General Business Labor & Employment Privacy

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

Enforceability of Confidentiality Agreements – Confidential Information Must Be “Confidential”

For many companies, entering into confidentiality or non-disclosure agreements is common practice when sharing confidential or proprietary information with third parties. However, as the recent case nClosures, Inc. v. Block...more

Updating IT and BYOD Policies to Reflect CASL Software Notification Requirements

On January 15, 2015, the software provisions in Canada’s Anti-Spam Legislation (CASL) will come into force, creating significant prohibitions and requiring consent to, among other things, install software, change device...more

Privacy Alert: Privacy Lessons Learned From Uber

It’s not just health care companies, credit card companies, or big box retailers that need to be careful when it comes to privacy. Any company collecting user data from mobile apps—including geolocation data, user address...more

Texas Supreme Court weekly orders (11/14)

In its weekly orders (11/21/14), the Texas Supreme Court issued five new opinions and granted review in three cases. Click here to read the order list and find the opinions....more

BYOD In Australia - Cool, Cheap And (Potentially) Catastrophic!

THE ALLURE OF THE POTENTIAL COST SAVINGS OF BRING YOUR OWN DEVICE PROGRAMS IS TOO GREAT FOR MANY AUSTRALIAN ORGANISATIONS TO RESIST. Not only do the financials of Bring Your Own Device (BYOD) programs look good (the...more

Data protection obligations on banks into force in Italy

The Italian Data Protection Authority issued regulations introducing new relevant data protection obligations for banks in the processing of customers’ personal data by their employees aimed at monitoring the transfer of...more

Making UK Employees Aware of the Perils of Pilfering Their Employers' Confidential Information

Employers need to appreciate and address the fact that employees who remove their employers’ confidential information often do not appear to appreciate the risks of being caught or the potentially very serious consequences of...more

Delaware Laws on Proper Destruction of Personal Identifying Information Take Effect in January

When companies that conduct business in Delaware make their 2015 New Year’s resolutions, they should be sure to add compliance with 6 Del. Code §§50C-101 - 50C -104 ( Section 50C) and 7 Del. Code § 736 (Section 736) to their...more

Business Litigation Alert: "When Employees Turn Into 'Hackers'"

Sometimes the Greatest Risk Comes from the Inside - Cybersecurity continues to be an issue that dominates the news. Much has been made of the cyber-risk US companies face from foreign countries and outsiders. However,...more

Cliff Notes from the Joint OCR/NIST HIPAA Security Conference

As a service to our readers, we have distilled last week’s joint HHS Office of Civil Rights (OCR) and National Institute of Standards in Technology (NIST) conference, “Safeguarding Health Information: Building Assurance...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security, Continued - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the...more

How To Avoid Common Data Breach Pitfalls

Cost of Data Breach in 2014: - $5.9 million U.S. average cost of a data breach - 15% Annual increase in the average cost of a data breach around the world - $201 Average cost paid for each exposed...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the data...more

Business Associate Agreements May Require Amendment

The Omnibus Final Rule (the "Omnibus Rule") under the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), was issued in January, 2013 effective March 26, 2013, but with a general compliance deadline of...more

When Acting to Prevent Data Breaches and Comply with Privacy Laws, Remember Overarching Employee Rights

The grocery business may be “fresh and easy,” but drafting a confidentiality and data protection policy that withstands the scrutiny of the current National Labor Relations Board (NLRB) is not. The NLRB, in its recent 2-1...more

Quirky Question #240, Breach Notification Laws

Question: Our company has employees and operations in multiple states, and I’m concerned about complying with data breach laws in the various locales. What’s the status of the law on data break...more

My “Momma Bear” Is Coming Out: Cyber Bullies Prove Social Media Training Needs An Anti-Harassment Element

More than 50% of teens have experienced cyber bullying. Parents have historically looked to their children’s schools and local government to address the issue, but what about the social media sites which contribute to the...more

Wearable Devices in the Workplace Challenge Data Security and Privacy

Wearable devices, including health and activity monitors, video and audio recorders, location trackers, and other interconnected devices in the form of watches, wristbands, glasses, rings, bracelets, belts, gloves, earrings,...more

Bring Your Own Device Doesn't Mean Bring in Security Breach

Bring-Your-Own-Device (“BYOD”) policies have been picking up steam because of increased productivity, improved communications, and the need for employees to work remotely. However, when implementing any BYOD policy there are...more

4 Cases Where Security Awareness Training Could Have Saved The Day

I’m very excited about our upcoming webinar, “Cybersecurity 2014: The Impact on Global Companies,” with Lisa Sotto. She is a well known data privacy rockstar and will provide an overview of cybersecurity in 2014, the current...more

Three Security Awareness Training Findings That Will Surprise You

As providers of ethics and compliance training solutions, we never tire of discussing topics like anti-bribery training, sexual harassment training, code of ethics training… and so many more. Lately, we have seen a real...more

Report From Counsel: Insights and Developments in the Law - Summer 2014

In this Issue: - Small Businesses and Job Discrimination - Noncompetition Agreements and Arbitration - Real Estate Deals Gone Wrong - Ensure Your Financial Privacy - Excerpt from Small...more

Data Privacy Law in the UK, Part II: Data Security and Restrictions on Data Transfers for U.S. Employers

The European Court of Justice’s decision in the Google case that it was required to remove links to “outdated” or “irrelevant” information about an individual has brought EU data privacy laws to the forefront of public...more

Does Your Company Align Compliance Training To An Annual Ranking of Risks?

PwC came out with their annual State of Compliance survey, which is always well done, and has given me lots of fodder for upcoming blogs. I found the below illustration in the accompanying “chart pack” and found it...more

10 Tips for Creating a Successful BYOD Policy

The “bring your own device” (BYOD) trend has become the norm at many companies and viewed as a way to both save money and increase productivity. By allowing employees to use their personal smartphones, tablets and laptops to...more

136 Results
|
View per page
Page: of 6

Follow General Business Updates on: