Recent Discussions

Legal News Feed

  • GemShares LLC v. Secured Worldwide, LLC, No. 17 C 6221, Slip Op. (N.D. Ill. Feb. 13, 2019) (Kennelly, J.). Judge Kennelly granted plaintiff GemShares’
  • Last week, the Equal Employment Opportunity Commission released information on charges filed with the agency in fiscal year 2018. Total charges
  • Track: Industry Update Field of Study: Auditing CPE Credit: 1.5 Knowledge Level: Basic Advanced Preparation: None Wednesday, May 8, 2019 8:00AM-9:15AM Promote well-rounded controls in your EBP clients and work with them to detect common areas where fraud and embezzlement may happen. Hear how plan fiduciaries, retirement plans, health/welfare plans, etc. were victimized in the last year. Know how to assist your client in reporting to the DOL/EBSA, IRS/CID, insurance companies, and police detectives. Learning Objectives: Recall similar situations where fraud happened to EBP clients like yours Indicate what controls can be enhanced to lessen the risk your clients incur fraud and/or embezzlement while they are your client SESSION SPEAKER(S) JEWELL LIM ESPOSITO PARTNER & ERISA ATTORNEY | FISHERBROYLES LLP
  • Information is one of your companys most valuable assets. Now more than ever before, it is critical to remain vigilant to protect against todays latest cybersecurity threats and to comply with increasingly expansive privacy obligations. Join us in Chicago for our next session in this series, where we will host an interactive program focusing on new issues, patterns and trends in privacy and cybersecurity. This session will arm executives and legal, compliance and technical professionals with essential insights to help strategically address these complex issues. McDermotts and BDOs thought leaders will help you tackle cybersecurity and privacy hot topics to keep you ahead of the curve: Top Trends in Cyber-Attacks & What CEOs Should Know and Do Cyber Assessments: Legal Advice, Communications Protocols and Costs Roadmapping Privacy Regulations Including CCPA and GDPR Changing Pace of Privacy & Cybersecurity Across the Globe Convergence of Information Technology and Legal Compliance PRIVACY & CYBERSECURITY RISK MANAGEMENT SERIES Co-hosted by McDermott and BDO, this series of interactive in-person events and webinars focuses on todays most critical cybersecurity and privacy issues, including assessments, legal compliance, contract management, data strategy implementation and more. If you cannot join us in Chicago, our next programs will be held in New York City on June 18, 2019, and San Francisco on September 11, 2019. As space is limited, RSVP as soon as possible with Eury Jung . More details forthcoming.
  • In response to the increasing sensitivity around consumer privacy, the California legislature moved swiftly to pass a sweeping new law that enhances the privacy rights afforded to California residents and creates significant operational impact for the expansive types of entities to which the law applies. The California Consumer Protection Act (CCPA), which goes beyond the EUs General Data Protection Regulation in certain respects, is scheduled to go into effect on January 1, 2020, but regulated entities should start assessing the scope of CCPAs impact and taking steps to proactively bring themselves into compliance. Join McDermotts panel of privacy and cybersecurity lawyers as we discuss how we got here, what businesses should be doing now to prepare for the CCPA and what the regulatory landscape will look like in the next few years. Our agenda includes insightful analysis of the following topics: Historical overview of the CCPA Key areas of CCPA compliance Expected issues and ongoing rulemaking Practical insights on how to bring existing privacy programs into compliance with the CCPA Other state legislation we are tracking throughout the US Potential federal privacy legislation and state preemption issues For more information, please contact Eury Jung .

Getting Started

  1. Login and customize your profile and privacy preferences.
  2. Adjust your community notification settings.
  3. Add "connectedcommunity.org" to your email "Safe Senders" list.
  4. Start a conversation - post a message in one of the discussion groups.
  5. Start networking - go to the Directory and Find a Member to connect with.

Recent Shared Files

Please login as a member to access your communities.

Either the content you're seeking doesn't exist or it requires proper authentication before viewing.

Most Active Members