Executive Summaries

 
 
  • Drafting BYOD Policies

    Bring Your Own Device (BYOD) is ubiquitous in many industries, but allowing employees to retain confidential company information on personal devices poses a number of risks. Exposure resulting from a leak of information on an employee-owned device...

    • Posted 1 month ago
    • 0
  • A Global Look at Managing Extremism in the Workplace

    Recent acts of terrorism in the name of religion in France, England and other countries, along with demonstrations and protests across the United States by extremist groups, have created management challenges for employers around the globe. Issues...

    • Posted 1 month ago
    • 0
  • “Sex” In Title VII

    Gender norms are rapidly breaking down. As millennials join the workforce, they bring changed attitudes with them. Ironically, the law that governs the changes those attitudes mandate originated back in 1964. Title VII is a piece of...

    • Posted 1 month ago
    • 0
  • Managing Corporate Data in the Era of Mobile Tech and the Internet of Things

    The increase in data has serious legal implications for American businesses in the areas of data security, e-discovery, and recordkeeping. Without good data management, enterprise data can become a liability. At any time, a business’s data could...

    • Posted 1 month ago
    • 0
  • Q&A on E-Discovery

    The increased use of technology in the workplace has added to the complexity of e-discovery. Relevant, discoverable information may be on a computer, on a mobile device or in the cloud. Identifying, finding and preserving all of...

    • Posted 1 month ago
    • 0
  • Protecting Client Data When Traveling

    Critical data should never be stored solely on mobile devices. It must be stored at a secure location so that the loss of a device does not mean the complete loss of data. Concerns regarding protection of...

    • Posted 1 month ago
    • 0
  • Combine AI and Human Expertise for Effective Trademarking

    AI offers important advantages for trademark research. Properly implemented, it can be used to automate complex cognitive tasks and increase the effectiveness of search and watch results, while also improving speed and efficiency. Considering how advanced AI-enabled...

    • Posted 1 month ago
    • 0
  • Self-Reporting FCPA Violations

    In April 2016, the Fraud Section of the U.S. Department of Justice’s Criminal Division introduced a Foreign Corrupt Practice Act (FCPA) pilot program, which was intended to be a one-year experiment to incentivize self-disclosure of potential FCPA...

    • Posted 1 month ago
    • 0
  • Message-Managing in a Crisis: Lessons from a PR Disaster

    Corporations and other large organizations are smart to establish their own virtual “Situation Room” response teams, who swing into action following an unwelcome event. United Airlines’ crisis response to the spectacle of their bloodied passenger, Dr. David...

    • Posted 1 month ago
    • 0
  • Conducting Privileged Internal Investigations

    In-house attorneys receiving a whistleblower complaint, government inquiry or other alert must decide whether and how to conduct an internal investigation. If they choose to do it in-house, they must manage many complex issues to ensure that...

    • Posted 1 month ago
    • 0