Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Supreme Court Review: FLSA, Title VII, First Amendment, Religious Freedom Image

Supreme Court Review: FLSA, Title VII, First Amendment, Religious Freedom

John P. Furfaro & Risa M. Salins

This review of U.S. Supreme Court decisions from the 2015-16 term in the area of labor and employment law looks at rulings pertaining to whether automobile service advisers are exempt from overtime pay under the FLSA; whether a ruling on the merits is a necessary predicate to finding a defendant is a prevailing party eligible for an attorney fees award under Title VII; and much

Columns & Departments

Case Notes Image

Case Notes

Analysis of a case in which Tylenol defendants' experts failed the <I>Daubert</I> test

Features

Privacy and Security of Personal Information Collected by Employee Benefit Plans Image

Privacy and Security of Personal Information Collected by Employee Benefit Plans

Marc Bussone

High profile cyberattacks and data breaches have become routine occurrences. Cyber threats are so pervasive that many privacy and security experts advise that responsible parties ' like fiduciaries of employee benefit plans ' should prepare for <i>when</i> a data breach occurs, not <i>if</i>. Data collected by employee benefit plans includes sensitive information that makes them a particularly attractive target for cybercrime.

Features

Sullivan & Worcester's Advancement Think Tank Image

Sullivan & Worcester's Advancement Think Tank

Ojen Sirin & Leah Schloss

This article explores a firm's content development initiative experiment from the marketing and professional development perspectives. A group of about eight senior associates, known as SWATT (Sullivan &amp; Worcester's Advancement Think Tank), were charged with developing the content. Here is their story.

Features

Three-Way Stop: Project Management, Technology and Process Improvement Image

Three-Way Stop: Project Management, Technology and Process Improvement

Micah Ascano

Legal Project Management has seen an explosion of interest from the legal industry in recent years. It has been touted as the key to efficient legal work and a cure-all for the woes of fixed fees, fee caps, and lawyers who blow budgets. But what are the drawbacks?

Features

The SEC Whistleblower Program Image

The SEC Whistleblower Program

Stephanie Korenman & Aegis J. Frumento

Last month, in Part One of this article,we examined the overall structure, operation and experience of the SEC's Whistleblower program over the first five years of its operation. In Part Two herein, we take a closer look at how the Office of the Whistleblower (OWB) processes Whistleblower claims, and we examine the claim decisions rendered through April 2016.

Features

The Troubled Energy and Production (Oil and Gas) Sector Image

The Troubled Energy and Production (Oil and Gas) Sector

Mark S. Melickian

The oil and gas exploration sector in North America has been crushed by high debt, globally low oil prices and regional overcapacity. The result: Over 100 oil and gas exploration and production companies have filed for bankruptcy over the past 18 months, and dozens more are expected to follow.

Features

EU-U.S. Privacy Shield Finalized Image

EU-U.S. Privacy Shield Finalized

Jonathan Armstrong & Andr' Bywater

The European Commission concluded more than six months of negotiations both within the EU institutions and with the U.S. on July 12 with the announcement that agreement had been reached on the Privacy Shield scheme to transfer data from the EU to the U.S.

Features

Should You Reconsider Your Bankruptcy Remoteness Strategy? Image

Should You Reconsider Your Bankruptcy Remoteness Strategy?

Robert W. Dremluk

Two recent bankruptcy court decisions have highlighted certain weaknesses regarding bankruptcy remoteness ' a concept that typically arises in the context of structured finance and asset securitization transactions.

Features

Cybersecurity Beyond Traditional Risk Management Image

Cybersecurity Beyond Traditional Risk Management

Justin Hectus

At a recent CIO panel, an audience member asked the three of us on stage: "What do you see as your number one priority in the coming 12 months?" I responded "cybersecurity" without hesitation. The panelist that followed said that cybersecurity was a priority, but that it is a subset of risk management. This was not the first time I have heard the chief information pro and/or technologist in a large company make that point, and I have to respectfully disagree.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The FTC Gets Into the College Athlete NIL Game
    As national champions are crowned in men's and women's basketball, hundreds of thousands of college athletes are entering the influencer marketplace for the first time and now find themselves attractive candidates in the fast growing influencer marketing arena. With influencer marketing potentially providing a 5x return on investment, many brands are eager to get into the industry, but it doesn't come without risks as the FTC Commissioner is taking a closer look at the use of influencers for marketing.
    Read More ›