Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

Privacy and Ethics For Social Media In Investigations Image

Privacy and Ethics For Social Media In Investigations

William Michael Jr. & Laura Hammargren

It begins with a name ' perhaps an employee alleged to have been involved in misconduct or a suspected whistleblower. Regardless of the origin of identity, if the person is relevant to a company's internal investigation, whatever information that can be provided is power for the company, the power to make informed decisions.

Features

The Ethical Boundaries of Attorney Whistleblowers Image

The Ethical Boundaries of Attorney Whistleblowers

Lawrence S. Spiegel & Esther E. Bloustein

In recent years, federal legislation has encouraged attorneys to become whistleblowers. These rules are in tension with the lawyer's duties of confidentiality and avoiding conflicts predicated on attorney self-interest because they allow disclosure of client confidential information more broadly than do applicable ethics rules.

Features

Key Privacy Law Developments Image

Key Privacy Law Developments

Jay Edelson & Chandler Givens

Earlier this year, President Obama addressed the nation to outline steps he will take to rein in the surveillance activities of the National Security Agency. Obama noted that "challenges to our privacy do not come from government alone." The President's remarks were the culmination of a year in which consumer privacy issues have roared into the public narrative, and they underscore a theme that privacy lawyers had already sensed about their practice by the end of 2013: The tide is changing.

Features

DE Supreme Court Eases Social Media Authentication Image

DE Supreme Court Eases Social Media Authentication

Jeff Mordock

Social media postings can be submitted as trial evidence as long as the party introducing the evidence can demonstrate to the judge that a jury could reasonably conclude the postings are authentic, the Delaware Supreme Court has ruled.

Features

Best Practices for Comprehensive Searchability Image

Best Practices for Comprehensive Searchability

Dean Sappey

Most law firms now proudly proclaim that they have implemented efficient and secure document management systems, systems in which they have invested significant dollars and even more in "sweat equity." The end goal of these systems is to ensure that all documents are stored securely, and perhaps more importantly, can be found quickly and easily.

Features

We Need to Cut a New Deal on Communications Privacy Image

We Need to Cut a New Deal on Communications Privacy

David R. Johnson

It is (high) time to rewrite and modernize the law that regulates access to our private communications and to the detailed information those communications automatically create.

Features

White House Uploads U.S. Cybersecurity Framework Image

White House Uploads U.S. Cybersecurity Framework

Andrew Ramonas & Steven Salkin

President Barack Obama's administration on Feb. 12 released its much-anticipated voluntary cybersecurity framework, giving U.S. companies a common handbook on how they can try to fend off hackers.

Features

Preparing for the Affordable Care Act Employer Mandate Image

Preparing for the Affordable Care Act Employer Mandate

Gregg Fisch & Michael Campbell

As of Jan. 1, 2015, the ACA begins to impose certain health coverage requirements on employers who have at least 50 employees. Even though its implications are almost a year away, it is not too soon for employers to prepare for the Employer Mandate. Employers would be wise to figure out if the mandate applies to them, understand the potential penalties that can be imposed on them and, taking into account all of the various considerations, decide if they want to pay or play.

Features

<b><i>Online Extra</b></i> FCC To Craft New Net Neutrality Rules Image

<b><i>Online Extra</b></i> FCC To Craft New Net Neutrality Rules

Jenna Greene

Hoping the third time will be the charm, the FCC announced on Feb. 19 that it will craft new rules for net neutrality that will pass muster with the courts.

Features

Global Corruption Enforcement Image

Global Corruption Enforcement

Kirk Ogrosky & Jeffrey Hessekiel

For multinational corporations, reducing the risks and concomitant expenses associated with corrupt employee behavior must be a priority. This article discusses the benefits of embedding compliance doctrine within operations, and how businesses could market integrity and compliance to gain a competitive advantage.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›