We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance

Results: 1-10 of 4,949

Pokémon Go in the Workplace: Oh Look There’s a Pikachu!
  • Mintz Levin Cohn Ferris Glovsky and Popeo PC
  • USA
  • July 20 2016

Did you know that the world is now inhabited by creatures called Pokémon? (Or maybe they’ve always been there?) Some run across the plains; others

Is the OFCCP’s take on the internet applicant rule outdated?
  • Constangy Brooks Smith & Prophete LLP
  • USA
  • July 20 2016

A recent Q & A from the "Workologist" column in the New York Times caught my eye. The correspondent was asking how to ensure that a ré

The Week in Weed: July 15, 2015
  • Seyfarth Shaw LLP
  • USA
  • July 14 2016

Welcome back to The Week in Weed, your Friday look at what's happening in the world of legalized marijuana. U.S. Senate Panel to Hold Hearing on

CFAA Double Feature: Ninth Circuit Issues Two Important Decisions on the Scope of Liability Related to Data Scraping and Unauthorized Access to Employer Databases
  • Proskauer Rose LLP
  • USA
  • July 14 2016

A former employee, whose access has been revoked, and who uses a current employee’s login credentials to gain network access to his former company’s

Great expectations? Let’s start with reasonable expectations
  • Ford & Harrison LLP
  • USA
  • June 27 2016

Expectations are a funny thing. They can be good in that they set forth an objective measure for expected performance, goals and standards of conduct

Tucker Ellis Successfully Prosecutes CMBA Disciplinary Case
  • Tucker Ellis
  • USA
  • June 20 2016

On June 15, the Supreme Court of Ohio unanimously held that a Cleveland-area attorney committed multiple violations of the Ohio Rules of Professional

Employee information security checklist
  • Foley & Lardner LLP
  • USA
  • June 7 2016

Employees are the front line of your information security defense. While technological protections are essential (for example, anti-virus software

Three Things to Never Put in an E-mail
  • Kegler Brown Hill + Ritter
  • USA
  • June 1 2016

For better or worse, almost all electronic communications are discoverable and electronic communications can never truly be deleted (or so we are

Education Lead Generator Settles With FTC
  • Manatt Phelps & Phillips LLP
  • USA
  • May 19 2016

In its first enforcement action against an education lead generator, the Federal Trade Commission reached a deal with the operators of Gigats.com over

Employee Training about phishing is critical since only 3 of phishing targets alert management!
  • Gardere
  • USA
  • May 9 2016

Is there any doubt that training employees about phishing would help reduce the malware damage? Of course there's also no surprise in a recent