What is a hostile work environment?
How to Form an Effective CSIRT
Polsinelli Podcast - What Your Company Needs to Know About Whistleblower Claims
What's Next in Employee Wellness: Impact of the Affordable Care Act and New EEOC Initiatives
How Might Your Company be Affected by West Virginia's Employment Law Changes?
To Be or Not To Be (an Employer)
Polsinelli Podcast - The Climate for I9 Audits in 2015
Correcting Problems With Your Retirement Plan
Jeffrey Koonankeil on How the EPL Landscape is Changing
John Lewis of BakerHostetler Discusses Use of Social Media in Gawker Class Action
Pregnancy In the Workplace...Hot Off the Press
California Becomes Second State To Mandate Paid Sick Leave (AB 1522)
Insights and Strategies on Class Action Litigation from General Counsel and Chief Legal Officers
Understanding the Different Mandates Between Legal and Compliance February 3 2015
Cullen & Dykman Sees Colleges Calling for Title IX Help v
Uncovering the “Why” in FCPA Compliance Issues
Compliance Training for Employees: Trends in GRC
AB1825 Training and Anti-Harassment and Discrimination Training
Corcoran: Infighting on Compensation Costs BigLaw Time and Money
Polsinelli Podcasts - Safely Navigating the ADA, FMLA & Worker's Compensation Laws
The Federal Trade Commission has issued new guidance on data security for companies that collect, store and use consumer information, gleaned from the more than 50 enforcement actions brought by the agency over the past...more
In recent headlines, the Office of Personnel Management (“OPM”) has begun notifying millions of federal employees that it may have lost their personal information earlier this month in a data breach.
The data breach...more
Facebook: Fact or fiction? These days, courts are more and more frequently faced with disputes over whether, as part of the discovery process, a litigant should be entitled to view the opposing party’s social media posts. As...more
In September 2014, Apple introduced a new mobile-operating system called iOS8. iOS8 offers enhanced data-encryption protection to Apple users and the content stored on their mobile devices. Apple's advancements in...more
The cross-use of mobile devices for personal and professional purposes, commonly referred to as “Bring Your Own Device” or “BYOD”, is a relatively recent phenomenon that has created a host of legal and practical challenges...more
5 Reasons Employers Should Prohibit Employees From Using Personal Email Accounts - Recently, a political firestorm has erupted as news stories revealed that Former Secretary of State (and likely Presidential Candidate)...more
Pero v. Norfolk S. Ry., Co., 2014 WL 6772619 (E.D. Tenn. Dec. 1, 2014).
In this employment law case, the plaintiff filed a motion to compel the production of a video that the plaintiff claimed demonstrated the setting...more
From reliable surveys and less dependable anecdotes in most major markets, including the UK and the US, opinions point to the almost inevitable expansion of BYOD – Bring Your Own Device – as a cost-saving model for employers....more
As one who presumably has no nude selfies, you may not be too concerned about a “hack” like the one that continues to afflict celebrities like Jennifer Lawrence and Kate Upton. But that doesn’t mean there aren’t still plenty...more
Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more
According to PC Magazine, “[i]n the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive.” Cloud-based computing has become a very popular tool...more
German companies sometimes are required to collect data for legitimate business purposes, including for compliance, to investigate malfeasance, for adjudication of claims and to protect personal data of customers from misuse....more
The need to stay connected these days applies not only to our social universe, but also to our business universe. The result is a trend known as “bring your own device” or “BYOD.” BYOD is the practice where employees use...more
Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more
PTSI, Inc. v. Haley, 2013 WL 2285109 (Pa. Super. Ct. May 24, 2013).
In this employment law case, the plaintiff appealed a trial court’s denial of motion for sanctions against the defendants who allegedly erased...more
Lazette v. Kulmatycki, 2013 WL 2455937 (N.D. Ohio June 5, 2013).
In this employment law case, the federal district court held that the Stored Communications Act (SCA) can apply if an employer reads personal emails from...more
Gordon v. Kaleida Health, 2013 WL 2250579 (W.D.N.Y. May 21, 2013).
In this action brought under the Fair Labor Standards Act, the plaintiffs motioned for a court order requiring the parties to meet and confer on the...more
Potts v. Dollar Tree Stores, Inc., 2013 WL 1176504 (M.D. Tenn. March 20, 2013).
In this employment dispute, the defendant filed a motion to compel discovery of the plaintiff’s personal computer and any “Facebook and/or...more
This article discusses that, in addition to civil liability that employment lawyers tend to be alert for in departing employee scenarios, departing employees can also be criminally liable for theft, misappropriation, or other...more
Cisco’s 2011 Connected World Technology Report found that 70% of young professional employees disregard their employer’s technology policies on a regular basis. This presents significant litigation and public relations risks...more
Tips for obtaining social media during litigation, and using for your client's advantage....more
In this issue: NLRB Report Provides Guidance to Employers on Social Media Issues; Rough Waters: Repeat Infringer Policies and the DMCA Safe Harbors; What Every Company Should Know About E Discovery and Social Media; CDA...more
Pre-litigation practice pointers for locating, obtaining, and protecting the wealth of often-overlooked information that is voluntarily disclosed via social and other electronic media content. Published in the September 2011...more
This article, published in the June 2011 issue of the newsletter of the Maryland Chapter of the Federal Bar Association, discusses the powerful tool that social media has become. Social media is too difficult to ignore and...more
According to the third district appellate court in Holmes v. Petrovich, 2011 DJDAR 671, your office privacy is a lonely public roadway. And where the limits are clearly posted, you had better obey—no matter what kind of...more
Find a Labor & Employment Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top