Features
Did the New Cause of Action for Job Applicants Under the ADEA Get Axed?
In <i>Villarreal v. R.J. Reynolds Tobacco Co.</i>, the U.S. Court of Appeals for the Eleventh Circuit, on rehearing en banc, reversed its prior holding that job applicants may bring "disparate impact" claims for age discrimination against potential employers, and that the EEOC may toll the statute of limitations in such cases.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Authentic Communications Today Increase Success for Value-Driven ClientsAs the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›