Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
Julie Mortimer of Mills & Reeve on The Right Way to Kickstart Your CRM Strategy - Passle's CMO Series Podcast EP176
Compliance Tip of the Day: COSO Governance Framework: Part 4, Culture
Tips for Conducting a Trade Secret Assessment with Rob Jensen
Bar Exam Toolbox Podcast Episode 318: Quick Tips -- The Final Two-Week Bar Exam Countdown
Navigating Employee Integration in Mergers and Acquisitions: Lessons From Pretty Woman — Hiring to Firing Podcast
Work This Way: An Employment Law Video Podcast | Episode 51: Smarter Recruiting Strategies with Rhiannon Poore of Forge Search
California Employment News: Creating the Report for a Workplace Investigation – Part 4 (Featured)
Compliance Tip of the Day: Assessing Internal Controls
Compliance Tip of the Day: COSO Objective 5 – Monitoring Activities
Compliance Tip of the Day: COSO Objective 3 – Control Activities
Compliance Tip of the Day – COSO Objective 1 – Control Environment
Hiring Smarter: Best Practices for Interviews: What's the Tea in L&E?
Compliance Tip of the Day – New FCPA Enforcement Memo – What Does it Mean?
Compliance Tip of the Day: Code of Conduct as an Internal Control
California Employment News: Gathering Information in a Workplace Investigation – Part 2 (Featured)
Compliance Tip of the Day: Risk Assessments and Internal Controls
FCPA Compliance Report: The Role of Culture and Data in Fraud Risk Management - A Conversation with Vincent Walden
Compliance Tip of the Day: Podcasting for Compliance Training
Compliance Tip of the Day: Compliance Training Frequency
The ubiquity of social media in our world is impossible to ignore. Over 5 billion people use social media globally in 2025, representing more than 60% of the world’s population....more
Whether we refer to them as “linked documents” or “modern attachments,” gathering the information contained in these files poses an increasing challenge in the ever-evolving e-discovery landscape. I had the privilege of...more
Seven years ago, I wrote an article about what I called the eDiscovery Disconnect—the gap between the work being done on data and the legal strategy that drives discovery. Unfortunately, not much has changed since then, but...more
Are emojis legally binding? Can they be used as evidence in court? The answer is complicated....more
Safeguarding against evidence spoliation ahead of litigations, audits, or investigations is a lot easier when you have a timely, defensible legal hold process. In this conversation, take a look at how to achieve this by...more
Whether a property damage loss involves vehicle impact, structural collapse, construction defect, equipment failure, fire or explosion, hail, lightning, storm, animal activity, or water, at some point the expert may need to...more
Wish there was a blueprint for a defensible legal hold process? A preservation playbook is a great place to start! The duty to preserve doesn’t necessarily call for a defined preservation plan, but this one simple action...more
The March sessions of Legalweek took place recently, and as with the February sessions, the virtual event struck a chord that reverberated deep from within the heart of a (hopefully) receding pandemic. However, the...more
From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more
In 2003 Judge Shira Scheindlin wrote “once a party reasonably anticipates litigation, it must suspend its routine document retention/destruction policy and put in place a 'litigation hold' to ensure the preservation of...more
What makes a great legal hold process? We all know that preservation of evidence is the precursor to ediscovery and all ensuing negotiations and court proceedings. But how you recognize and respond to a preservation...more
The success of any eDisclosure project, whether litigation, investigation or regulatory compliance, depends on the story that your data tells and often, how expeditiously you can acquire that data for analysis. Yet forensic...more
Electronically-stored information (ESI) has permeated business processes so completely that electronic discovery has become the norm in litigation and investigations rather than the exception. Although the core principles...more
Times are a-changing! Back in the day (pre-2013), email dominated business communications. It was simply the standard. Fast forward to today, the shift to collaboration applications like Slack, Microsoft Teams, and others has...more