General Business Privacy Labor & Employment

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

NLRB Continues to Scrutinize Employer Policies - NLRB General Counsel’s Guidance Memorandum and Recent Cases Highlight NLRA Issues

The National Labor Relations Board (NLRB or the “Board”) continues to address the scope of permissible employer policies and workplace rules through guidance issued by its General Counsel and in Board decisions. In March...more

Quirky Question #260, Data breach incident response plans

Question: For data breach preparation, what guidance have federal and state regulators issued regarding incident response plans? Originally published on IRMI.com....more

New Release for Spring 2015: The Annual Verizon Data Breach Investigations Report

It’s that time of year again. Spring is in the air, flowers are in bloom, and Verizon’s annual Data Breach Investigations Report (DBIR) has been released. As in years past, this year’s numbers shed some light into, not only...more

SEC Invalidates Confidentiality Agreement for Stifling Whistleblowers

Protecting employee rights while also protecting the employer can be a balancing act, but a necessary one in order to maintain a successful and compliant business. One such challenge is maintaining data protection and...more

Executive Labor Summary - April/May 2015

NLRB “quickie election” rule takes effect - On April 6, President Obama vetoed a joint resolution of Congress that sought to block the “quickie election” rule issued by the National Labor Relations Board....more

Data Privacy Challenges & Considerations for Cross-Border Ethics & Compliance Investigations

What investigators need to know—and do—to adhere to data privacy laws relating during ethics and compliance investigations. Investigations of potential misconduct can be taxing for any organization. But for...more

15 Things To Do To Protect Value After April 15

April 15, a date that lives in infamy. That is what FDR said about December 7, 1941, but many people feel the same way about April 15, also known as “Tax Day”. No one likes paying money to the IRS, even those persons who...more

Toss or Keep Document Retention in a Hospital Setting

Deciding how long to hold on to specific records in your hospital can be a challenging task, especially when the facility deals with so many different types of records. You may be tempted to hold on to everything indefinitely...more

Seven Training Imperatives to Address Your Biggest Cyber Security Risk: Employee Behavior

One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more

10 Tips for Fostering a Business Culture of Cybersecurity Awareness

Businesses are recognizing the need for new approaches to data security as high-profile cybersecurity incidents reveal the true impact a data breach can have on an organization. One of the biggest realizations is that IT...more

Employee Handbooks Should Be Reviewed in Light of NLRB Report

Your employee handbook may be unlawful. That’s the takeaway from a 30-page report issued by the National Labor Relations Board’s Office of the General Counsel on March 18, 2015....more

A Different Kind of Data Breach—Loss or Disclosure of Company Information by Employee Theft

Data breaches are all over the news, but those stories most often cover high-profile cybersecurity breaches that result from the malicious efforts of hackers or other outsiders. Just as insidious, and more likely to occur,...more

Workplace Privacy: What Every CCO Needs to Consider

Most of us go through our daily lives unthinkingly assuming that our actions, movements and conversations are private. However, in today’s high tech and connected world, that is no longer the case. If you drive a car, carry a...more

Developments & Predictions for the 2015 Proxy Season

In a January 2015 webcast, Latham & Watkins partners Jim Barrall, global Co-chair of the firm's Benefits and Compensation Practice, and Steven Stokdyk, global Co-chair of the firm's Public Company Representation Practice,...more

Five 2015 Corporate Compliance / Litigation Issues Manufacturers Need To Keep An Eye On

It is our annual tradition at the beginning of each year to report on significant issues that face manufacturers/distributors in the year ahead.  Two weeks ago, Matt reported on significant issues in the labor/employment...more

Business Law Newsletter - January 2015

In This Issue: - FirstPay Decision: IRS Bests Trustee in Local Tax Case - Privacy Policies for Mobile Apps: One Size Does Not Fit All - Trademark Fees are Decreasing - Excerpt from Trademark Fees are...more

Expect Focus - Spot The Regulator, Volume IV, Fall 2014

In This Issue: - IN THE SPOTLIGHT ..Crisis Management: Five Steps to Take Before Providing That Comment - LIFE INSURANCE ..Third Circuit Limits ERISA Fiduciary Liability to those with Ultimate...more

Government Contracts Quarterly Update - January 2015

The Government Contracts Quarterly Update is published by BakerHostetler’s Government Contracts Practice team to inform our clients and friends of the latest developments in federal government contracting. Topics in...more

Sizing Up Cyber Risks after the Sony Breach

Sony’s most recent data breach underscores the difficulties in underwriting and insuring cyber risk. Sony incurred losses that were surprising in both their scope and type. The company already is a defendant in at least four...more

2015 Hot Topics for Multinational Companies

As we enter the New Year, Littler's international practice has identified a number of key employment and labor law issues for multinational companies (MNCs). The past year has brought to the fore some challenging issues...more

Enforceability of Confidentiality Agreements – Confidential Information Must Be “Confidential”

For many companies, entering into confidentiality or non-disclosure agreements is common practice when sharing confidential or proprietary information with third parties. However, as the recent case nClosures, Inc. v. Block...more

Updating IT and BYOD Policies to Reflect CASL Software Notification Requirements

On January 15, 2015, the software provisions in Canada’s Anti-Spam Legislation (CASL) will come into force, creating significant prohibitions and requiring consent to, among other things, install software, change device...more

BYOD In Australia - Cool, Cheap And (Potentially) Catastrophic!

THE ALLURE OF THE POTENTIAL COST SAVINGS OF BRING YOUR OWN DEVICE PROGRAMS IS TOO GREAT FOR MANY AUSTRALIAN ORGANISATIONS TO RESIST. Not only do the financials of Bring Your Own Device (BYOD) programs look good (the...more

Data protection obligations on banks into force in Italy

The Italian Data Protection Authority issued regulations introducing new relevant data protection obligations for banks in the processing of customers’ personal data by their employees aimed at monitoring the transfer of...more

Making UK Employees Aware of the Perils of Pilfering Their Employers' Confidential Information

Employers need to appreciate and address the fact that employees who remove their employers’ confidential information often do not appear to appreciate the risks of being caught or the potentially very serious consequences of...more

150 Results
|
View per page
Page: of 6

Follow General Business Updates on:

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×