Features
<i>FTC v. Google</i>: Lessons Learned
Twice in less than 12 months, the FTC has investigated Google Inc.'s personal data-handling practices to compare them with Google's representations made in its website privacy policy and other documents. And twice in less than 12 months, the FTC has determined that Google's practices constituted misrepresentation.
Features
Corporate Internal Investigations
This is the last of a three-part series giving companies a step-by-step guide for planning and conducting sensitive internal investigations into potential wrongdoing.
Features
Hostile Use of 'Friend' Request Puts Lawyers in Ethics Trouble
Two New Jersey defense lawyers have been hit with ethics charges for having used Facebook in an unfriendly fashion.
Features
The Importance of Self-Regulation In Improving Digital Privacy
The National Association of Attorneys General (NAAG) has made digital privacy and online children's safety the center of its 2012-13 agenda, as the new NAAG president, Maryland attorney general Douglas Gansler, made clear in a statement in June, in announcing the "Privacy in the Digital Age" initiative.
Features
Best Practices for ERISA ' 408(b)(2) Compliance
To achieve the goals of the new ERISA laws, participants and sponsors will have access to more information which will increase the responsibility of plan sponsors to act upon the information received.
Features
The FTC Act
The pitfalls of an inadequate privacy policy; an analysis of recent litigation.
Features
e-Discovery and U.S.Privacy Laws
U.S. data privacy laws pose complex issues for corporations, especially in the context of e-discovery. Here's what you need to know.
Features
Components of a Truthful Complaint
If you've represented companies for any length of time, you've received internal complaints about a variety of workplace wrongdoings. How can you tell if the complaints are true?
Features
Domestic Commercial Bribery
While foreign bribery and corruption cases are currently getting most of the attention, this is no reason for domestic concerns to get too relaxed. Here's why.
Features
Clients in Cross-Border Investigations
This era of instantaneous cross-border communication and commerce has brought with it a corresponding increase in the application of the white-collar criminal laws of various countries to companies' international operations.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Big Law Banks On Contingency Fees to Maximize ProfitabilityIn a quest to maximize profitability, Am Law 200 law firms have grown their share of business tied to contingency fees, a gamble that has paid off for some firms in recent years.Read More ›
- How Secure Is the AI System Your Law Firm Is Using?In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›