General Business Privacy Labor & Employment

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the data...more

Business Associate Agreements May Require Amendment

The Omnibus Final Rule (the "Omnibus Rule") under the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), was issued in January, 2013 effective March 26, 2013, but with a general compliance deadline of...more

When Acting to Prevent Data Breaches and Comply with Privacy Laws, Remember Overarching Employee Rights

The grocery business may be “fresh and easy,” but drafting a confidentiality and data protection policy that withstands the scrutiny of the current National Labor Relations Board (NLRB) is not. The NLRB, in its recent 2-1...more

Quirky Question #240, Breach Notification Laws

Question: Our company has employees and operations in multiple states, and I’m concerned about complying with data breach laws in the various locales. What’s the status of the law on data break...more

My “Momma Bear” Is Coming Out: Cyber Bullies Prove Social Media Training Needs An Anti-Harassment Element

More than 50% of teens have experienced cyber bullying. Parents have historically looked to their children’s schools and local government to address the issue, but what about the social media sites which contribute to the...more

Wearable Devices in the Workplace Challenge Data Security and Privacy

Wearable devices, including health and activity monitors, video and audio recorders, location trackers, and other interconnected devices in the form of watches, wristbands, glasses, rings, bracelets, belts, gloves, earrings,...more

Bring Your Own Device Doesn't Mean Bring in Security Breach

Bring-Your-Own-Device (“BYOD”) policies have been picking up steam because of increased productivity, improved communications, and the need for employees to work remotely. However, when implementing any BYOD policy there are...more

4 Cases Where Security Awareness Training Could Have Saved The Day

I’m very excited about our upcoming webinar, “Cybersecurity 2014: The Impact on Global Companies,” with Lisa Sotto. She is a well known data privacy rockstar and will provide an overview of cybersecurity in 2014, the current...more

Three Security Awareness Training Findings That Will Surprise You

As providers of ethics and compliance training solutions, we never tire of discussing topics like anti-bribery training, sexual harassment training, code of ethics training… and so many more. Lately, we have seen a real...more

Report From Counsel: Insights and Developments in the Law - Summer 2014

In this Issue: - Small Businesses and Job Discrimination - Noncompetition Agreements and Arbitration - Real Estate Deals Gone Wrong - Ensure Your Financial Privacy - Excerpt from Small...more

Data Privacy Law in the UK, Part II: Data Security and Restrictions on Data Transfers for U.S. Employers

The European Court of Justice’s decision in the Google case that it was required to remove links to “outdated” or “irrelevant” information about an individual has brought EU data privacy laws to the forefront of public...more

Does Your Company Align Compliance Training To An Annual Ranking of Risks?

PwC came out with their annual State of Compliance survey, which is always well done, and has given me lots of fodder for upcoming blogs. I found the below illustration in the accompanying “chart pack” and found it...more

10 Tips for Creating a Successful BYOD Policy

The “bring your own device” (BYOD) trend has become the norm at many companies and viewed as a way to both save money and increase productivity. By allowing employees to use their personal smartphones, tablets and laptops to...more

France Facilitates Implementation of Whistleblowing Systems

In France, before implementing a whistleblowing process, a company must inform and consult with its employees’ representatives, inform its employees and notify the French Data Protection Agency (CNIL). There are two...more

A Compilation of Enforcement and Non-Enforcement Actions

As reported in the May 2014 edition of Legal News: Investment Management Update, the SEC has made cybersecurity readiness a high-priority item to review when it conducts examinations of registered broker-dealers and...more

Florida’s New Data Breach Notification Requirements Take Effect July 1

On June 20, 2014, Florida Governor Rick Scott signed the Florida Information Protection Act of 2014 (FIPA) into law. FIPA imposes stringent new security and notice requirements on businesses and employers that maintain...more

Don’t forget to close the back door: Vendor management and privacy

When you enter into a contract with a vendor that will access, use or disclose your customer or employee personal information, assume that you are responsible for any unauthorized access to, use, or disclosure of that...more

Data Breach Laws Continue to Come

Retail. Financial services. Health care. Energy. Not an industry has been spared when it comes to recent data and cyber breaches, and the colossal damage that occurs to the interests of the company, its employees, and third...more

Data Security in a Technological World

The Uniform Trade Secrets Act, adopted by 47 states including Virginia, Maryland, and the District of Columbia, generally defines protectable trade secrets as information that derives independent economic value from not being...more

It’s Like Déjà Vu All Over Again: Yogi Berra On Information Security

It is Spring again, and the national pastime is in full swing. This year Spring also brought knowledge of the Heartbleed Bug – another threat to the security of information stored and transmitted online. And just as baseball...more

BYOD is Here: 9 Features Your BYOD Policy and Compliance Training Courses Should Include

I read a great blog by Tricia Meyer of Meyer Law, on how crucial it is to prepare your business for the Bring Your Own Device (BYOD) movement. Surely you’ve heard about this; I even heard a story about BYOD on NPR a few...more

Government Contracts Quarterly Update - February 2014

The Government Contracts Quarterly Update is published by BakerHostetler's government contracts practice group to inform our clients of the latest developments in federal government contracting. This update covers the...more

2014 Trends: #5 Top Ten Privacy and Related Ethics & Compliance Issues

Trend number 5 is on the docket today as we move down our list of ethics and compliance trends to watch in 2014. Privacy issues have led the headlines for years but their intersection with ethics and compliance is coming to...more

Set Your “Target” on Data Security in 2014

Target Corp.’s data breach has been big news this holiday season, with as many as 40 million holiday shoppers across the nation exposed to potential credit and debit card fraud. According to the Identity Theft Resource...more

Recent Australian Privacy Reforms Will Significantly Impact Offshore Share Incentives For Australian Employees

The changes to the Privacy Act 1988 (Cth), including the introduction of the new Australian Privacy Principles (APPs), significantly increase the obligations imposed on an offshore parent or related entity that collects or...more

126 Results
|
View per page
Page: of 6

Follow General Business Updates on: