General Business Science, Computers & Technology Labor & Employment

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

Sales Of $8,000 Stemming From Trade Secret Misappropriation Results In Liability For $1.3 Million

At a time when an ex-employee’s newly created company was subject to an injunction prohibiting misappropriation of his former employer’s supposed trade secret, the new company allegedly used that confidential information on a...more

Homejoy’s Shutdown, Due to Misclassification Lawsuits, Likely to Propel Tech Start-Ups to Enhance Their Independent Contractor...

Earlier Friday, it was reported by Carmel DeAmicis of re/code that Homejoy, the home cleaning start-up that uses independent contractors as their home cleaners, was closing down its operations due to four misclassification...more

Jawbone Cries Foul – Fitbit’s Success Due To Stolen Trade Secrets

Fitbit better watch its step because Jawbone has a serious bone to pick with its competitor. On May 27, 2015, Jawbone, a maker of wearable fitness and activity tracker devices, filed suit in California state court...more

Hawaii Bans Non-Compete and Non-Solicit Agreements with Technology Workers

Hawaii joined the small list of states that prohibit certain non-compete agreements with employees. On June 26, 2015, Hawaii’s governor David Ige signed Act 158 which voids any “noncompete clause or a nonsolicit clause...more

Is An Offer Of At-Will Employment Adequate Consideration For A Non-Compete? Recent Court Rulings Split Three Ways

Three very recent decisions reflect the irreconcilable division of judicial authority regarding the adequacy of at-will employment as the sole consideration for an otherwise valid non-compete. Compare (a) Standard Register...more

Five Social Media Law Issues To Discuss With Your Clients

The explosive growth of social media has clients facing legal questions that didn’t even exist a few short years ago. Helping your clients navigate this muddled legal landscape will have them clicking “like” in no...more

Digital Privacy Act Modernizes PIPEDA

On June 18, 2015, significant portions of the Digital Privacy Act received Royal Assent. This Act, amends the Personal Information Protection and Electronic Documents Act (PIPEDA), and brings important certainty to how...more

Employee Surveillance and Monitoring

To state the obvious (and this shows my age), we are way past George Orwell’s 1984. Yes, I know 30 years past it. But we are way past the privacy concerns expressed in Orwell’s book; we are in a new era where technology and...more

Competing After Employment (Part 2)

A few weeks ago, Jawbone, a fitness tracking hardware and software maker, sued its arch-rival Fitbit, alleging that Fitbit lured its employees away to obtain access Jawbone’s confidential information and product plans. How...more

How to Keep What is Yours: Practical Considerations for Healthcare IT Protection

One of the worst kept secrets is the experienced and expected growth in healthcare IT. In 2013, over $650 million was invested into healthcare IT companies, and the trend is continuing to grow. Combined with the fact that...more

The Pacific Rim Free Trade Deal

President Obama’s controversial Pacific Rim free trade deal (“the deal”), a trade agreement to enhance trade and investment among 11 Asian Pacific countries to boost economic growth in the United States, has sparked...more

Triple Threat: U.S. House Subcommittee Considers Three State Tax Bills

On June 2, 2015, the U.S. House of Representatives Judiciary Committee’s Subcommittee on Regulatory Reform, Commercial and Antitrust Law conducted a hearing on three state tax bills: the Mobile Workforce State Income Tax...more

Senn on 10 Best Practices in a Cross-Border Investigation – Part I

Today we celebrate a closure for it was on this day in 1935 that probably the best-known baseball player in the history of the game, George Herman ‘Babe’ Ruth, retired. While many of his records were broken with the march of...more

USCIS Guidance Clarifies Employer Obligations to Amend H-1B Visa Petitions, Sets Compliance Deadline

On May 21, 2015, the U.S. Citizenship and Immigration Services (USCIS) issued guidance on an employer's obligation to amend an H-1B visa petition to report a change in the employee's worksite location. This guidance is in...more

VC’s running scared – Hooli is suing Pied Piper (Episodes 9 and 10)

HBO’s “Silicon Valley” has quickly become a must watch for all budding entrepreneurs, but the second season has opened up with a multitude of risks and roadblocks that could be faced by real world entrepreneurs. Here, we...more

Quirky Question #260, Data breach incident response plans

Question: For data breach preparation, what guidance have federal and state regulators issued regarding incident response plans? Originally published on IRMI.com....more

New Release for Spring 2015: The Annual Verizon Data Breach Investigations Report

It’s that time of year again. Spring is in the air, flowers are in bloom, and Verizon’s annual Data Breach Investigations Report (DBIR) has been released. As in years past, this year’s numbers shed some light into, not only...more

Structure your start-up for fundraising success - Part Two: Organize your corporate records

If you’ve determined that your new venture is going to require outside investment, there are a number of things you can do to make your company more attractive to investors....more

Keeping It Classified: Here’s How To Stay Safe In A Technology-Driven World.

Protecting a company’s confidential information is becoming more difficult as technology continues to advance. Plus, an increasingly mobile workforce poses increased risk that employees will breach a company’s security...more

Seven Training Imperatives to Address Your Biggest Cyber Security Risk: Employee Behavior

One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more

10 Tips for Fostering a Business Culture of Cybersecurity Awareness

Businesses are recognizing the need for new approaches to data security as high-profile cybersecurity incidents reveal the true impact a data breach can have on an organization. One of the biggest realizations is that IT...more

Lessons From the Kleiner Perkins Trial: Stopping Discrimination Against Women

In recent weeks much media attention has been paid to an important case against a well-known Silicon Valley venture capital firm Kleiner Perkins Caufield Byers. Since late February, the technology sector venture capitalist...more

A Different Kind of Data Breach—Loss or Disclosure of Company Information by Employee Theft

Data breaches are all over the news, but those stories most often cover high-profile cybersecurity breaches that result from the malicious efforts of hackers or other outsiders. Just as insidious, and more likely to occur,...more

Out of the Frying Pan, Into the Fire – GSA Proposes to Reduce Price Reductions Clause Burdens, While Substantially Increasing...

In what is arguably its most significant proposed regulatory change affecting commercial item contracting in decades, the General Services Administration (“GSA”) earlier this week proposed amendments to the General Services...more

Workplace Privacy: What Every CCO Needs to Consider

Most of us go through our daily lives unthinkingly assuming that our actions, movements and conversations are private. However, in today’s high tech and connected world, that is no longer the case. If you drive a car, carry a...more

208 Results
|
View per page
Page: of 9

Follow General Business Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×