Labor & Employment Science, Computers & Technology General Business

Read need-to-know updates, commentary, and analysis on Labor & Employment issues written by leading professionals.
News & Analysis as of

Back to the future: The digital disruption debate

Video killed the radio star…or did it? In its most recent research paper analysing the effects and possible responses to digital disruption, the Productivity Commission observes that with each wave of change “speculation...more

Pied Piper Is Like Empty Tables, and Empty Chairs (Silicon Valley – Episode 27)

“Not much to report this week, dear readers! Everything is perfectly fine.” Or so says Jared. But as Gilfoyle is quick to point out, “That’s a lie.” The problem is that even though the Pied Piper product has incredible...more

Tennessee Updates Data Breach Notification Law

The State of Tennessee recently amended its data breach notification statute, Tenn. Code Ann. § 47-18-2107, which is set to go into effect on July 1, 2016. Numerous commentators have proclaimed that the amendment marks a...more

It’s Back for Spring 2016: The Annual Verizon Data Breach Investigations Report

Last year around this time we examined the results of Verizon’s annual Data Breach Investigations Report (DBIR). As in year’s past, Verizon analyzed the data it received from companies across the country about security...more

Five Steps to Guarding Your Trade Secrets

Have you ever wondered what makes your Coke and KFC wings taste so marvelous? While many do wonder, the true recipes have never been revealed. The Coca Cola formula and KFC recipe are two of the most valuable, closely-guarded...more

Hacked and Left Holding the Bag - Cyber Liability Issues

If you read any newspaper, trade publication or twitter feed, you know that ongoing concerns regarding cyber security continue to grow. We have seen an article in the New York Times discussing hacking of major law firms with...more

Most Frequently Hacked Industries Now Includes Manufacturing

Second only to health care, the manufacturing industry is now one of the most frequently hacked industries (according to IBM’s 2016 Cyber Security Intelligence Index). And more importantly, automotive manufacturing was the...more

What Start-Ups, Tech Companies and Marketers Need to Know About the New Overtime Rules

You may have heard about new overtime rules from the Department of Labor. It’s not all about bathroom laws. Michael Kelsheimer, author of the Employer Handbook, broke down the new rules in Federal Changes to Overtime...more

Here’s Another Fine Mess You’ve Gotten Me Into: Best Practices for Employee, Contractor and Consulting Agreements.

In This Presentation: Overview of Messes to Avoid: • Split Ownership • Agreements to Agree • Agreements with Unclear/Improper: – relation to prior agreements – term – royalty rate –...more

Immigration Laws Stifle US Business

US immigration laws have not been created with the growing global economy’s need for foreign talent in mind, and should be reformed to promote hiring the best minds for the US economy. With globalization of the modern...more

Employers Face Exposure for Cyberbreaches

A newly filed lawsuit in California and a recent decision from the U.S. Court of Appeals for the Seventh Circuit serve as reminders to employers that the protection of sensitive employee information from cyberthreats remains...more

Setback for EU-US Privacy Shield – How to Safely Get HR Data Across the Pond

After the Court of Justice of the European Union declared the EU-U.S. Safe Harbor Framework invalid in October 2015, multinational companies with employees in the EU are facing the question how to legally transfer personal...more

California Appeals Court Provides Guidance on the Use of Electronic Signatures by Employees

In many companies, new employees sign key documents and policies—including arbitration agreements—with the use of electronic signatures. There has been a growing trend in litigation brought by former employees to challenge...more

Employment Law Navigator – Week in Review: April 2016 #2

That is SO last week - A couple of months ago, ride sharing app Lyft announced it had reached a settlement with drivers that would keep them classified as independent contractors, but pay them more than $12 million to...more

Fiduciary Issues and Data Privacy Is Your Plan Data Really Safe?

Despite the fact that Personally Identifiable Information (PII) definitions are continuously broadening with the addition of new data elements, and proposed federal legislation aims to reconcile state laws, security breach...more

“STOP. THINK. CONNECT.”: Using Your Personnel To Enhance Your Cybersecurity.

In February 2016, President Barack Obama directed his Administration to implement a Cybersecurity National Action Plan (CNAP) that “takes near-term actions and puts in place a long-term strategy to enhance cybersecurity...more

Dealing with Email Fraud? These Simple Steps Can Recover Assets in an Emergency

According to the FBI, there has recently been a significant spike in email fraud, costing businesses billions in the last two years – with a significant portion of these funds landing in Hong Kong bank accounts. If your...more

Top 10 Ways to Protect Your Company’s Data

You know how important data is to your business and you have been hearing about data breaches for more than a decade, but where do you find a simple, straightforward summary of how to protect your company? That is a question...more

Federal Court Rejects Employer’s Trade Secret and Computer Fraud and Abuse Act Claims

An ex-employee’s former employer sued him for alleged violations of the Kansas Uniform Trade Secrets Act (KUTSA) and the federal Computer Fraud and Abuse Act (CFAA). The first claim was based on the company’s hunch that he...more

Health Alert (Australia) - February 22, 2016

IN THIS ISSUE: In This Issue: - Judgments; Legislation; and Reports. - Excerpts from Judgments: Queensland 12 February 2016 - Gobus v State of Queensland (Cairns and Hinterland Hospital and...more

An Overview of Cybersecurity Issues Affecting Retirement Plans

Retirement plan sponsors face ever-evolving cyber-related threats to plan assets and participant personal information. To combat such threats, plan sponsors should proactively assess the third-party service providers’ ability...more

Just Because You Say It, Doesn't Make It So

Many companies in the technology industry pay workers as “independent contractors” or “1099 workers.” In theory, classifying individuals as independent contractors rather than employees can bestow significant economic...more

Fingerprint Identification Technology

Fingerprint identification technology uses fingerprints to uniquely identify individuals. The technology has been used by law enforcement agencies for decades, and dozens of statutes regulate when government agencies may...more

Financial Services and Technology Companies Beware: The U.S. Office of Federal Contract Compliance Has A Target on Your Back

The President released his 2017 budget this week. Budgets are aspirational documents that Congress rarely implements in full. The current acrimony between Congress and the Administration ensures that the President’s 2017...more

Employment Law Navigator – Week in Review: February 2016 #2

We’ve written a lot about employee health data and the inherent risks of requesting and maintaining this sensitive information. Last week, Forbes published a post arguing that employee health data could be the next business...more

256 Results
|
View per page
Page: of 11

Follow Labor & Employment Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×