Account

Sign in to access your account and subscription

Register

Regulation

  • It is a truth universally acknowledged that even the most well-written agreement never covers all potential issues that may arise in the future, and that when the rubber hits the road, the parties to the agreement never interpret its terms the same way.

    February 28, 2014Beata Krakus
  • It begins with a name ' perhaps an employee alleged to have been involved in misconduct or a suspected whistleblower. Regardless of the origin of identity, if the person is relevant to a company's internal investigation, whatever information that can be provided is power for the company, the power to make informed decisions.

    February 28, 2014William Michael Jr. and Laura Hammargren
  • In recent years, federal legislation has encouraged attorneys to become whistleblowers. These rules are in tension with the lawyer's duties of confidentiality and avoiding conflicts predicated on attorney self-interest because they allow disclosure of client confidential information more broadly than do applicable ethics rules.

    February 28, 2014Lawrence S. Spiegel and Esther E. Bloustein
  • Earlier this year, President Obama addressed the nation to outline steps he will take to rein in the surveillance activities of the National Security Agency. Obama noted that "challenges to our privacy do not come from government alone." The President's remarks were the culmination of a year in which consumer privacy issues have roared into the public narrative, and they underscore a theme that privacy lawyers had already sensed about their practice by the end of 2013: The tide is changing.

    February 28, 2014Jay Edelson and Chandler Givens
  • Social media postings can be submitted as trial evidence as long as the party introducing the evidence can demonstrate to the judge that a jury could reasonably conclude the postings are authentic, the Delaware Supreme Court has ruled.

    February 28, 2014Jeff Mordock
  • Most law firms now proudly proclaim that they have implemented efficient and secure document management systems, systems in which they have invested significant dollars and even more in "sweat equity." The end goal of these systems is to ensure that all documents are stored securely, and perhaps more importantly, can be found quickly and easily.

    February 28, 2014Dean Sappey
  • It is (high) time to rewrite and modernize the law that regulates access to our private communications and to the detailed information those communications automatically create.

    February 28, 2014David R. Johnson
  • President Barack Obama's administration on Feb. 12 released its much-anticipated voluntary cybersecurity framework, giving U.S. companies a common handbook on how they can try to fend off hackers.

    February 28, 2014Andrew Ramonas and Steven Salkin
  • As of Jan. 1, 2015, the ACA begins to impose certain health coverage requirements on employers who have at least 50 employees. Even though its implications are almost a year away, it is not too soon for employers to prepare for the Employer Mandate. Employers would be wise to figure out if the mandate applies to them, understand the potential penalties that can be imposed on them and, taking into account all of the various considerations, decide if they want to pay or play.

    February 28, 2014Gregg Fisch and Michael Campbell