California Employment News: California Wage Compliance – Avoiding Legal Pitfalls
California Employment News: CA Local Minimum Wage Updates
(Podcast) California Employment News: CA Local Minimum Wage Updates
Adaptive Reuse: From Desks to Doorways
Law School Toolbox Podcast Episode 514: Listen and Learn -- Discovery (Civ Pro)
A Counterintuitive Approach to Winning Without Litigation: One-on-One with Haley Morrison
(Podcast) California Employment News: Creating the Report for a Workplace Investigation – Part 4 (Featured)
California Employment News: Creating the Report for a Workplace Investigation – Part 4 (Featured)
Law School Toolbox Podcast Episode 511: Listen and Learn -- Landlord/Tenant Law (Part 1)
From Permits to Penalties: A Deep Dive Into Coastal Development Law
California Employment News: Synthesizing Evidence in a Workplace Investigation – Part 3 (Featured)
Doc Fees Decoded: The Price of Paperwork in Auto Sales — Moving the Metal: The Auto Finance Podcast
(Podcast) California Employment News: Gathering Information in a Workplace Investigation – Part 2 (Featured)
California Employment News: Gathering Information in a Workplace Investigation – Part 2 (Featured)
Bar Exam Toolbox Podcast Episode 314: Listen and Learn -- False Imprisonment and Shopkeeper’s Privilege (Torts)
(Podcast) California Employment News: Starting a Workplace Investigation – Part 1 (Featured)
California Employment News: Starting a Workplace Investigation – Part 1 (Featured)
Feeling the Heat: Strategies to Keep Cool Under California's Consumers Legal Remedies Act — The Consumer Finance Podcast
The JustPod: Prosecutor-Initiated Resentencing: A Discussion with Hillary Blout
Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed. State Action: Virginia Governor Signs Bill Restricting Minor’s Use of Social Media:...more
Customer lists held by providers and the personal information users enter to obtain digital wallets or set up crypto exchange accounts are enviable targets for hackers. Such data can be used to launch targeted phishing...more