Our 2017 Labor and Employment Webinar Series will track the challenges that employers face through the highs and lows of the business cycle that can drive and ultimately determine a company’s success. Stages in this cycle can include company formation, growth through new investments or strategic alliances, and workforce restructuring due to changing economic conditions.
At each stage, there are discrete labor and employment issues that must be understood and addressed, which exist alongside complicating factors such as changing technologies, regulatory oversight and best practices for a compliant workforce. Polsinelli’s Labor and Employment attorneys will be joined by colleagues from practices across the firm (including Intellectual Property, White Collar, and Employee Benefits) to provide a comprehensive review of these issues.
In this series, we will follow the rise and fall of the innovative but fictional Diamond Datascram Inc. during the four main phases of the business cycle:
1. Formation: Diamond Datascram Development
2. Peak: Diamond Datascram Dominance
3. Contraction: Diamond Datascram Decline
4. Trough: Diamond Datascram Decimated
An hour long presentation on "hot topics" for Canadian employers. Deals with business system monitoring, employee responsibility for "off duty" publication and background checks.
Oracle ACE Director Dan Morgan and Performance Tuning Corporation (PTC) Chief Strategy Officer Mark Swanholm present data security and the choices ahead for your organization. For more information about Performance Tuning Corporation, visit our website www.perftuning.com .
What is discussed in this presentation?
Security breaches and data theft have made big news headlines in recent months, from Target, to Home Depot and most recently Sony and Chick-Fil-A. Data is one of the most valuable assets in your business and organizations like yours need to be confident they are prepared for future security threats or risk loss of trust from customers and, possibly, unrecoverable financial losses.
But how do you approach security in your environment?
How confident are you that your data is secure?
And what are the objectives and right level of investment needed for the regulatory environment that exists today?
What about tomorrow – will the Security Wars leave your company devastated?
Oracle ACE Director Dan Morgan, an internationally recognized expert in database technology and former University of Washington lecturer, and Mark Swanholm, PTC’s Chief Strategy Officer and 22 year IT Veteran, address the issue of data security from the standpoint of what it is, how to approach it, and what is actually required to avoid being the next victim of hackers.
This Performance Tuning Corporation presentation is focusing on strategy, management, planning, and budgeting, and provides you and your management team the information they need to plan make the best possible decision with respect to an investment to secure your data.
An hour long presentation on "hot topics" for Canadian employers. Deals with business system monitoring, employee responsibility for "off duty" publication and background checks.
Oracle ACE Director Dan Morgan and Performance Tuning Corporation (PTC) Chief Strategy Officer Mark Swanholm present data security and the choices ahead for your organization. For more information about Performance Tuning Corporation, visit our website www.perftuning.com .
What is discussed in this presentation?
Security breaches and data theft have made big news headlines in recent months, from Target, to Home Depot and most recently Sony and Chick-Fil-A. Data is one of the most valuable assets in your business and organizations like yours need to be confident they are prepared for future security threats or risk loss of trust from customers and, possibly, unrecoverable financial losses.
But how do you approach security in your environment?
How confident are you that your data is secure?
And what are the objectives and right level of investment needed for the regulatory environment that exists today?
What about tomorrow – will the Security Wars leave your company devastated?
Oracle ACE Director Dan Morgan, an internationally recognized expert in database technology and former University of Washington lecturer, and Mark Swanholm, PTC’s Chief Strategy Officer and 22 year IT Veteran, address the issue of data security from the standpoint of what it is, how to approach it, and what is actually required to avoid being the next victim of hackers.
This Performance Tuning Corporation presentation is focusing on strategy, management, planning, and budgeting, and provides you and your management team the information they need to plan make the best possible decision with respect to an investment to secure your data.
With the rise of entrepreneurship, intellectual property is booming. This creates a wealth of opportunities for attorneys to start or grow their IP practice. But, like with any area of law, IP requires specialized knowledge to succeed and comply with best practices. Technology is an essential element to minimizing risk in any practice, but particularly, in the deadline-driven world of IP.
Workplace Privacy and Employee Monitoring: Laws and Methodscmilliken09
As a final business project we were instructed to develop a business document with research and documentation on a subject dealing with business law. I chose to create a document about workplace privacy because it was an interesting topic to me. Understanding these laws and methods after writing this paper allowed me to fully understand the rights and actions that an employee/employer is liable for.
Effective legal representation of innovators and inventors requires careful thought and consideration. Among other things, care must be taken to properly initiate communications, prepare assignments, and handle subsequent legal disputes. This webinar discusses common legal issues that often arise during the representation of innovators and inventors. It also includes valuable advice from both innovators/inventors and the IP attorneys who represent them.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/legal-issues-for-innovators-inventors-2021/
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsShawn Tuma
This presentation focused on cyber security protections for businesses and other law firm clients. Cybersecurity and data privacy attorney Shawn Tuma presented this continuing legal education session on March 10, 2017. It was delivered live at the TexasBarCLE presents the 8th Annual Course
Essentials of Business Law:Four Modules for a Robust Practice Cosponsored by the Business Law Section of the State Bar of Texas.
Cyber Liability Insurance Counseling and Breach ResponseShawn Tuma
This presentation focused on how teaching attorneys how to counsel their clients on cyber insurance and guide them through the data breach incident response process. Cybersecurity and data privacy attorney Shawn Tuma presented this continuing legal education session on March 10, 2017. It was delivered live at the TexasBarCLE presents the 8th Annual Course
Essentials of Business Law:Four Modules for a Robust Practice Cosponsored by the Business Law Section of the State Bar of Texas.
The Ruby Files: The Terminator. You Won't Be Back.Polsinelli PC
In the second of our webinars on The Ruby Files: Managing the Challenging Employee, we continue to follow Ruby as her changing circumstances present her employers with a variety of legal complications.
Still employed by a major hospital, Ruby has developed carpal tunnel syndrome and persistent migraines, which she claims interfere with her ability to work and requests ADA accommodations as well as FMLA time off. Her employer initiates the accommodation interactive process, but before this process can proceed, Ruby’s supervisors report performance problems and that Ruby is posting on Facebook about her alleged medical conditions. Ruby is terminated for poor performance, after which her attorney sends the hospital a demand letter. The company responds with a notice that her claims are subject to an arbitration agreement.
Polsinelli’s Labor & Employment and Health Care attorneys will cover the legal hot buttons covered in this webinar, specifically:
-ADA accommodations and FMLA time off requests
-Requirements for documentation of alleged medical conditions
-How to properly document performance issues
-Progressive discipline policies
-Termination of an employee for performance with a medical condition seeking an accommodation
-Management of post-separation allegations
Mitigating litigation risk at the deal table webinar part 1Polsinelli PC
First in an 8 part series discussing mitigation litigation risk. This presentation focuses on: Due Diligence
Reps and Warranties
Damages Limitation or Waiver
Procedural Safeguards
Regulatory Compliance ("Alphabet Soup")
With the rise of entrepreneurship, intellectual property is booming. This creates a wealth of opportunities for attorneys to start or grow their IP practice. But, like with any area of law, IP requires specialized knowledge to succeed and comply with best practices. Technology is an essential element to minimizing risk in any practice, but particularly, in the deadline-driven world of IP.
Workplace Privacy and Employee Monitoring: Laws and Methodscmilliken09
As a final business project we were instructed to develop a business document with research and documentation on a subject dealing with business law. I chose to create a document about workplace privacy because it was an interesting topic to me. Understanding these laws and methods after writing this paper allowed me to fully understand the rights and actions that an employee/employer is liable for.
Effective legal representation of innovators and inventors requires careful thought and consideration. Among other things, care must be taken to properly initiate communications, prepare assignments, and handle subsequent legal disputes. This webinar discusses common legal issues that often arise during the representation of innovators and inventors. It also includes valuable advice from both innovators/inventors and the IP attorneys who represent them.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/legal-issues-for-innovators-inventors-2021/
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsShawn Tuma
This presentation focused on cyber security protections for businesses and other law firm clients. Cybersecurity and data privacy attorney Shawn Tuma presented this continuing legal education session on March 10, 2017. It was delivered live at the TexasBarCLE presents the 8th Annual Course
Essentials of Business Law:Four Modules for a Robust Practice Cosponsored by the Business Law Section of the State Bar of Texas.
Cyber Liability Insurance Counseling and Breach ResponseShawn Tuma
This presentation focused on how teaching attorneys how to counsel their clients on cyber insurance and guide them through the data breach incident response process. Cybersecurity and data privacy attorney Shawn Tuma presented this continuing legal education session on March 10, 2017. It was delivered live at the TexasBarCLE presents the 8th Annual Course
Essentials of Business Law:Four Modules for a Robust Practice Cosponsored by the Business Law Section of the State Bar of Texas.
The Ruby Files: The Terminator. You Won't Be Back.Polsinelli PC
In the second of our webinars on The Ruby Files: Managing the Challenging Employee, we continue to follow Ruby as her changing circumstances present her employers with a variety of legal complications.
Still employed by a major hospital, Ruby has developed carpal tunnel syndrome and persistent migraines, which she claims interfere with her ability to work and requests ADA accommodations as well as FMLA time off. Her employer initiates the accommodation interactive process, but before this process can proceed, Ruby’s supervisors report performance problems and that Ruby is posting on Facebook about her alleged medical conditions. Ruby is terminated for poor performance, after which her attorney sends the hospital a demand letter. The company responds with a notice that her claims are subject to an arbitration agreement.
Polsinelli’s Labor & Employment and Health Care attorneys will cover the legal hot buttons covered in this webinar, specifically:
-ADA accommodations and FMLA time off requests
-Requirements for documentation of alleged medical conditions
-How to properly document performance issues
-Progressive discipline policies
-Termination of an employee for performance with a medical condition seeking an accommodation
-Management of post-separation allegations
Mitigating litigation risk at the deal table webinar part 1Polsinelli PC
First in an 8 part series discussing mitigation litigation risk. This presentation focuses on: Due Diligence
Reps and Warranties
Damages Limitation or Waiver
Procedural Safeguards
Regulatory Compliance ("Alphabet Soup")
Government Investigations and Enforcement ActionsPolsinelli PC
The fifth webinar presentation in the M&A Litigation Series examines compliance pitfalls associated with M&A transactions. We will discuss how to evaluate antitrust risks of a transaction. We also will address compliance concerns – such as antitrust, the Foreign Corrupt Practices Act, the False Claims Act, and export control issues – that could significantly impact the scope, duration, and magnitude of necessary due diligence. Finally, we will address post-merger considerations that could decrease the severity of a compliance concern if one were to arise after a merger or acquisition has been completed.
On our agenda:
-Pre-transaction – evaluating the transaction itself from an antitrust perspective
-Pre-closing – managing client conduct and the risk of “gun jumping”
-Due Diligence – what to look for
-Post-merger considerations for fostering and perpetuating a “Culture of Compliance”
-Managing compliance concerns that are discovered post-closing
OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...Polsinelli PC
Over the past several years the Office for Civil Rights (OCR) has ramped up its enforcement of the HIPAA Privacy and Security Rules. Generally, such enforcement efforts have related to incidents that affected more than 500 individuals. In August of 2016, however, OCR announced that it would begin investigating self-reported HIPAA breaches affecting under 500 individuals. This initiative may lead to increased investigations at both covered entities and business associates.
On the webinar, two former OCR attorneys will discuss this new OCR initiative, as well as provide guidance and advice related to navigating OCR investigations, an explanation as to how the OCR settlement and resolution agreement process works, and tips for steps to take if your organization is presented with a dreaded resolution agreement. Please join us for discussion of recent OCR activity, under 500 breach investigation initiative, anatomy of an OCR investigation and settlement process, quick tips, and lessons learned.
Health care providers continue to experience significant levels of scrutiny from CMS, OIG, audit and recovery contractors, as well as state and federal law enforcement agencies. As a result of heightened enforcement activity, health care providers may be at risk. This presentation will update you on the current regulatory and enforcement environment.
The seventh webinar presentation in the M&A Litigation Series examines successor liability and liability based on an alter-ego and other veil-piercing theories. Prevalent misconceptions on successor liability are discussed, as are third party claims against the post-merger entities.
On our agenda:
Myths and Misconceptions about Successor Liability
Veil-Piercing
Third Party Claims
The Ruby Files: A Whisper, a Wink, and a 40 Year-Old Aptitude FlunkyPolsinelli PC
In the third of our webinars on The Ruby Files: Managing the Challenging Employee, we continue to follow Ruby as her changing circumstances present her employers with a variety of legal complications. View previous installments here.
Ruby now works at a bank, which happens to be subject to the Office of Federal Contract Compliance Programs (OFCCP). In her application materials she didn’t mention she was previously fired, and when the bank learns of the misrepresentation it wants to take action. However, the bank has a history of unevenly applying such a policy, and as a result it may be risky to fire Ruby.
While the company mulls next steps, Ruby flirts with a supervisor in another department and then claims sexual harassment; after a company investigation Ruby is kept on staff but placed in a separate department from the supervisor. Just in time for her 40th birthday, Ruby fails an aptitude test and promptly claims the test has a disparate impact on individuals over 40. She quits the job at the bank, updates her resume, and prepares to take another company by storm in our next installment.
Are You Following the Script? Consequences for Medical Professionals Who Fail to Check Pharmacy Registries
As the problem of prescription drug addiction has grown, states have responded with the creation of prescription registries controlled by pharmacy boards. Anyone prescribing medications (specifically doctors, physician assistants and nurse practitioners) is required to check these registries before prescribing certain drugs, but this step is often missed. If discovered, failure to closely monitor your patient could result in discipline up to the loss of your license to practice medicine.
Hot topics in employment law SHRM presentation April 8, 2015Polsinelli PC
Did you know that pregnancy discrimination is one of the EEOC's top 5 areas of focus? Learn more about this topic along with information around disability, transgender/gender identity and sexual orientation, wellness programs and obesity as it relates to the law.
Erin Schilling provides advice, counsel, and peace of mind so that employers can focus on what they do best – operating their business. Erin provides counsel to clients on a variety of employment issues including retaliation, leave issues and discrimination including age, race, disability, religion, national origin, and sex discrimination.
Mitigating Litigation Risk at the Deal Table M&A Part II Polsinelli PC
Attorneys from Polsinelli's Corporate & Transactional, Financial & Fiduciary Litigation, and Government Investigations practices share the following topics regarding M&A:
*Compartmentalizing Liability: Reducing Risk of Veil-Piercing by Courts and Similar Outcomes
*Alternative Dispute Resolution: Mediation and Arbitration
*Choice of Law Provisions in M&A Agreements
*Venue Selection in M&A Agreements
Claims by acquirers sellers and unsuccessful biddersPolsinelli PC
The third webinar presentation in the M&A Litigation Series examines M&A-related disputes that arise between and among contracting parties and unsuccessful bidders. These disputes are discussed with reference to remedy provisions and representations and warranties contained in merger agreements, as well as with respect to merger-related letters of intent and memoranda of understanding. Contract remedies as well as equitable remedies (such as specific enforcement) are addressed.
This webinar will discuss:
Contract Indemnity
Breaches of Representations and Warranties
Specific Performance
Liabilities Under Letters of Intent and Memorandums of Understanding
ON OUR PANEL:
Matthew Knoop | Shareholder
Mary Bannister | Shareholder
Robert Spake | Associate
The Ruby Files: Transition and the Fight for Bathroom EqualityPolsinelli PC
In our final webinar on The Ruby Files: Managing the Challenging Employee, we continue to follow Ruby as her changing circumstances present her employers with a variety of legal complications.
Ruby decides to try her hand at a company charged with customer support of a nationwide franchisee network. The parent company has a union, and Ruby organizes her fellow co-workers to form a local branch. In course of negotiations, Ruby announces she now identifies as a man – goodbye Ruby, hello Rudy. The employee bathroom becomes a source of tension in the office, with neither Rudy nor his fellow coworkers happy about the impact of Rudy’s transition on the facilities and their assigned use. How can the company stay legally compliant and sensitive to Rudy’s legitimate needs, while still addressing concerns of all involved?
Polsinelli’s Labor and Employment attorneys, as well as Dov Scherzer, a shareholder in the Intellectual Property practice, will cover the legal hot buttons covered in this webinar, specifically:
-Union organizing campaigns and impact upon workplace
-Franchisor/franchisee conflict
-Transition of transgender employees and practical application in everyday workplace
The Ruby Files: The Case of the Disappearing Secrets and an Independent Contr...Polsinelli PC
In the fourth of our webinars on The Ruby Files: Managing the Challenging Employee, we continue to follow Ruby as her changing circumstances present her employers with a variety of legal complications.
Fresh off claims of sexual harassment and age discrimination at a bank, Ruby applies at a relatively new company in the technology industry, which is experiencing challenges relating to recruitment and employment. Ruby is hired as an independent contractor, but things don’t quite work out. She quits, and then claims constructive discharge because of her working conditions. After Ruby’s departure the company discovers that she has taken client lists and other proprietary materials on her way out the door. What is the company’s next move?
The fourth webinar presentation in the M&A Litigation Series examines claims and other rights of action asserted by stockholders in connection with M&A transactions. Various types of claims and proceedings – ranging from fiduciary duty to federal securities to statutory appraisal – are discussed. Director and Officer indemnity and advancement obligations likewise are addressed.
On our agenda:
-Fiduciary Duty and Disclosure Claims
-Federal Securities Claims
-Statutory Appraisal
-Books and Records Inspection Rights
-D&O Insurance and Indemnity and Advancement Obligations
Life Cycle of the Employee: Recruitment, Talent Polsinelli PC
Companies may differ in size, industry or business model. One thing that unites all employers, however, is the goal to recruit, train and retain a quality workforce while remaining compliant with all aspects of the law. The "life cycle" of an employee over the course of their tenure with a company includes other milestones beyond simply recruiting and training. What are these identifiable stages in the employee life cycle, and how can employers navigate through common obstacles to avoid the pitfalls of employment litigation?
Our first webinar in "Life Cycle" series, was moderated by shareholder Eric Packel, who was joined by panelists Chris Swenson, Erin Schilling and Rob Entin.
Life cycle of employee training and development - may 2015Polsinelli PC
Polsinelli's Labor and Employment the "Life Cycle of an Employee" webinar series, a year-long examination of the full range of considerations that employers face at each stage of employee development, and how new legal regulations affect best practices from hiring to termination.
Moderator Eric Packel and panelists Chris Mason, Scott Gilbert, Steve Fox and Teeka Harrison discuss exception issues, policies and procedures, confidentiality, and how to retain quality employees.
The Ruby Files: Managing the Challenging EmployeePolsinelli PC
“The Ruby Files,“ is a five-part webinar series that follows Ruby R. Breaker, a fictitious employee whose workplace behavior is based on real life employment situations. Just as Ruby's managers grapple with each challenging situation, Polsinelli's Labor and Employment attorneys, and other firm attorneys from health care, intellectual property and other industry and practice groups, will analyze the factual and legal key take-aways.
Meet Ruby, a 39-year-old, recent re-entrant into the workforce with two school-aged children, trying to conceive her third.
In her first employment opportunity as she re-enters the workforce, Ruby applies to work at a hospital, is hired as a Unit Manager, and is classified as an exempt manager. Her job description includes duties such as helping the employees she supervises, but Ruby ends up spending most of her time performing clerical duties. Frustrated, Ruby calls the Department of Labor (“DOL”) to complain about not getting paid over-time, and a subsequent DOL investigation of the hospital ensues. Meanwhile, Ruby requests time off from work during the work day to attend in-vitro fertilization appointments, claiming FMLA and ADA coverage.
Polsinelli’s Labor and Employment and Health Care attorneys will dissect interactions between Ruby and her manager, and provide take-aways that can be applied to your business.
It all starts with an epiphany. Every invention begins with a single “eureka moment” or some “brilliant revelation” that causes the inventor to take action.
These epiphanies become the idea seeds planted by inventors around the world. But we can only wish the process was as simple as adding water and fertilizer and waiting for the ideas to spring to life.
Inventions are not just patents to be hung on a wall. They are the starting point for a new business enterprise. So, not only does the inventor have to figure out how to create a working product or device, they also have to drive it forward, creating a business model that will enable it to survive. And that’s where we come in.
The Inventor Boot Camp will help you focus on what’s important. We will show you ways to leverage your time and resources, eliminate unnecessary work, and direct your energies towards driving your product forward. And most importantly, we will teach you what it takes to become successful.
Key Strategies to Learn
How to perform an early stage benefit/market analysis to decide in advance who your end customer will be. Once you fully understand who your customer is, only then can you begin to piece together your business model.
How to develop a profit-centric mindset, the same thinking used by most successful inventors, to maximize your odds of success.
How to decide if your invention needs to be patented. If it doesn’t, this can save you significant amounts of money.
Who you should be listening to. Advice will come from many sources, but not all of it will be good.
How to best position yourself for funding. Hear it directly from the people who have money to invest.
Application of a decision making framework to an IT-related ethical mallisonshavon
Application of a decision making framework to an IT-related ethical issue.
For this assignment, you are given an opportunity to explore and apply a decision making framework to an IT-related ethical issue. A framework provides a methodical and systematic approach for decision making. Methods of Ethical Analysis describes three structured frameworks that may be used for ethical analysis, namely Reynolds Seven-Step Approach, Kidder’s Nine Steps, and Spinello’s Seven-Step Process. There are several ways to systematically approach an ethical dilemma, and while each of the frameworks described has its merits, each will result in an ethical decision if straightforwardly and honestly applied.
In addition, you will want to consider the ethical theories described in Introduction to Theoretical Ethical Frameworks which help decision makers find the right balance concerning the acceptability of and justification for their actions. A separate write-up of the ethical theory that supports your decision is part of the following requirements.
For this paper, the following elements must be addressed:
• Describe a current IT-related ethical issue: Since this is a paper exercise, not a real-time situation, you may want to construct a brief scenario where this issue comes into play, and thus causes an ethical dilemma. The dilemma may affect you, your family, your job, or your company; or it may be a matter of public policy or law that affects the general populace. See the list below for a list of suggested issues, which may be a source of ethical dilemmas.
• Define a concise problem statement that is extracted from the above description or scenario. It is best if you define a specific problem caused by the dilemma, that needs a specific ethical decision to be made, that will solve the dilemma. Be aware that if it is a matter of public policy or law, that it may require a regulatory body or congressional approval to take action to implement a solution.
• Analyze your problem using one of the structured decision-making frameworks. Make sure that you identify the decision-making framework utilized. In addition, the steps in the decision-making framework selected must be used as major headings in the Analysis section.
• Consider and state the impact of the decision that you made on an individual, an organization, stakeholders, customers suppliers, and the environment, as applicable!
• State and discuss the applicable ethical theory that supports your decision.
Concerning your paper:
• Prepare a minimum 3- 5 page, double-spaced paper as a Microsoft Word file.
• Provide appropriate American Psychological Association (APA) source citations for all sources you use. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.
For example, Kidder’s approach has nine steps, which are:
• Recognize that there is a moral issue.
• Determine the actor (whos ...
Dovetail Software (hr.dovetailsoftware.com) sponsors this informative and important webinar hosting experts Grant D. Petersen (ogletree.com/) and Estella Cohen (trustarc.com/) who shared information with HR practitioners and Organizations that need to be GDPR compliant by May 25, 2018.
Here's the link to view the recording: http://hr.dovetailsoftware.com/dsadmin/2018/01/31/hr-gdpr-preparing-2018-compliance/
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
Businesses that responsibly manage privacy and educate their customers about their privacy practices benefit greatly - especially with regard to positive brand development.
Briefly describe the research design
Who the target population
Was the sampling method and the sample size appropriate? Why?
Any selection bias in sampling and representativeness?
Does the article you selected have a model specification? If yes, is the specified model congruent with the conceptual framework? If no, what went wrong?
What method of data analysis did the author(s) use? Is it appropriate
Is your social media activity breaking the law? In this session Dominic provides his Top Tips to safeguard your brand, taken from Tempero’s recent eBook ‘UGC & The Law’. You may be surprised at the areas your brand is at risk.
Tax Cuts & Job Act Implications for Small Business Investments Companies Polsinelli PC
On December 22, 2017, the President signed into law a federal tax reform bill commonly known as the Tax Cuts & Jobs Act (the “Tax Act”). The Tax Act resulted in significant changes to the U.S. tax system on a number of fronts. This webinar will provide an overview the provisions of the Tax Act relevant to SBIC’s. We will also address the impact of the Tax Act upon the choice of entity decisions and a number of ancillary matters.
Preventing Compliance Quagmires in Senior Living Communities: Part 1 - Can So...Polsinelli PC
During this webinar we will explore the regulatory, operational and employment related issues that arise when long term care staff use social media at work in the long term care setting.
Health Care "Prime" - The Future of the Ownership, Organization, Payment, and...Polsinelli PC
The potential for disruption and disaggregation of traditional and incumbent players is occurring across the health care ecosystem and care continuum, and may accelerate through the intended and unintended consequences of this innovative new venture. Is this partnership a seminal event in defining the future of health care? Author William Gibson said, “The future is already here – it’s just not very evenly distributed.” This statement applies as the future of health care fast approaches, but with variability across stakeholders, their businesses, and the communities in which they provide care as part of one of America’s largest industries.
A diverse panelist group will bring a broad range of current perspectives and insights related to this partnership. From the base of the panelists’ unique perspectives, they will discuss their views on the likely near-, mid- and long-term implications of this announced venture on the ownership, organization, payment, and delivery of health care products, supplies and services in America.
The Trump Labor Board Goes Back to the FuturePolsinelli PC
The last weeks of 2017 brought significant changes to the National Labor Relations Board and federal labor law. Polsinelli’s Traditional Labor Practice Group will cover all of these changes, including the short-lived Republican majority, the new Board members and General Counsel, a recap of the major decisions reversing several of President Obama’s pro-employee initiatives over the last eight years, and discuss what is in store for employers in 2018.
Lessons learned from litigating real estate development projectsPolsinelli PC
Real estate development projects are filled with uncertainty. Zoning and permitting denials, disputes with neighboring property owners and citizen groups, and ambiguity in development contracts can cause significant setbacks to even the most well planned developments. This webinar will explore the many pitfalls of the development process and how to navigate them. Four Polsinelli attorneys offer their guidance and insights gained from litigating these very types of issues.
Datascram is being called a massive “Datascam.” Engineers cut corners and, as it turns out, data is not deleted forever. Instead, once deleted, it resides on a Nigerian server where it is sold to the highest bidder. As the company prepares to shut its doors, new questions emerge about Damian Diamond’s role in the fiasco and whether he could be held personally responsible for the company’s potentially criminal activities.
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxOmGod1
Victims of crime have a range of rights designed to ensure their protection, support, and participation in the justice system. These rights include the right to be treated with dignity and respect, the right to be informed about the progress of their case, and the right to be heard during legal proceedings. Victims are entitled to protection from intimidation and harm, access to support services such as counseling and medical care, and the right to restitution from the offender. Additionally, many jurisdictions provide victims with the right to participate in parole hearings and the right to privacy to protect their personal information from public disclosure. These rights aim to acknowledge the impact of crime on victims and to provide them with the necessary resources and involvement in the judicial process.
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxOmGod1
Precedent, or stare decisis, is a cornerstone of common law systems where past judicial decisions guide future cases, ensuring consistency and predictability in the legal system. Binding precedents from higher courts must be followed by lower courts, while persuasive precedents may influence but are not obligatory. This principle promotes fairness and efficiency, allowing for the evolution of the law as higher courts can overrule outdated decisions. Despite criticisms of rigidity and complexity, precedent ensures similar cases are treated alike, balancing stability with flexibility in judicial decision-making.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
Introducing New Government Regulation on Toll Road.pdfAHRP Law Firm
For nearly two decades, Government Regulation Number 15 of 2005 on Toll Roads ("GR No. 15/2005") has served as the cornerstone of toll road legislation. However, with the emergence of various new developments and legal requirements, the Government has enacted Government Regulation Number 23 of 2024 on Toll Roads to replace GR No. 15/2005. This new regulation introduces several provisions impacting toll business entities and toll road users. Find out more out insights about this topic in our Legal Brief publication.
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
Get insights into DNA testing and its application in civil and criminal matters. Find out how it contributes to fair and accurate legal proceedings. For more information: https://www.patronslegal.com/criminal-litigation.html
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
The Diamond Datascram Diaries: Diamond Datascram Development
1. Eric E. Packel, Andrew Cripe, Daniel L. Farris, Scott M.
Gilbert, Matt Todd
Diamond Datascram Diaries:
Diamond Datascram Development
2. Datascram Development
• General Privacy Issues
• Internal Issues and Risks
• Product and Customer Privacy Issues and Strategies
• Protecting the program
• Patent?
• Copyright?
• Trademark?
• Trade Secret
• The Human Resources System
• Employment Agreements and Restrictive Covenant Drafting
3. Press Release
Tech Expert Launches Diamond Datascram
Skokie, IL, March 1, 2017/Newswire/--
Diamond Datascram, founded by nationally honored software developer Damien
Diamond, announces the launch of Datascram™. Datascram is an amazing new
software solution which identifies and prioritizes data, providing businesses with a
summary of outdated or unnecessary data which then can be easily and permanently
deleted or moved offsite. Analysis and surveys show that 52% of information stored
by organizations is considered dark data whose value is not known. Another 33% of
data is essentially obsolete or redundant. Datascram pulls information from the
business’ systems, applies algorithms and removes or culls that redundant and dark
data.
Make data scram. Forever
The Company is based in Skokie, IL but intends to operate nationwide.
6. Overview of Privacy Issues
For Technology-Enabled Companies:
Internal Privacy & Security Compliance
– Personnel
– Customer Data
– Intellectual Property Protection
Product/Customer Privacy & Security Considerations
– Privacy By Design
– Customer Compliance
7. Internal Privacy Issues
Privacy Program Development
– Security Program
– Personnel Data
– Industry Regulations/Standards Compliance (HIPAA, ISO, NIST, PCI)
– Multinational Regimes (EU – GDPR, Privacy Shield, APAC, etc.)
– Vendor Management
Initial Steps
– Gap Analysis/Privacy Assessment
– Policy Development
– Employee Training
– Exercises and Audits
8. Internal Privacy Risks
The Cyber Skills Gap is Growing
– Companies are investing more than ever in cyber security
– Despite that fact, the number of successful attacks is increasing
– Cybercriminals are becoming more sophisticated at a faster rate
Phishing Example
– In 60% of cases, attackers compromise an organization in minutes
– Median time to first click is 1:22
– 50% of recipient open the email within the first hour, 23% click
through
99.9% of attacks exploit known vulnerabilities
9. Product Privacy Issues
Customer Compliance
– Develop Using Privacy By Design
– Build to a Standard
– Consider Customer Controls
– Solve for Security and Onward Transfer
Risks
– Eliminating Data that Must be Retained (Regulatory or Policy)
– Impact on IP (Old Data is Sometimes Useful in Product Development)
– Protected Data (PHI, PII, Personal Data)
– Breach
10. Mitigation Strategies
Use the NIST Framework or ISO 27001/2 as a
Guide for Cybersecurity Planning
Due Diligence – internal/external (vendors)
Operational
Contractual
Cyber-Insurance
11. Operational Strategies
Privacy by Design/Security by Design
“Minimum Necessary”
– Don’t collect more than what you need
– Don’t retain longer than you need it
Adopt/Adhere to Written Data Security Compliance Program
– Adopt Framework Standards
– Flow down to contractors
Technical controls: (e.g. encryption on all devices/unless can justify why not)
Physical security (e.g., data center security; geographically remote data centers)
Administrative safeguards (cybersecurity training/ regular risk assessments/ risk
mitigation plans/audits)
Breach notification plan/Incident Response Plan
Readiness for new cyber-threats (Chinese hackers, economic espionage)
Cyber-insurance
13. High Level Distinctions
Patents:
• Limited duration property right
• Related to invention
• Granted by U.S. Patent and Trademark Office
• Public disclosure after grant
18. Authority for a Patent
U.S. Constitution – Article 1, Section 8, Clause 8
The Congress shall have power ... To promote the progress of science and
useful arts, by securing for limited times to authors and inventors the exclusive
right to their respective writings and discoveries;
United States Code, Title 35
Patentability governed by Sections 100 – 105
101 – Patentable Subject Matter (process, machine, manufacture, or
composition of matter)
102 – Novelty (anticipation/prior art)
103 – Obviousness (person of ordinary skill in the art)
18
19. Application
– Provisional
– Non-Provisional
Office Action
– Non-Final
– Final
Issue Fee
Grant
Term: For patents filed after 1995, 20 years from the
earliest filing date of the application on which the patent
was granted…
19
Patent Process
21. The Human Resources System
An Effective “Human Resources System” starts with
comprehensive Workforce Visibility
– Employees and Owners
– Interns (or, “Interns”/free labor)
– Contingent Workers
– Consultants, Independent Contractors & Vendors
Adopt scalable and practical approach (the system needs to
grow with the Company)
Consider the “Terms and Conditions” applicable to all
Company “Human Resources”
– Legal duties & classifications (FLSA, tax code, etc.)
– Non-Employee agreement terms critical
23. Written Policies? The Basics
Define Expectations/Culture
Help Avoid Certain Contract Claims
Can Help Provide A Good Defense
Comply with Law
24. Certain Policies are “Musts”
Anti-Harassment/EEO/anti-retaliation
FMLA
Confidentiality
Open Door/Hotline
Drug/Alcohol
No Right to Privacy/Monitoring
Wages/TO
“Musts” expand with Company
25. Certain Policies are Nice to
Have
Will depend on business
needs & culture:
Vacation/sick leave, PTO
Code of ethics & business
conduct
Standards of personal
conduct (dress code,
attendance, etc.)
26. The times they are a-changing
Firearms policies
Social media policies
Workplace violence prevention (and domestic
violence leave)
Drug testing and medical or legal marijuana
Compliance complaint and investigations
processes & hotlines (a challenge at start up!)
27. Remember Section 7
Section 7 provides that
“employees shall have the
right to self-organization, to
form, join, or assist labor
organizations, to bargain
collectively . . . And to engage
in other concerted activities
for the purpose of collective
bargaining or other mutual
aid or protection.”
28. Confidentiality
Not OK:
-”Do not discuss ‘customer or
employee information’ outside
of work including ‘phones
numbers and addresses”
-”Never publish or disclose
confidential or other
proprietary information.
Never publish or report on
conversations that are meant
to be internal”
OK:
-”No unauthorized disclosure of
‘business secrets’ or other
confidential information”
-”Do not disclose confidential
financial data, or other non-public
proprietary company information. Do
not share confidential information
regarding business partners, vendors
or customers”
29. Conduct Toward Fellow
Employees
Not OK:
-”Don’t pick fights online”
-”Material that is fraudulent,
harassing, embarrassing,
sexually explicit, profane,
obscene, intimidating,
defamatory, or otherwise
unlawful or inappropriate may
not be sent by email.”
OK:
-”Making inappropriate
gestures, including staring”
-”No use of racial slurs,
derogatory comments, or
insults”
-”Threatening, intimidating,
coercing, or otherwise
interfering with the job
performance of fellow
employees or visitors”
30. Interaction with Third Parties
(including media)
Not OK:
-”Employees not authorized to speak
to representatives of the print
and/or electronic media about
company matters” “unless
designated to do so by HR, and must
refer all media inquiries to the
company media hotline”
-”If you are contacted by any gov’t
agency you should contact the Law
Dep’t immediately for assistance”
OK:
-”The company strives to anticipate
and manage crisis situations in order
to reduce disruption to our
employees and to maintain our
reputation as a high quality
company. To best serve these
objectives, the company will respond
to the news media in a timely and
professional manner only through
the designated spokespersons.”
31. Company Logos, Copyrights
and Trademarks
Not OK:
-”Do not use Company logos,
trademarks, graphics, or
advertising materials in social
media”
-Company logos and
trademarks may not be used
without written consent”
OK:
-”Respect all copyright and other
intellectual property laws. For
company’s protection (and your
own), it is critical that you show
proper respect for the laws
governing copyright, fair use of
copyrighted material owned by
others, trademarks and other
intellectual property, including
Employers, copyrights, trademarks
and brands”
32. Employment Agreements and
Restrictive Covenants
• Q: Who needs an employment agreement?
• A: Not everybody.
• Consider less restrictive means:
• Offer Letters
• RCA / NDA
• Employee Handbook / Policies
33. Employment Agreements
The Basics
• Title and Duties
• Other employment
• Term
• At-will or defined time period
• If at-will, what is the consideration?
• Compensation
• Any bonus structure must be clear or linked to a plan.
• Stock / Equity awards must be carefully worded and consistent with
any governing plan documents
• Benefits
• Health Insurance, Vacation, Auto Allowance, Expenses
• Compliance with other policies
34. Employment Agreements
Additional Considerations
Severance?
– Define Cause – Under what conditions will severance not be owed?
– Preconditions, i.e. executing a waiver and release
Restrictive Covenants
Intellectual Property
Return of Property
Governing Law and Venue Selection
Arbitration
Incorporation of other Agreements
Attorneys’ Fees
35. Non-Disclosure / Confidentiality
Intellectual Property and Inventions
Non-Compete
Non-Solicit
– Clients and Customers
– Vendors and Suppliers
– Employees and Contractors
Restrictive Covenants
What Falls Under That Umbrella?
36. Geographic and Temporal Scope
– Where and for how long?
– Consider job duties.
Scope of the Restriction
– What can’t be done?
– Who can’t it be done with?
Will the covenants adapt to the employee’s
changing roles with the Company?
Proper Tailoring is Critical
37. Know the State of Affairs
State law typically governs enforceability.
– California and North Dakota – Nope.
– Some states have unique rules, i.e. Illinois,
Louisiana, Oklahoma, South Dakota.
Have you considered consideration?
Choice of Law and Venue
38. Fast Start Employment Services
for Start-Ups
To receive your
complimentary copy of
this document, please
contact your Polsinelli
Labor and Employment
attorney, or email
national Practice Chair
Nancy Rafuse at
nrafuse@polsinelli.com.
39. Keep Your Secrets Secret
Simply having a confidentiality provision is not
adequate – employers must take
demonstrable steps to protect their secrets.
– Password protection.
– Usage restrictions, including personal email
addresses.
– Limited distribution and access.
40. Datascram Dominance
Next time – Datascram has caught on like fire! Looking to go public and
global. Competition for top talent is fierce! Topics next time:
• HR considerations with Mergers and Acquisitions
• Hiring from Competitors
• Staffing Arrangements
• Global HR/Legal Issues
SAVE THE DATE – MAY 9, 2017