Search for: "CONVERSE v CONVERSE" Results 7881 - 7900 of 15,439
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
20 Jan 2015, 6:27 am by Joy Waltemath
Undaunted, the HR official responded that a face-to-face conversation would be necessary, and that she stood “ready to assist” once the employee felt capable of having one. [read post]
20 Jan 2015, 4:07 am by Amy Howe
Jacobs covers last week’s grant in Horne v. [read post]
19 Jan 2015, 6:45 am by Joy Waltemath
Moreover, at no point in the recruiter’s deposition did she deny that this was the nature of their conversation. [read post]
18 Jan 2015, 7:48 pm
Equally, the European Court of Human Rights considers that the principles set out in the preamble to the Convention refers to the Convention as a whole (see,  inter alia , ECHR rulings  Engel and Others v. the Netherlands on June 8, 1976, Klass and Others v. [read post]
17 Jan 2015, 5:06 pm by Giles Peaker
Armes v Wheel Property Co Ltd, Clerkenwell and Shoreditch County Court, 17 May 2013 Claimant had been the protected tenant of a two bed flat in a Victorian terrace conversion for 30 years. [read post]
16 Jan 2015, 12:09 pm
I also think the Supreme Court was right in Cohen v. [read post]
12 Jan 2015, 11:25 am by Adam Kielich
These conversations normally turn to the employee asking whether FMLA leave is available for short term leave for a cold or flu. [read post]
12 Jan 2015, 6:42 am by Clara Spera
Jack entered the conversation a little later, calling into question the “ law enforcement v. war distinction” in the first instance. [read post]
9 Jan 2015, 1:05 pm by Sandy Levinson
  Perhaps courts can't base (or, at least, publicly admit that their basing their decisions) exclusively on "possible effects," but, going back to Marbury and foreword to the embarrassing decision a couple of years ago finding a lack of standing in Perry v. [read post]
9 Jan 2015, 4:31 am by Kevin LaCroix
Even more elegant is the simple way the Framework steers conversations regarding how a company should review its core processes of protecting its most precious IP, trade secrets or customer information: Identification – Developing the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. [read post]