Read Labor & Employment Law updates, alerts, news, and legal analysis from leading lawyers and law firms:
Social Media At Work - What's Allowed and What Isn't? PODCAST - Inside Law
Yahoo’s New Parental Leave Policy Raises Some Interesting FMLA Questions
Ann Curry’s Departure from the Today Show Presents a Number of Lessons for Employers
Businessweek Reporter: BigLaw Is "Crash Landing"
[Legal Perspective] When Is It NOT Okay to Delete Your Social Media Account?
D.C. Court Wreaks Havoc on NLRB Pro-Worker Cases
Can You Be Fired for a Tattoo?
President Obama Appoints Three Members to NLRB, but Will They Be Confirmed?
Social Media Law Report - Who Owns Your LinkedIn Account, FTC Guidance on Social Ads, More...
Your Employer Doesn’t Own Your LinkedIn Account, and They Shouldn’t Try To
What You Need to Know About New Secretary of Labor Thomas Perez
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
As Expected, Noel Canning v. NLRB Headed to the Supreme Court
Marijuana in the Workplace
5 Risks of Telecommuting (And How Employers Should Handle Them)
Two Key Elements Every Social Media Policy Should Include
Corporate Law Report: Global HR, Textual Harassment, Working Interviews, and Other Workplace Issues
As Supreme Court Defines “Clothes,” Biggest Impact Will Be on Judiciary’s Deference to DOL
How to Handle Illegal Interview Questions
Corporate Law Report: Workplace Romances, FMLA Changes, California Tax News, and More
In Part 3 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will address developing BYOD trends and best practices. Please check out Part 1 and 2 of this 3-part series addressing employee and employer concerns,...more
The federal Department of Justice recently filed criminal charges against a 41-year old software programmer and system manager who hacked into his former employer's computer network, causing $90,000 in damage. The complaint...more
The Department of Health and Human Services released final Health Insurance Portability and Accountability Act (HIPAA) privacy and security regulations on January 25, 2013. ...more
The Privacy Rights Clearinghouse’s Chronology of Data Breaches lists 3,671 incidents affecting 607,295,463 records since 2005,1 including these three:
- A worker steals customer records containing credit card, bank...more
In Part 2 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will discuss employer BYOD concerns. Check out Part 1 to learn more about employee interests; Part 3 will present developing trends and suggest best...more
Inside this e-Book:
- Company Descriptions
- Policy Management: From Dilbert to Reality
- The Art of Managing Policy Exception Requests
- From NAVEX Global: Business Case: The ROI of Policy Management
The "inevitable disclosure" doctrine is one of the most discussed, controversial topics in unfair competition law. The commentary among academics and bloggers reminds me of the ongoing debate over the proper scope of the...more
Imagine you grab your phone only to find it locked, with all of your applications, pictures, and contacts permanently deleted. Imagine your employer's IT department remote-wiped your phone because they mistakenly believed it...more
In December, 2011, the Office of Contract Compliance Programs (OFCCP) caused much consternation among the federal contracting community by publishing proposed changes to the affirmative action and nondiscrimination...more
On April 24, 2013, a federal jury in the Northern District of California found former Korn/Ferry International corporate executive recruiter, David Nosal, guilty on six counts of conspiracy, stealing trade secrets, and...more
Is it ever NOT okay to delete your social media account?
That's the question we ask in this JD Supra Legal Perspective. And for an answer, we look at recent coverage of a case in which an airline worker in New Jersey...more
The National Labor Relations Board (NLRB) is the agency that administers the National Labor Relations Act (NLRA), which is the law that protects employee rights to unionize and collectively bargain with...more
Every year, we survey Morrison & Foerster’s Global Sourcing Group lawyers around the world to create a snapshot of the current state of the global outsourcing market and to identify emerging trends that are likely to shape...more
In today’s complex global economy, competition is fierce. For many businesses, trade secrets are their single most important and valuable asset, and strong protection of that asset is paramount. In the same regard, trade...more
Many small and medium business owners are overwhelmed by the social media choices available to them, and unsure of which might best fit their target clients and markets. Twitter, being a relative new kid on the block, can be...more
Trade secret claims have historically derived from state common law causes of action and, subsequently, most states’ adoption of the Uniform Trade Secrets Act, which codifies that common law and generally proscribes the...more
In This Issue:
- Third Circuit Panel Liberalizes “Protected Activity” Immunity for Employees Claiming Whistleblower Status
- Doing Time: A Requirement for White Collar Crime?
- Casting a Smaller Net:...more
New Jersey legislators have proposed making a variety of post-employment restrictive covenants unenforceable where the employee is eligible for unemployment benefits. Many high-level sales employees and employees with...more
Federal Government Regulations:
Canada Gazette, Part II, March 27, 2013:
Contraventions Act -
SOR/2013-41 Regulations Amending the Application of Provincial Laws Regulations.
Software purchasers that have paid Massachusetts sales tax on the full purchase price for software that was also concurrently available for use by employees outside Massachusetts, should consider filing protective refund...more
Most people know that an employee who misuses his employer’s confidential information may be subject to damages in a civil lawsuit. Many states have enacted a Uniform Trade Secrets Act that allows an employer to pursue a...more
In this brave new world of health information privacy, many industry experts and healthcare organizations have emphasized the need to secure portable electronic devices such as laptops, issued to employees. But a recently...more
In a recent panel discussion, one of the speakers was a so-called "ethical hacker" - a hacker-turned-protector of employers' confidential information. As someone at the forefront of cyberattacks, the ethical hacker's opinion...more
If you are a health care provider and/or someone who routinely performs work involving patient health information on behalf of a health care provider, you likely need to know about the HIPAA/HITECH Final Rule....more
In This Issue:
- U.S. Supreme Court to Rule on Causation Factor in Retaliation Claims
- Student Sues University Over the Right to Keep a Guinea Pig in a College Dorm for Emotional Support
JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free...
Learn More or Schedule a demo