Tips for Conducting a Trade Secret Assessment with Rob Jensen
Safeguarding Your Business Data
Trade Secrets in Hollywood: Lessons from Oscar-Nominated Films - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday®: Trade Secret Litigation - Lessons from High-Stakes Group Exits - Spilling Secrets Podcast - Employment Law This Week®
New Developments in Health Information Policy
#WorkforceWednesday®: 2024’s Biggest Trade Secrets and Non-Compete Developments - Spilling Secrets Podcast - Employment Law This Week®
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
#WorkforceWednesday®: Beyond Non-Competes - IP and Trade Secret Assessment Strategies for Employers - Spilling Secrets Podcast - Employment Law This Week®
4 Tips for Protecting Your AI Products
6 Things To Consider Before Litigation
#WorkforceWednesday®: Wizarding and the World of Trade Secrets - Spilling Secrets Podcast - Employment Law This Week®
What's the Tea in L&E? Can You Share An Employee's Medical Info?
Exploring Employment Law Across Borders: Italy vs. US With White Lotus — Hiring to Firing Podcast
Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
JONES DAY PRESENTS®: Employer Options in a Non-Noncompete World
California Employment News: Understanding the Basics of Employee Personnel Files (Featured Podcast)
California Employment News: Understanding the Basics of Employee Personnel Files (Featured)
What's the Tea in L&E? Employee Devices: What is #NSFW?
Work This Way: A Labor & Employment Law Podcast - Episode 25: Issues for Public Employers with Bertha Enriquez of Renewable Water Resources
Trade Secret Litigation: The Power of Protection
Litigation adversaries often trigger privilege and work product disputes when they seek each other’s documents. But what if your client’s adversary subpoenas a third party holding your client’s privileged documents — whose...more
Not everything stamped “privileged” is safe from prying eyes. The Pennsylvania Superior Court recently ruled that interview notes compiled by a sorority’s leadership after a tragic incident were not shielded by...more
A privilege log is the absolute bane of an attorney’s existence. I don’t mean it isn’t important and a critical component of discovery, but the level of planning, analysis and detail required to complete such a log is...more
A decision handed down by the French Court of Cassation may affect the scope of attorney-client privilege in France....more
Handle investigations with confidence - Effective compliance programs rely on effective investigators to follow up on reports and identify potential gaps that need attention. If you are a new or future investigator or are...more
In November of 2022, ChatGPT upended our thinking about artificial intelligence with a new form of machine learning called Generative AI (GenAI). Since then, discussions about GenAI models like GPT have taken center stage in...more
1. THE ATTORNEY-CLIENT PRIVILEGE - Historically, the attorney-client privilege developed upon two assumptions: (1) good legal assistance requires full disclosure of a client’s legal problems; and (2) a client will only...more
Receiving a document subpoena from the DOJ, the SEC, or any other US regulatory authority is a stressful and unpleasant situation. Things may seem even more stressful and complicated if you are a foreign national or company...more
Gain the tools you need to lead investigations with confidence! Get guidance from experienced practitioners on the core principles of conducting effective compliance investigations. You’ll receive comprehensive instructions...more
Handle investigations with confidence - Learn the core principles of conducting effective compliance investigations including gathering evidence, documentation, conducting interviews, and reporting results....more
Handle investigations with confidence - We’ve renamed our highly effective workshop, Conducting Compliance Investigations, to better reflect the content. The agenda remains focused on guiding you through the core...more
The volumes of evidence available for litigation are such that privileged documents – a small but important subset of any evidence collection – can easily be overlooked, commingled, misplaced, or simply lost. In addition, the...more
Want to become a better investigator? Learn the core principles of conducting effective compliance investigations so that you're prepared next time you are called upon. Receive detailed and valuable information from...more
Get the training you need to conduct internal investigations - SCCE's Conducting Compliance Investigations provides two days of focused training on conducting compliance-related internal investigations. Learn from two...more
Want to become a better investigator? Join us at Conducing Compliance Investigations, a two-day virtual event that’ll help you learn the core principles of conducting effective compliance investigations so that you're...more
Privacy Litigation Webinar Series Part 1 - Our Global Privacy & Cybersecurity team will be hosting a monthly webinar series on key issues and developments in privacy litigation. Confidentiality is a fundamental...more
Federal litigators aren’t taking sufficient advantage of 2008 amendments to Federal Rule of Evidence 502, which gives them the authority to obtain protective orders that can stem the damage from inadvertent disclosure of...more
Learn the core principles of conducting effective compliance investigations so that you're prepared next time you are called upon. Receive detailed and valuable information from experienced investigators: Meric Bloch and...more
Get the training you need to conduct internal investigations - The SCCE Internal Investigations Workshop provides two days of focused training on conducting compliance-related internal investigations. Attendees also have...more