Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,059 results for "Employment Law Strategist"...

New Rules Pose Hurdles for Disability Claimants
April 02, 2017
Over the course of the past few months (and prior to the inauguration of President Trump), the Social Security Administration (SSA) proposed and finalized…
Trade Secrets and Whistleblower Disclosures
April 02, 2017
A national bank client calls you and says that an internal auditor employee, who has signed stringent confidentiality and non-disclosure agreements, has…
Essential Foundations of Preparedness for Procedures in the Divorce Process
April 02, 2017
The release of the January 2017 Report of the New York Chief Administrative Judge's Matrimonial Practice Advisory & Rules Committee (MPARC report) provides the stimulus for reflection on the manner in which divorce lawyers process their clients' case matters. Thus, it seems appropriate now to look at some of the practicalities of matrimonial practice and procedure in today's environment.
Information Security: The Human Factor
April 02, 2017
Law firms must be diligent about their information security — not just via protection through technology, but by training staff on what to look for and how to react to cybersecurity threats. Most security breaches arise out of human error or negligence. Educating users is one of the best defenses.
Lessons Learned from a Quarter Century in Legal Marketing
April 01, 2017
Words of wisdom for lawyers in all phrases of their careers.
Employment Law Issues in PA's Medical Marijuana Act
March 02, 2017
The Medical Marijuana Act (MMA) puts Pennsylvania among the growing number of states permitting the use of marijuana for prescribed medicinal purposes. The MMA, like all state laws purporting to "legalize" marijuana use, squarely conflicts with federal law, which still considers marijuana to be a Schedule 1 substance under the Controlled Substances Act, with no legitimate medical uses.
Data Breaches by Employees<br><b><i><font="-1">How to Keep Your Company Out of the Headlines</b></i></font>
March 02, 2017
The more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider (employee) threats. Insider threats can be malicious, but often they are accidental.
Death of DOL Fiduciary Rule May Not Be Imminent
March 02, 2017
If one follows the recent onslaught of articles and blogs, Donald Trump's election to the presidency has placed a target squarely on the back of a DOL rule that imposes a fiduciary standard on those who provide investment advice in connection with employer retirement plans and IRAs. Yet reports of the rule's demise may be premature.
Using Background Checks to Hire and Retain Employees
March 01, 2017
The ability to hire and retain a competent, responsible workforce distinguishes the great human resources managers from the merely mediocre ones. Retention is highly valued in most successful businesses because hiring on limited information often comes down to more luck than skill, and nobody wants to engage in hiring more often than absolutely necessary.
Do Your Employment Practices Violate Antitrust Law? They Might!
February 01, 2017
Did you know that your employment practices could violate antitrust law? This is the message to be gleaned from joint guidance recently issued by the Federal Trade Commission and the Department of Justice Antitrust Division.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • How the U.S.-China Trade War Effects IP Strategy
    The trade war between the United States and China has had far-reaching effects on international trade and the global economy. The dispute is slowly developing into a battle of attrition, without any immediate resolution on the horizon despite ongoing trade talks. As businesses change the way they operate in response to this unpredictable trade environment, counsel should consider the risks and potential impacts on corporate IP strategy.
    Read More ›