Tracking Employees Via Mobile Devices: Legal or Not?
|
|
|
- Lauren Dalton
- 10 years ago
- Views:
Transcription
1 Tracking Employees Via Mobile Devices: Legal or Not? Aaron Turner President, IntegriCell Randy Sabett Counsel, ZwillGen PLLC Session ID: LAW W23 Session Classification: Intermediate
2 This presentation is not legal advice You want a lawyer? Go pay for one! We re going to walk through several hypothetical scenarios dealing with situations that don t really have good precedents but will compare/contrast to existing precedent. We ll make this as fun as we can
3 Who are these people? Aaron Turner Involved in many aspects of security research relating to mobile infrastructure, mobile payments, mobile apps MOBILE MOBILE MOBILE! Founder of IntegriCell Randy Sabett Technology and privacy law specialist who also worked for the NSA in the past SUPER GEEKY PRIVACY ATTORNEY Counsel at ZwillGen PLLC
4 History of intercepting comms 1967: Katz v. US USSC rules that use of technology constitutes a search Citizens are entitled to a reasonable expectation of privacy in their communications (be they in-person or using technology) 1968: Wiretap Act passed Protected privacy of wire and oral communications, and Defined a uniform basis for interception processes, procedures, etc. 1986: Electronic Communications Privacy Act (ECPA) Updated and clarified privacy protections in light of dramatic changes in technologies What we now know as 18 USC Special shout out to my phreaker phriends!
5 Employer considerations Own the backend + own the frontend = @companyname.com + on company-owned device = company phone + stored on company server =
6 Good to go! General precedents for these abilities: Exception exists to ECPA permits employers to monitor employee State law permits employers to read/monitor employees' corporate s or internet use (but the right is not unlimited) Case law precedents: Sporer v. UAL Corp., (N.D.Cal. 2009): employee lacked REP in work ; employer had policy of monitoring computer use and warned employees that they had no expectation of privacy on transmitted on the company system. United States v. Simons, (4 th Cir. 2000): employee s belief that computer files were private not reasonable; employer policy reserved right to audit, inspect, and monitor Smyth v. Pillsbury Co., (E.D. Pa. 1996): no REP in communications over a company system, even when the employee has been assured by management that corporate will not be monitored. Sitton v. Print Direction, (Ga. App. 2011): no privacy rights violation for accessing employee s personal computer to print personal messages where (a) employee used computer at work for non-work purposes and (b) legitimate interest existed to investigate if employee running competing business
7 Be careful Rights of employers not unlimited: Not ok where privileged (Isom), employer guesses p/w (Fischer), no announced policy (Heckenkamp) Several states have enacted laws prohibiting employers from requesting employees or applicants to provide access to their personal Internet accounts, including social networking sites: CA, DE, IL, MD, MI, and NJ.
8 Mobile technologies? Corporate-owned Tower Corporate-owned Devices Corporate calls from POTS Corporate s Corporate application data SMS messages directed to Corporate LOS Personal Google Voice/Skype calls Personal s Personal application data Corporate-owned Tower Personal Devices Corporate calls from POTS Corporate s Corporate application data SMS messages directed to Corporate LOS Personal Google Voice/Skype calls Personal s Personal application data
9 Extending the precedents Generally, employer can monitor calls/vmail/sms made on employer s equipment Case law: Shefts v. Petrakis, (C.D. Ill. 2010): Business Use Exception places monitoring of communications done in ordinary business outside the purview of the Wiretap Act. Ali v. Dougals Cable Communications, (D. Kan. 1996): Business Use exception permitted employer's practice of monitoring in person all business calls and intercepting personal calls only to extent necessary to determine whether call was personal, and not for unwarranted surveillance)(emphasis added. O Sullivan v. NYNEX Corp., (Mass. 1997): employer may monitor an employee s businessrelated calls as long as the employer offers a legitimate business reason United States. v. McLaren, (M.D. Fla. 1997): employer (an electronic communication service provider) intercepting 211 calls involving its employee's cellular telephone in investigation of cloning fraud was not so unreasonable as to warrant blanket suppression of total fruits of the effort
10 It depends Other considerations: Monitoring ok if employee consent (can be implied by conduct) State statutes can be more restrictive re consent; laws of 38 states do not permit call recording unless one party consents; 12 states (including California) generally prohibit the recording of phone calls unless all parties provide consent Reasonable expectations of privacy not static (e.g., Supreme Court decision in Quon case from 2010) Employee-owned: more likely to be deemed a privacy violation, unless business cause to investigate, e.g., breach of loyalty, harassment, etc.
11 What was that? So... what about situations where the enterprise provides the cell towers or corporate-owned & operated micro-cell in the building Legal analysis: No different from the earlier scenario of monitoring , vmail, calls, or SMS on an employer-owned and issued device. Employees should be placed on heightened notice that their activities will be monitored for network administration or other legitimate business purposes No known case law on this issue
12 Crazy stuff we ve seen So... what's the enterprises' duty of care to protect the infrastructure (e.g., rogue tower sitting in your parking lot in the back of a white van) No case law directly on point, but much exists related to: Protection of personal information Employing proper technology to avoid negligence
13 More craziness Imagine a member of the cleaning crew is paid to insert a 4G USB network stick in the back of the CEO s admin s computer How can we legally find it? Can an enterprise manipulate licensed spectrum? It Depends Could the cleaning crew claim that the device is their personal device and that they had no expectation that the company would intercept it? Will the carrier s object to us shutting down a line of service and thereby depriving them of revenue?
14 Stuff to keep in mind Protection of personal information: Federal law (HIPAA/HITECH, GLBA, FTC, etc.) State law: MA regs CISP, encryption, policies, training, etc. NV law PCI adopted into state law CA and AK reasonable security measures incorporated into the law Negligent retention concepts Employing of new technology: T.J. Hooper case (1932): "in most cases reasonable prudence is in fact common prudence, but strictly it is never its measure. A whole calling may have unduly lagged in the adoption of new and available devices. Courts must in the end say what is required. There are precautions so imperative that even their universal disregard will not excuse their omission."
15 Some takeaways 1. Some broad generalizations can be made when dealing with employer monitoring of traditional comm s 2. With newer technology, lines not necessarily as clear 3. Often need to look at various use cases using a reasonableness approach 4. Not always appropriate to base analysis on no one else doing it rationale 5. In light of recent events, some commentators saying more active involvement with more advanced equipment is becoming the new norm 6. Make sure those computer and network use agreements are in place and regularly acknowledged
16
17 Thanks for your attention! Aaron Turner Randy Sabett
18 APPENDIX
19 Federal Law Federal law applicable to electronic communications and phone conversations: Electronic Communications Privacy Act (ECPA) Generally, prohibits monitoring but with exceptions Specifically, Title II of ECPA, the Wiretap Act bars intentional interception, use, or disclosure of any wire/electronic communication, including phone, cell, vmail, , etc. (18 U.S.C. 2511(1)). Any monitoring in the ordinary course of its business, (i.e. Business Use Exception). 18 U.S.C. 2510(5). Thus, the Business Use Exception permits employers to intercept electronic communications for legitimate business purposes.
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use
HOT TOPICS IN EMPLOYMENT LAW. E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications. by Andrew M.
HOT TOPICS IN EMPLOYMENT LAW E-Mail, Voicemail, and Employees Right To Privacy: Monitoring Employees Electronic Communications by Andrew M. Low Employers have plenty of legitimate reasons for wanting to
Fraud and Data Exfiltration: Defending Against the Mobile Explosion
Fraud and Data Exfiltration: Defending Against the Mobile Explosion Aaron Turner N4STRUCT Randy V. Sabett ZwillGen PLLC Session ID: LAW-401 Session Classification: Intermediate Introductions Aaron Turner
I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property
I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property In recent years, employers have had to become concerned with protecting their legitimate business interests while
Blowing the Whistle: SEC Style
Blowing the Whistle: SEC Style Presented to: The Institute of Internal Auditors Houston Chapter David Taylor Partner, Locke Lord LLP March 5, 2012 Overview How did we get here? Dodd-Frank Whistleblower
DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
Social Media In the Workplace
Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee
The Law of Web Application Hacking. CanSecWest March 9, 2011 Marcia Hofmann, EFF
The Law of Web Application Hacking CanSecWest March 9, 2011 Marcia Hofmann, EFF what we ll talk about today Three situations you should recognize and approach with caution when you re doing security research
AFFILIATION AGREEMENT
AFFILIATION AGREEMENT THIS AFFILIATION AGREEMENT (the Agreement ) is entered into between Velapoint LLC, a Washington limited liability company ( Company ) and (Company name), LLC., a (state) limited liability
12.809 COURT ORDERS FOR TELEPHONE RECORDS
12.809 COURT ORDERS FOR TELEPHONE RECORDS References: United States Code (USC) 18USC2510-18USC2522, et al - Federal Wiretap Statutes 18USC2703 - Release of Subscriber Information to Law Enforcement under
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN RE APPLICATION OF THE : UNITED STATES OF AMERICA FOR AN ORDER PURSUANT TO : Misc. No. 01-189 (Magistrate Judge Bredar) 18 U.S.C. 2703(d)
Jeff M. Bauman, Psy.D. P.A. and Associates FLORIDA-HIPAA PRIVACY NOTICE FORM
Jeff M. Bauman, Psy.D. P.A. and Associates FLORIDA-HIPAA PRIVACY NOTICE FORM Notice of Psychologists Policies and Practices to Protect the Privacy of Your Health Information THIS NOTICE DESCRIBES HOW PSYCHOLOGICAL
Retaliatory Hacking: Risky Business or Legitimate Corporate Security?
Retaliatory Hacking: Risky Business or Legitimate Corporate Security? 1 Presenter: Sean L. Harrington Cybersecurity Partnership Manager and information security risk assessor in the banking industry; Digital
Audio Monitoring And The Law: How to Use Audio Legally in Security Systems. Today s Learning Objectives
Audio Monitoring And The Law: How to Use Audio Legally in Security Systems Presented to ISC West / SIA Education April 11, 2013 Donald J Schiffer Attorney at Law General Counsel Louroe Electronics Today
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents
OFFICE OF INSPECTOR GENERAL SPECIAL FRAUD ALERT FRAUD AND ABUSE IN NURSING HOME ARRANGEMENTS WITH HOSPICES
OFFICE OF INSPECTOR GENERAL SPECIAL FRAUD ALERT FRAUD AND ABUSE IN NURSING HOME ARRANGEMENTS WITH HOSPICES March 1998 The Office of Inspector General was established at the Department of Health and Human
UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF FLORIDA. Civil Case No. COMPLAINT
UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF FLORIDA Civil Case No. JOEL B. ROTHMAN, v. Plaintiff, THE FLORIDA BAR and ADRIA E. QUINTELA, in her official capacity as Chief Disciplinary Counsel,
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA WEST PALM BEACH DIVISION COMPLAINT FOR DECLARATORY JUDGMENT I.
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA WEST PALM BEACH DIVISION JANICE LEE, ) ) Case No. Plaintiff, ) ) vs. ) ) BETHESDA HOSPITAL, INC. ) ) Defendant. ) ) COMPLAINT FOR DECLARATORY JUDGMENT
Legal Concepts Meet Technology: A 50 State Survey of Privacy Laws
Legal Concepts Meet Technology: A 50 State Survey of Privacy Laws Miriam B. Russom University of Illinois at Chicago, Computer Science Department Robert H. Sloan University of Illinois at Chicago, Computer
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
Privacy is the ability of an individual or group to keep their lives and
Privacy Versus Security in the Workplace ALAN L. PEPPER AND BETHANIE F. THAU An important challenge facing employers today is balancing the security of the workplace versus the privacy rights of employees.
Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015
Data Privacy: What your nonprofit needs to know Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Overview 2 Data privacy versus data security Privacy polices and best practices Data security
Supreme Court of the United States
No. 06-1085 ================================================================ In The Supreme Court of the United States --------------------------------- --------------------------------- ROBERT J. AYERS,
Ethical Considerations for the Estate Attorney. Trusts and Estates Practice is Difficult to Categorize
Ethical Considerations for the Estate Attorney Trusts and Estates Practice is Difficult to Categorize Clients are generally older, but many younger people are planning for retirement and family members.
Recording Telephone Calls with Parties in Different Jurisdictions
United States Telephone Recording Laws Legal Aspects of Recording Telephone Conversations: A Practical Guide The federal Omnibus Crime Control and Safe Streets Act of 1968, 18 U.S.C. Sec. 2510 et seq.,
ASSURANCE OF DISCONTINUANCE. The Office of the Attorney General of the State of New York (sometimes referred to as
ATTORNEY GENERAL OF THE STATE OF NEW YORK INTERNET BUREAU In the Matter of Assurance No. 15-185 Investigation by ERIC T. SCHNEIDERMAN, Attorney General of the State of New York, of Uber Technologies, Inc.,
Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v2.18.11, rev
Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms v2.18.11, rev 1 Presenters Joseph DeMarco, Partner DeVore & DeMarco, LLP Lauren Shy, Assistant General Counsel Fragomen,
LAWS ON RECORDING CONVERSATIONS IN ALL 50 STATES
MATTHIESEN, WICKERT & LEHRER, S.C. 1111 E. Sumner Street, P.O. Box 270670, Hartford, WI 53027 Phone: (262) 673-7850 Fax: (262) 673-3766 [email protected] www.mwl-law.com LAWS ON RECORDING CONVERSATIONS
UNITED STATES DISTRICT COURT FOR THE CENTRAL DISTRICT OF CALIFORNIA ) ) ) ) ) ) ) ) ) ) ) )
Case :0-cv-00-AG-MLG Document Filed 0//00 Page of 0 UNITED STATES DISTRICT COURT FOR THE CENTRAL DISTRICT OF CALIFORNIA EXPERIAN INFORMATION SOLUTIONS, INC., a corporation, v. Plaintiffs, LIFELOCK, INC.,
Cyber and CGL Insurance Coverage for Data Breach Claims
Cyber and CGL Insurance Coverage for Data Breach Claims Paula Weseman Theisen, Partner Data breach overview Definition of data breach/types Data breach costs Data breach legal claims and damages Cyber-insurance
MONITORING THE ELECTRONIC WORKPLACE. Jonathan Topazian
MONITORING THE ELECTRONIC WORKPLACE Jonathan Topazian A. Introduction Forty years ago, well before the advent of the electronic workplace, the Maryland Court of Appeals first recognized that individuals
LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)
CHARLES LUCE S LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) A. Cloud Computing Defined: n. A loosely defined term for any system providing access
SUBSCRIBER PRIVACY NOTICE
PRIVACY AND SECURITY NewWave will provide you with a copy of its privacy notice at the time Service is installed, and annually afterwards, or as otherwise permitted by law. Customer can view the most current
Location and Cell Phone Tracking: Technology, Law, and Defense Strategy
Location and Cell Phone Tracking: Technology, Law, and Defense Strategy Part 1: Location Tracking Technology Cell Site Data Fine location data: GPS / Triangulation GPS Trackers (Homing devices, e.g. Jones)
Standardized Pharmacy Technician Education and Training
Standardized Pharmacy Technician Education and Training Kevin N. Nicholson, RPh, JD Vice President, Pharmacy Regulatory Affairs National Association of Chain Drug Stores May 19, 2009 Overview of how technicians
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA
David W. Lincicum (California Bar No. 223566) Burke W. Kappler (D.C. Bar No. 471936) Federal Trade Commission 600 Pennsylvania Avenue, N.W. Mail Stop NJ-8122 Washington, D.C. 20580 [email protected] [email protected]
Case 1:14-mj-02258-UA Document 1 Filed 10/31/14 Page 1 of 5
Case 1:14-mj-02258-UA Document 1 Filed 10/31/14 Page 1 of 5 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK --------------------------------------------------------------X IN RE ORDER REQUIRING
Page 1 of 15. VISC Third Party Guideline
Page 1 of 15 VISC Third Party Guideline REVISION CONTROL Document Title: Author: File Reference: VISC Third Party Guidelines Andru Luvisi CSU Information Security Managing Third Parties policy Revision
IT Requirements for the Eyelation Kiosks
Internet access & power at the kiosk site IT Requirements for the Eyelation Kiosks We prefer a wired network port and standard 120v power outlet at the physical kiosk location for the best speed and reliability.
Data Breach Reporting: Summary of Governing Bodies with Reporting Requirements in the United States
Data Breach Reporting: Summary of Governing Bodies with Reporting Requirements in the United States Introduction When it comes to Personally Identifiable Information (PII), privacy laws and regulations
CUSTOMER PRIVACY STATEMENT
CUSTOMER PRIVACY STATEMENT For Cable Television, High-Speed Internet, and Phone Services Looking for our website privacy statement? Click here. Summary of this privacy notice This privacy notice applies
PointCentral Subscription Agreement v.9.2
PointCentral Subscription Agreement v.9.2 READ THIS SUBSCRIPTION AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE INSTALLING THIS SOFTWARE. THIS AGREEMENT, BETWEEN CALYX TECHNOLOGY, INC., DBA CALYX SOFTWARE (
History of Prescription Drug Monitoring Programs. PDMP Training and Technical Assistance Center Brandeis University
History of Prescription Drug Monitoring Programs PDMP Training and Technical Assistance Center Brandeis University History of Prescription Drug Monitoring Programs First PDMP Early PDMP Characteristics
Internet Service Provider Agreement
Internet Service Provider Agreement 1. Introduction By using this Internet service ( Service ) you agree to be bound by this Agreement and to use the Service in compliance with this Agreement, our Acceptable
EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING
EMPLOYEE PRIVACY IN THE AGE OF WORKPLACE MONITORING Kristin M. Case The Case Law Firm, LLC 250 S. Wacker Drive, Suite 230 Chicago, IL 60606 312-920-0400 http://www.thecaselawfirm.com http://www.blog.thecaselawfirm.com
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Reflections on Ethical Issues In the Tripartite Relationship
Reflections on Ethical Issues In the Tripartite Relationship [click] By Bruce A. Campbell 1 Introduction In most areas of the practice of law, there are a number of ethical issues that arise on a frequent
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-32 July 2005 PROCESSING CLASSIFIED
ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES
ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES The following procedures are needed to establish your account in order to download three bureau credit reports into your bankruptcy software.
The Lawyer as Gatekeeper The Backdrop
Lawyers as Gatekeepers The SEC s New Focus on Inside and Outside Counsel Julie M. Allen Frank Zarb National Conference of the Society of Corporate Secretaries and Governance Professionals June 28, 2014
Terms & Conditions Website E-Boutique
Terms & Conditions Website E-Boutique 1. General: The following terms and conditions and any other related rules made available in writing by Bernardaud (collectively the Conditions of sale ) are applicable
MEDCHI, THE MARYLAND STATE MEDICAL SOCIETY HOUSE OF DELEGATES CL Report 3-13. A Fifty State Survey of Tort Reform Provisions
MEDCHI, THE MARYLAND STATE MEDICAL SOCIETY HOUSE OF DELEGATES CL Report 3-13 INTRODUCED BY: SUBJECT: REFERRED TO: Council on Legislation A Fifty State Survey of Tort Reform Provisions Reference Committee
Taking care of what s important to you
A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten
Rule 3.3: Candor Toward the Tribunal
American Bar Association CPR Policy Implementation Committee Variations of the ABA Model Rules of Professional Conduct Rule 3.3: Candor Toward the Tribunal (a) A lawyer shall not knowingly: (1) make a
NATIONWIDE HIPAA NOTICE OF PRIVACY PRACTICES
NATIONWIDE HIPAA NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW PROTECTED HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT
Security Information Lifecycle
Security Information Lifecycle By Eric Ogren Security Analyst, April 2006 Copyright 2006. The, Inc. All Rights Reserved. Table of Contents Executive Summary...2 Figure 1... 2 The Compliance Climate...4
HILTON HARRISBURG & TOWERS
UNFAIR CLAIMS SETTLEMENT PRACTICES (REGULATIONS) AND PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATIONS) THEIR POTENTIAL IMPACT UPON BAD FAITH ACTIONS Presented By: Jay Barry Harris, Esquire Krista
E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers
MARCH 7, 2007 E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers By Tara Daub and Christopher Gegwich News of the recent amendments to the Federal Rules of Civil Procedure
Recent Developments in Cybersurveillance
David W. Opderbeck New Jersey Law Journal, May 16, 2016 Over the past few months, there has been a flurry of sometimes contradictory activity concerning the government's ability to access electronic information
RUNNING THE ETHICAL OBSTACLE COURSE: JOINT DEFENSE AGREEMENTS
RUNNING THE ETHICAL OBSTACLE COURSE: JOINT DEFENSE AGREEMENTS Todd M. Sahner * The general counsel of one of your long-time corporate clients asks you to defend his company in a significant multi-party
Client Alert. When Is Qui Tam False Claims Act Litigation Based Upon Prior Public Disclosure and Who Qualifies as Original Source of Information?
Contact Attorneys Regarding This Matter: Aaron M. Danzig 404.873.8504 direct [email protected] W. Jerad Rissler 404.873.8780 direct [email protected] Client Alert When Is Qui Tam False Claims Act
TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures
TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing
STOP SMART METERS. If a utility company installed a Smart Meter on your property or residence, you can do something about it. Who Can Take Action?
STOP SMART METERS If a utility company installed a Smart Meter on your property or residence, you can do something about it. 1. Owners of the property 2. People who reside in the property Who Can Take
SUPERIOR COURT OF ARIZONA MARICOPA COUNTY CV 2011-016442 10/27/2011 HONORABLE DEAN M. FINK
Michael K. Jeanes, Clerk of Court *** Electronically Filed *** 10/28/2011 8:00 AM HONORABLE DEAN M. FINK CLERK OF THE COURT S. Brown Deputy STATE OF ARIZONA, et al. THOMAS C HORNE MARY JO FOSTER v. COLLEEN
DID YOU KNOW THAT YOU ARE AN EMPLOYEE?
DID YOU KNOW THAT YOU ARE AN EMPLOYEE? THE INTERNAL REVENUE SERVICE S POSITION ON CITY ATTORNEYS, MUNICIPAL JUDGES AND OTHER RELATED POSITIONS Margaret McMorrow-Love, OBA#5538 Law Office of Margaret McMorrow-Love
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
STATE SUPPLEMENTAL HEALTH PRIVACY LAWS
AL None N/A AK None N/A AZ None N/A AR None N/A CA Health and Safety Code 1280.15 Civil Code 56.101 Civil Code 56.13 Civil Code 56.17 Civil Code 56.20 Requires clinics and health facilities to report any
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA
Case :-cv-000-jah -CAB Document Filed 0// Page of 0 Joshua B. Swigart, Esq. (SBN: ) [email protected] Robert L. Hyde, Esq. (SBN: ) [email protected] Hyde & Swigart Camino Del Rio South,
The Ethical Challenges of Representing Organizations
The Ethical Challenges of Representing Organizations Ross Fischer Denton, Navarro, Rocha & Bernal, P.C. 2500 W. William Cannon, Suite 609 Austin, Texas 78745 [email protected] Texas City Attorneys
