Workplace Sexual Assault and Third-Party Risk: What’s the Tea in L&E?
From Forest to Fortune: Navigating Workplace Ethics With Robin Hood — Hiring to Firing Podcast
Innovation in Compliance: Mastering Communication: Insights from Dr. Dennis Cummins on Speaking and Selling without Selling
Great Woman in Compliance: The Power of Vulnerability with Cricket Snyder
Innovation in Compliance: The Power of Accountability and Team Culture with Gina Cotner
2 Gurus Talk Compliance: Episode 55 – The From Worse to Worser Edition
Compliance Tip of the Day: COSO Governance Framework: Part 4, Culture
Tips for Conducting a Trade Secret Assessment with Rob Jensen
New Virginia "Workplace Violence" Definition and Healthcare Reporting Law: What's the Tea in L&E?
Work This Way: An Employment Law Video Podcast | Episode 51: Smarter Recruiting Strategies with Rhiannon Poore of Forge Search
Daily Compliance News: July 8, 2025, The Learning on the Job Edition
Summer Strategies for Work Success
Work this Way: An Employment Law Video Podcast | Episode 49: Building Culture by Investing in People with Silvia King of Southern First Bank
Performance Reviews: Lessons from Severance — Hiring to Firing Podcast
Coffee Badging: Mastering the Art of Office Presence — Hiring to Firing Podcast
Creativity and Compliance: Nourish Your Audience: A New Approach to Compliance Training
Work This Way: A Labor & Employment Law Podcast | Episode 47: Coaching Leaders & Building Culture with Robyn Knox of The HR Business Connect
Sunday Book Review: May 18, 2025, The Books on Engaged Training Edition
How Modern Workplaces Navigate Generational Shifts: One-on-One with Jeff Landes
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more
President Ronald Reagan once said, “Trust, but verify,” echoing a Russian proverb to describe the relationship moving forward with the Soviet Union. The saying loosely translates into proceeding cautiously when someone is...more
Per recent updates to various sections of Ohio law, all employees and elected officials of public entities in Ohio are required to report alleged fraud, theft in office, or misuse or misappropriation of public money....more
A well-known idiom - widely credited to Ben Franklin in the 1700s - is that an ounce of prevention is worth a pound of cure. Yet, few companies actively train their personnel to recognize the risk of a trade secret...more
While the global pandemic has highlighted the perils of remote work, decades of collective experience undertaking internal investigations for corporations and their advisors in connection with the misappropriation of...more
This week, we bring you our special Spilling Secrets podcast series on the future of non-compete and trade secrets law. An employer often overlooks training employees on what their restrictive covenant means and how to honor...more
To maintain its protection under Texas law, how do you keep a trade secret, secret? Under §134A of the Texas Civil Practice and Remedies Code, also known as the Texas Uniform Trade Secrets Act or TUTSA, a trade secret...more
In 2011, the Federal Circuit in TianRui Grp. Co. v. Int’l Trade Comm’n affirmed the International Trade Commission’s (ITC) authority to look to extraterritorial conduct of a respondent to determine whether that respondent...more
A storm is brewing in the intellectual property world, and it’s heading straight for trade secrets. With millions of Americans quitting their jobs each month — 4.3 million in December alone — and pandemic-stunned...more
The COVID-19 remote work era is now in its tenth month, and employees continue to work away from the physical office, without in-person supervision, and perhaps outside of the company network. During this time, many employees...more
Most companies have strengthened their cybersecurity defenses against outside hackers, but many often neglect the equal threat posed by those within their network walls — employees who already have privileged access to...more
THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more