Practice Tip: A Non-Party Spoliates Key Evidence
Many product liability litigators have experience in dealing with first-party spoliation or assertions of spoliation, either when their own clients are alleged to have spoliated evidence, or when the opposing party purportedly has done so.
Still Seeing Green
The long-awaited revisions to the Federal Trade Commission's (FTC) Green Guides were issued on Oct. 6, 2010 and are expected to be approved and finalized soon. Here's what you need to know.
Hybrid Pension Plans: Tiptoe Through the Tulips
It is time again for firms to consider hybrid plans, such as cash balance plans. In October 2010, the Department of the Treasury issued very helpful guidance, but many of the most important issues remain either unanswered or answered only by proposed regulations.
Features
Social Networking Initiatives
Why women attorneys should participate fully in digital networking.
Make Your First-Years Second-Years
How to build your firm to much higher profit levels and realize more income by making attorneys achieve higher value earlier in their careers.
Features
Retreating in Order to Advance
Law firms are increasingly turning to retreats to help solve their management problems, improve personal relationships, and increase team spirit. But a retreat will not succeed unless adequate time and effort have gone into the planning process.
Court Upholds Forum Selection Clause in Employment Agreement
This case highlights an important tool that all Maryland employers should consider using when drafting employment agreements.
Features
A Refresher on USERRA with Recent Developments
It remains to be seen how the Supreme Court will rule on its first USERRA case this spring, but a review of compliance with USERRA should be every employer's priority.
Features
Managing Employees on Social Media
With social media here to stay and smart mobile devices abounding in offices, employers need to accept that they cannot legally or practically shut down the conversation. Here's what to do.
Terminating Employees for Unapproved Posts
Are employers "free to fire" if their employees violate social media policy? The answer might surprise you.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- China Finalizes New Regulations to Relax Personal Data Exports from ChinaNearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.Read More ›
- 10 Steps Legal Departments Should Be Taking to Prepare for the SEC's Newly Adopted Cybersecurity Risk Governance Rule for Public CompaniesBy readying your company's cybersecurity program now to comply with the SEC's cyber rules, you will also arm your company with a better defense against cyberthreat actors, reduce the reputational harm that comes along with a cybersecurity incident and increase investor confidence in the company's cybersecurity program.Read More ›
