Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,062 results for "Employment Law Strategist"...

Employee Data Theft
<b><I>How to Investigate</I></b><p>When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.
Case Notes
The Third Circuit in <I>Capps</I> gave employers who purport to terminate employees because they are misusing their FMLA leave an ironclad defense. Here's a look at the case.
Deferred Compensation and Safe Harbor Plans
The Department of the Treasury has issued final regulations addressing deferred compensation and safe harbor planning utilizing §§ 409A(d)(1), 457(e)11 and 31.3121(v)(2). These regulations set forth how plan sponsors can provide death benefits on a permissibly selective basis.
New Rules Pose Hurdles for Disability Claimants
Over the course of the past few months (and prior to the inauguration of President Trump), the Social Security Administration (SSA) proposed and finalized…
Trade Secrets and Whistleblower Disclosures
A national bank client calls you and says that an internal auditor employee, who has signed stringent confidentiality and non-disclosure agreements, has…
Essential Foundations of Preparedness for Procedures in the Divorce Process
The release of the January 2017 Report of the New York Chief Administrative Judge's Matrimonial Practice Advisory & Rules Committee (MPARC report) provides the stimulus for reflection on the manner in which divorce lawyers process their clients' case matters. Thus, it seems appropriate now to look at some of the practicalities of matrimonial practice and procedure in today's environment.
Information Security: The Human Factor
Law firms must be diligent about their information security — not just via protection through technology, but by training staff on what to look for and how to react to cybersecurity threats. Most security breaches arise out of human error or negligence. Educating users is one of the best defenses.
Lessons Learned from a Quarter Century in Legal Marketing
Words of wisdom for lawyers in all phrases of their careers.
Employment Law Issues in PA's Medical Marijuana Act
The Medical Marijuana Act (MMA) puts Pennsylvania among the growing number of states permitting the use of marijuana for prescribed medicinal purposes. The MMA, like all state laws purporting to "legalize" marijuana use, squarely conflicts with federal law, which still considers marijuana to be a Schedule 1 substance under the Controlled Substances Act, with no legitimate medical uses.
Data Breaches by Employees<br><b><i><font="-1">How to Keep Your Company Out of the Headlines</b></i></font>
The more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider (employee) threats. Insider threats can be malicious, but often they are accidental.

MOST POPULAR STORIES