Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Law Firms and Cyber Security Image

Law Firms and Cyber Security

Karl G. Nelson & Michael D. Y. Sukenik

Many law firms today steam along with a false sense of security that the cybercrime lurking in today's electronic channels of commerce does not pose a potentially critical threat. They are wrong.

Consumer Devices, e-Discovery and Security Image

Consumer Devices, e-Discovery and Security

Gavin W. Manes & Tom O'Connor

Smartphones, tablets and other portable electronics have swept the nation in the past few years and are now being integrated into people's personal and business lives on a scale heretofore unseen. However, most of these devices were created for the consumer market and not necessarily for business applications. Therefore, confidential, sensitive and proprietary data must be protected both on the device itself and on the corporate network where the data resides.

Debunking the Seven Biggest Myths of Predictive Coding Image

Debunking the Seven Biggest Myths of Predictive Coding

David J. Kessler

Despite its promise, there are a number of myths associated with the design and use of technology assisted review, and in particular predictive coding, that have obscured the debate around the adoption of this technology. It is time to put an end to some of these myths.

A Guide to Breast-Feeding Policies Image

A Guide to Breast-Feeding Policies

Art Lambert

In-house counsel should examine their companies' breast-feeding policies, including how they handle employees who need time to attend to breast-feeding responsibilities while at work.

Claims of Protected Concerted Activity Image

Claims of Protected Concerted Activity

Kevin C. McCormick

In a recent case, even though there was no evidence that the employee had discussed a particular wage issue with other employees, the NLRB nevertheless found violation.

Features

Electronic Handheld Devices Image

Electronic Handheld Devices

Karla Grossenbacher

There are substantial legal risks associated with requiring employees to carry electronic handheld devices. Here's what employers need to do.

Features

What's Scarier Than an Agency Audit? Three Agency Audits Image

What's Scarier Than an Agency Audit? Three Agency Audits

Robert G. Brody & Rebecca Goldberg

Misclassifying employees as "independent contractors" may put employers in triple jeopardy. (<i>See</i> article <i>infra</i> by Rosanna Sattler.)

Features

Independent Contractor Classification Image

Independent Contractor Classification

Rosanna Sattler, Nancy Puleo & James E. Kruzer

The classification of independent contractors is garnering increased attention at both state and federal agencies and courts. This article outlines some general guidelines based on recent state and federal court decisions.

Don't Bother Asking for Facebook Passwords Image

Don't Bother Asking for Facebook Passwords

Anna Hickman

Social media sites may also contain relevant information not available through traditional screening tools, like criminal background checks or reference checks. But should employers ask for passwords?

The Big Three Myths (And Realities) of Non-Compete Agreements Image

The Big Three Myths (And Realities) of Non-Compete Agreements

Tina A. Syring-Petrocchi

An in-depth look at the most common myths about non-compete agreements.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES