Keywords

Newsletter

Topic

From

To

  • Case Notes

    July 02, 2017 |

    The latest test of whether part of the Civil Rights Act can be read to bar workplace discrimination because of sexual orientation proved complicated on Jan. 20 a the Second Circuit. Here's a look at the case.

  • The Dire Financial Consequences of Misclassifying Your Employees

    June 02, 2017 |

    Looking at a Case in Florida

    In February of this year, a Florida appeals court upheld a decision by Gov. Rick Scott's administration that Uber drivers are independent contractors and not employees. In terms of the law, the decision was hardly revolutionary. It did, however, highligh

  • EEOC Updates Guidance on National Origin Discrimination

    May 02, 2017 |

    At the end of last year, the Equal Employment Opportunity Commission (EEOC) for the first time in 14 years updated its Guidance on national origin discrimination. The Guidance serves as a road map for employers on how the EEOC will investigate national origin discrimination charges. As a result, emp

  • Employee Data Theft

    May 02, 2017 |

    How to Investigate

    When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.

  • Case Notes

    May 02, 2017 |

    The Third Circuit in Capps gave employers who purport to terminate employees because they are misusing their FMLA leave an ironclad defense. Here's a look at the case.

  • Deferred Compensation and Safe Harbor Plans

    April 02, 2017 |

    The Department of the Treasury has issued final regulations addressing deferred compensation and safe harbor planning utilizing §§ 409A(d)(1), 457(e)11 and 31.3121(v)(2). These regulations set forth how plan sponsors can provide death benefits on a permissibly selective basis.

  • Information Security: The Human Factor

    April 02, 2017 |

    Law firms must be diligent about their information security — not just via protection through technology, but by training staff on what to look for and how to react to cybersecurity threats. Most security breaches arise out of human error or negligence. Educating users is one of the best defenses.

  • Trade Secrets and Whistleblower Disclosures

    April 02, 2017 |

    A national bank client calls you and says that an internal auditor employee, who has signed stringent confidentiality and non-disclosure agreements, has…