Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

Privacy and Ethics For Social Media In Investigations Image

Privacy and Ethics For Social Media In Investigations

William Michael Jr. & Laura Hammargren

It begins with a name ' perhaps an employee alleged to have been involved in misconduct or a suspected whistleblower. Regardless of the origin of identity, if the person is relevant to a company's internal investigation, whatever information that can be provided is power for the company, the power to make informed decisions.

Features

The Ethical Boundaries of Attorney Whistleblowers Image

The Ethical Boundaries of Attorney Whistleblowers

Lawrence S. Spiegel & Esther E. Bloustein

In recent years, federal legislation has encouraged attorneys to become whistleblowers. These rules are in tension with the lawyer's duties of confidentiality and avoiding conflicts predicated on attorney self-interest because they allow disclosure of client confidential information more broadly than do applicable ethics rules.

Features

Key Privacy Law Developments Image

Key Privacy Law Developments

Jay Edelson & Chandler Givens

Earlier this year, President Obama addressed the nation to outline steps he will take to rein in the surveillance activities of the National Security Agency. Obama noted that "challenges to our privacy do not come from government alone." The President's remarks were the culmination of a year in which consumer privacy issues have roared into the public narrative, and they underscore a theme that privacy lawyers had already sensed about their practice by the end of 2013: The tide is changing.

Features

DE Supreme Court Eases Social Media Authentication Image

DE Supreme Court Eases Social Media Authentication

Jeff Mordock

Social media postings can be submitted as trial evidence as long as the party introducing the evidence can demonstrate to the judge that a jury could reasonably conclude the postings are authentic, the Delaware Supreme Court has ruled.

Features

Best Practices for Comprehensive Searchability Image

Best Practices for Comprehensive Searchability

Dean Sappey

Most law firms now proudly proclaim that they have implemented efficient and secure document management systems, systems in which they have invested significant dollars and even more in "sweat equity." The end goal of these systems is to ensure that all documents are stored securely, and perhaps more importantly, can be found quickly and easily.

Features

We Need to Cut a New Deal on Communications Privacy Image

We Need to Cut a New Deal on Communications Privacy

David R. Johnson

It is (high) time to rewrite and modernize the law that regulates access to our private communications and to the detailed information those communications automatically create.

Features

White House Uploads U.S. Cybersecurity Framework Image

White House Uploads U.S. Cybersecurity Framework

Andrew Ramonas & Steven Salkin

President Barack Obama's administration on Feb. 12 released its much-anticipated voluntary cybersecurity framework, giving U.S. companies a common handbook on how they can try to fend off hackers.

Features

Preparing for the Affordable Care Act Employer Mandate Image

Preparing for the Affordable Care Act Employer Mandate

Gregg Fisch & Michael Campbell

As of Jan. 1, 2015, the ACA begins to impose certain health coverage requirements on employers who have at least 50 employees. Even though its implications are almost a year away, it is not too soon for employers to prepare for the Employer Mandate. Employers would be wise to figure out if the mandate applies to them, understand the potential penalties that can be imposed on them and, taking into account all of the various considerations, decide if they want to pay or play.

Features

<b><i>Online Extra</b></i> FCC To Craft New Net Neutrality Rules Image

<b><i>Online Extra</b></i> FCC To Craft New Net Neutrality Rules

Jenna Greene

Hoping the third time will be the charm, the FCC announced on Feb. 19 that it will craft new rules for net neutrality that will pass muster with the courts.

Features

Global Corruption Enforcement Image

Global Corruption Enforcement

Kirk Ogrosky & Jeffrey Hessekiel

For multinational corporations, reducing the risks and concomitant expenses associated with corrupt employee behavior must be a priority. This article discusses the benefits of embedding compliance doctrine within operations, and how businesses could market integrity and compliance to gain a competitive advantage.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›