News & Analysis as of

General Business Privacy Labor & Employment

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.

How Policies Can Defeat a Breach of Contract Claim

Here is an interesting scenario for employers to consider. A company discovers that an employee working in information technology has taken de-commissioned company computers for himself and even given some away. After...more

Identifying and Managing Corporate Risk from Internal and External Stressors

by Tucker Arensberg, P.C. on

I’ve been asked the same simple question time and time again by clients who are faced with litigation – How did this happen? Sometimes they are referring to a looming dispute over large accounts receivable, employee...more

Top Board Concerns Heading into 2017 Remain a Hot Topic

by Snell & Wilmer on

Each year, a number of surveys and commentators describe and predict the trending topics of interest and importance to boards of directors in the for-profit and non-profit sectors. As we wrap up the first quarter of 2017, it...more

2016 Class Action Year-End Review

by BakerHostetler on

We are pleased to share BakerHostetler’s 2016 Class Action Year-End Review, which offers a summary of key developments in class action litigation during the past year. Class action litigation moved to the forefront of the...more

SEC Charges More Public Companies for Confidentiality Agreements That Might Deter Whistleblowers

by Hinshaw & Culbertson LLP on

In the past two years, the SEC has charged six public companies with violating SEC Rule 21F-17, which prohibits confidentiality agreements that could impede employees from making whistleblower claims directly to the SEC....more

Top Trends in Business Law that You Need to Know for 2017

by Fraser Trebilcock on

Macy’s and Kmart are each closing a Lansing, Michigan location – but did you know that in general, retail spending is up? It’s easier than ever to collect customer data, but business owners beware: you need to...more

“W-2 Phishing Attacks Targeting Businesses to Cash in on Busy Tax Season: 10 Tips to Protect Your Business”

by Sedgwick LLP on

Cyber criminals are taking advantage of tax season to lure valuable W-2 information from vulnerable businesses. An example of a common phishing scheme starts with a scammer posing as a legitimate employee of a company,...more

Expert Insights on Developing a Physical Security Program

by Jackson Lewis P.C. on

In today’s digital age, security tends to be thought about in terms of firewalls, malware, encryption and other safeguards for electronic systems. But the security of those systems, as well as an organization’s facilities,...more

Employment Law Commentary - Volume 29, Issue 1

by Morrison & Foerster LLP on

The Cost Of Keeping Things Quiet: Crackdown On Confidentiality Clauses Calls For Explicit Carve-Outs - In last February’s Employment Law Commentary, we discussed best practices for drafting separation agreements. Among...more

Data Theft And What’s “Tangible”: New York Appellate Division Reinstates Conviction Of Former Goldman Sachs Programmer Sergey...

The law often lags behind developments in the tech world. One problem for employers seeking to protect their data is that some anti-theft and trade secret protection laws drafted long ago refer to “goods” and “tangible”...more

Key Legal Issues Business Leaders and In-House Counsel Need to Know for 2017

by Arnall Golden Gregory LLP on

1. With Wage and Hour Rules in Flux, Employers Need to Remain Vigilant - Expanding wage and hour obligations will continue to be a top concern for employers in 2017. As most employers are aware, in May 2016, the United...more

The Employment Law Authority - January/February 2017

A Moving Target: The Not So Final Overtime Rule - On November 22, 2016, a federal judge for the Eastern District of Texas issued a preliminary injunction temporarily blocking the U.S. Department of Labor (DOL) from...more

Can a PA Employer be Liable to its Employees for a Data Breach?

It’s a nightmare scenario for any employer: you’ve been hacked. Thousands of your employees’ names, birthdates, Social Security numbers, and bank account information have been stolen. This information is used to file...more

Insight: UK Employment Law Round-up – December 2016

by Dentons on

Welcome to the December edition of our employment law round-up. In this edition, we couldn't fail to give you an update on the most important piece of constitutional litigation of our time, which has been heard by the Supreme...more

Compliance Role in Mitigating Cyber Mayhem

by NAVEX Global on

In recent years, attention has been drawn to the impact of cyber and data breaches and the extent to which our organizations remain vulnerable to these threats. The cost of cyber and data security breaches is well known and...more

The NLRB’s Challenge To Bridgewater’s Confidentiality Clauses: Its Significance For Employers

The NLRB’s new focus on non-union employment has been well–chronicled here. Employment contract provisions thought to be governed only by state contract law principles are now subject to the federal National Labor Relations...more

The Sharing Economy: Developments in Collaborative Workspaces

by Morgan Lewis on

Alternative office space sharing arrangements offer several benefits but are not without their downsides. The Great Recession of the late 2000s and the rise of the sharing economy have led to a concurrent growth in...more

Investment Management Update

by Ballard Spahr LLP on

Investment Adviser AXA Wins Excessive Fee Trial - A federal judge in New Jersey has ruled in favor of AXA Equitable Life Insurance Company (AXA Equitable) and its wholly owned subsidiary, AXA Equitable Funds Management...more

Compensation and Benefits Insights – September 2016 #2

by King & Spalding on

Hardly Water Under the Bridge: NLRB, SEC, OSHA Mount Offensive Against Confidentiality Agreements - A recent New York Times story shed light on complaints by an employee of Bridgewater Associates, a $154 billion hedge...more

Pokémon GO Exposes Risks of Bring-Your-Own-Device (BYOD) Policies

There’s no denying it: Pokémon GO is a phenomenon. The smartphone game, in which players use their mobile device camera and GPS to capture, battle, and train virtual creatures, was released in the United States on July...more

Food and Beverage Law Update: August 2016

by Holland & Knight LLP on

When food and beverage companies think of their largest risks, data breaches have not historically come to mind, but this is changing because of reports in the past few months of major breaches by companies such as Noodles &...more

Employment Law This Week®: Executive Incentive Pay Rule, Race Discrimination, Pokémon Go, Commercial Non-Competes [Video]

by Epstein Becker & Green on

We invite you to view Employment Law This Week® - a weekly rundown of the latest news in the field, brought to you by Epstein Becker Green. We look at the latest trends, important court decisions, and new developments that...more

Can Using Social Media Lead to a Lawsuit?

by Williams Venker & Sanders on

In an era where technology is not only constantly evolving, but prevalent in nearly every aspect of our lives, it is only fitting to discuss the legal implications of social media. This includes everything from defamation...more

Five Trending Challenges Facing Employers in the Technology, Media, and Telecommunications Industry

by Epstein Becker & Green on

Employers in the technology, media, and telecommunications industry continue to face numerous workplace management and compliance challenges under changing laws. From evolving mandates regarding benefits and momentum toward...more

OSC Whistleblower Program Launched

by Dentons on

On July 16, 2016, the Ontario Securities Commission (OSC) announced the launch of its Office of the Whistleblower. This is the first paid whistleblower program by a securities regulator in Canada. Subject to eligibility...more

211 Results
|
View per page
Page: of 9
Cybersecurity

Follow General Business Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!