Labor & Employment Privacy General Business

Read need-to-know updates, commentary, and analysis on Labor & Employment issues written by leading professionals.
News & Analysis as of

Five 2015 Corporate Compliance / Litigation Issues Manufacturers Need To Keep An Eye On

It is our annual tradition at the beginning of each year to report on significant issues that face manufacturers/distributors in the year ahead.  Two weeks ago, Matt reported on significant issues in the labor/employment...more

Business Law Newsletter - January 2015

In This Issue: - FirstPay Decision: IRS Bests Trustee in Local Tax Case - Privacy Policies for Mobile Apps: One Size Does Not Fit All - Trademark Fees are Decreasing - Excerpt from Trademark Fees are...more

Expect Focus - Spot The Regulator, Volume IV, Fall 2014

In This Issue: - IN THE SPOTLIGHT ..Crisis Management: Five Steps to Take Before Providing That Comment - LIFE INSURANCE ..Third Circuit Limits ERISA Fiduciary Liability to those with Ultimate...more

Government Contracts Quarterly Update - January 2015

The Government Contracts Quarterly Update is published by BakerHostetler’s Government Contracts Practice team to inform our clients and friends of the latest developments in federal government contracting. Topics in...more

Sizing Up Cyber Risks after the Sony Breach

Sony’s most recent data breach underscores the difficulties in underwriting and insuring cyber risk. Sony incurred losses that were surprising in both their scope and type. The company already is a defendant in at least four...more

2015 Hot Topics for Multinational Companies

As we enter the New Year, Littler's international practice has identified a number of key employment and labor law issues for multinational companies (MNCs). The past year has brought to the fore some challenging issues...more

Enforceability of Confidentiality Agreements – Confidential Information Must Be “Confidential”

For many companies, entering into confidentiality or non-disclosure agreements is common practice when sharing confidential or proprietary information with third parties. However, as the recent case nClosures, Inc. v. Block...more

Updating IT and BYOD Policies to Reflect CASL Software Notification Requirements

On January 15, 2015, the software provisions in Canada’s Anti-Spam Legislation (CASL) will come into force, creating significant prohibitions and requiring consent to, among other things, install software, change device...more

Privacy Alert: Privacy Lessons Learned From Uber

It’s not just health care companies, credit card companies, or big box retailers that need to be careful when it comes to privacy. Any company collecting user data from mobile apps—including geolocation data, user address...more

Texas Supreme Court weekly orders (11/14)

In its weekly orders (11/21/14), the Texas Supreme Court issued five new opinions and granted review in three cases. Click here to read the order list and find the opinions....more

BYOD In Australia - Cool, Cheap And (Potentially) Catastrophic!

THE ALLURE OF THE POTENTIAL COST SAVINGS OF BRING YOUR OWN DEVICE PROGRAMS IS TOO GREAT FOR MANY AUSTRALIAN ORGANISATIONS TO RESIST. Not only do the financials of Bring Your Own Device (BYOD) programs look good (the...more

Data protection obligations on banks into force in Italy

The Italian Data Protection Authority issued regulations introducing new relevant data protection obligations for banks in the processing of customers’ personal data by their employees aimed at monitoring the transfer of...more

Making UK Employees Aware of the Perils of Pilfering Their Employers' Confidential Information

Employers need to appreciate and address the fact that employees who remove their employers’ confidential information often do not appear to appreciate the risks of being caught or the potentially very serious consequences of...more

Delaware Laws on Proper Destruction of Personal Identifying Information Take Effect in January

When companies that conduct business in Delaware make their 2015 New Year’s resolutions, they should be sure to add compliance with 6 Del. Code §§50C-101 - 50C -104 ( Section 50C) and 7 Del. Code § 736 (Section 736) to their...more

Business Litigation Alert: "When Employees Turn Into 'Hackers'"

Sometimes the Greatest Risk Comes from the Inside - Cybersecurity continues to be an issue that dominates the news. Much has been made of the cyber-risk US companies face from foreign countries and outsiders. However,...more

Cliff Notes from the Joint OCR/NIST HIPAA Security Conference

As a service to our readers, we have distilled last week’s joint HHS Office of Civil Rights (OCR) and National Institute of Standards in Technology (NIST) conference, “Safeguarding Health Information: Building Assurance...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security, Continued - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the...more

How To Avoid Common Data Breach Pitfalls

Cost of Data Breach in 2014: - $5.9 million U.S. average cost of a data breach - 15% Annual increase in the average cost of a data breach around the world - $201 Average cost paid for each exposed...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the data...more

Business Associate Agreements May Require Amendment

The Omnibus Final Rule (the "Omnibus Rule") under the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), was issued in January, 2013 effective March 26, 2013, but with a general compliance deadline of...more

When Acting to Prevent Data Breaches and Comply with Privacy Laws, Remember Overarching Employee Rights

The grocery business may be “fresh and easy,” but drafting a confidentiality and data protection policy that withstands the scrutiny of the current National Labor Relations Board (NLRB) is not. The NLRB, in its recent 2-1...more

Quirky Question #240, Breach Notification Laws

Question: Our company has employees and operations in multiple states, and I’m concerned about complying with data breach laws in the various locales. What’s the status of the law on data break...more

My “Momma Bear” Is Coming Out: Cyber Bullies Prove Social Media Training Needs An Anti-Harassment Element

More than 50% of teens have experienced cyber bullying. Parents have historically looked to their children’s schools and local government to address the issue, but what about the social media sites which contribute to the...more

Wearable Devices in the Workplace Challenge Data Security and Privacy

Wearable devices, including health and activity monitors, video and audio recorders, location trackers, and other interconnected devices in the form of watches, wristbands, glasses, rings, bracelets, belts, gloves, earrings,...more

Bring Your Own Device Doesn't Mean Bring in Security Breach

Bring-Your-Own-Device (“BYOD”) policies have been picking up steam because of increased productivity, improved communications, and the need for employees to work remotely. However, when implementing any BYOD policy there are...more

141 Results
|
View per page
Page: of 6

Follow Labor & Employment Updates on: