News & Analysis as of

Labor & Employment Science, Computers & Technology Criminal Law

Read need-to-know updates, commentary, and analysis on Labor & Employment issues written by leading professionals.

Defending Against Social Engineering Attacks

by Fisher Phillips on

The term “social engineering” used to conjure up images of social scientists with Ph.D’s brainstorming ways to improve race relations or provide lower income groups with greater access to education and employment...more

NY AG Report Shows Number of Data Breaches Soared in 2016

Unfortunately, it was a record breaking year in the State of New York for data breaches. The New York Attorney General (AG) released his annual data breach report, which announced that the AG’s Office received 1,282 data...more

Let's Go Phishing!

by Fisher Phillips on

Emails, lots and lots of emails, filling our inboxes. Even with the best security and filters, it seems that hackers are simply building better mousetraps. The bigger problem, however, is the trusting nature of individuals...more

Privacy Perils: Social Engineering Fraud - the C-Suite Maneuver

by Bass, Berry & Sims PLC on

It's a common misconception that cyber-criminals use sophisticated technical tools to hack into a person's computer or online accounts. More often than not, cyber attackers use old fashioned trickery or "social engineering"...more

Everything Compliance-Episode 5, year-end wrap up Part II [Video]

by Thomas Fox on

We turn to the 2016 year in review, in this Part II of a two-part series. Jonathan Armstrong leads a discussion on Privacy Shield, information and data privacy issues the past year. Mike Volkov relates what he saw as the top...more

Six Tips to Help HR Professionals Avoid Criminal Antitrust Liability Under New DOJ/FTC Guidance

by Foley & Lardner LLP on

On October 20, the U.S. Department of Justice (DOJ) and Federal Trade Commission (FTC) jointly issued antitrust guidance for human resources professionals. The agencies also released a list of high-level red flags for the...more

HR Professionals Take Note: DOJ and FTC Issue Guidance Regarding Antitrust Laws in the Employment Context

by Seyfarth Shaw LLP on

Seyfarth Synopsis: On October 20, the DOJ and the FTC jointly issued their Antitrust Guidance for HR Professionals, stating that DOJ intends to pursue employers criminally for alleged wage fixing and no-poaching agreements. ...more

Sharing of Passwords Under Certain Circumstances Unlawful

by Jackson Lewis P.C. on

Many companies have experienced the departure of an employee and the elimination of that former employees access to the company’s computers and networks. In the recent case of USA v. Nosal, D.C. No. 3:08-cr-00237-EMC-1 (July...more

DEA Rejects Petitions Seeking to Reschedule Marijuana

by Morgan Lewis on

The long-awaited decision maintains the illegal status of marijuana under federal law. On August 12, the US Drug Enforcement Agency (DEA), despite much speculation to the contrary, published in the Federal Register its...more

Ninth Circuit Interprets “Without Authorization” under the Computer Fraud and Abuse Act

by Brooks Pierce on

When we last left David Nosal, he had escaped liability under the Computer Fraud and Abuse Act after convincing some of his former colleagues at executive search firm Korn/Ferry to use their log-in credentials to download...more

Taking a Walk Back to a Kinder, Gentler Interpretation of the Computer Fraud and Abuse Act

by Brooks Pierce on

We don’t usually talk about four-year-old court decisions in the first instance here. But the Ninth Circuit has issued a pair of noteworthy opinions interpreting the Computer Fraud and Abuse Act in the last few weeks. And...more

CFAA Double Feature: Ninth Circuit Issues Two Important Decisions on the Scope of Liability Related to Data Scraping and...

This past week, the Ninth Circuit released two important decisions that clarify the scope of liability under the federal Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030. The Act was originally designed to target...more

Ninth Circuit Rules that CFAA Imposes Criminal Penalties When Terminated Users Try To Access Systems With Borrowed Passwords

by Reed Smith on

It can be a violation of the federal Computer Fraud and Abuse Act (“CFAA”) to “access[] a protected computer without authorization.” The CFAA clearly applies when criminals with no connection to a company try to force their...more

How employers can stop departing employees taking client lists with them

by White & Case LLP on

When an employee departs for a role with a competitor, there is often a risk that the employee might take confidential client details with them, with potentially damaging consequences for the employer. However, a recent court...more

In Case You Missed It: Launch Links - April 2016 #4

by WilmerHale on

Some interesting links we found across the web this week: - House of Representatives approves bill requiring warrants for email searches - It was a productive week on the Hill, as the House passed the Email...more

Employment Law This Week: FTC on Big Data, DOJ/DOL on Safety Violations, External Whistleblowers, NRF Fights Scheduling [Video]

by Epstein Becker & Green on

We invite you to view Employment Law This Week - a weekly rundown of the latest news in the field, brought to you by Epstein Becker Green. We look at the latest trends, important court decisions, and new developments that...more

Employment Law Navigator – Week in Review: December 22, 2015 #3

by Zelle LLP on

Last week, a federal judge in the Central District of California made big news when he found that “claims of sexual orientation discrimination are gender stereotype or sex discrimination” prohibited by Title VII of the Civil...more

Cybersecurity and Data Privacy and E-Discovery and Information Management: Second Circuit Draws Line Between Employees and Hackers...

by Bond Schoeneck & King PLLC on

Employers in New York face a heightened hurdle to holding employees legally accountable for theft and other misuse of company data after the Second Circuit’s recent decision in United States v. Valle. The Court has held that...more

The “Cannibal Cop” and Protection of Computerized Data

In an unusual criminal case, the Second Circuit Court of Appeals recently weighed in on an important question at the intersection of employment law and data security. The decision will likely have implications wherever...more

Will The CFAA, An Old Anti-Hacking Law, Apply To Password Sharing?

by King & Spalding on

David Nosal, an ex-employee of Korn Ferry International (“KFI”), convinced some of his former colleagues to download source lists from KFI using their log-in credentials and the log-in credentials of another employee. In...more

Disgruntled Former Tribune Company Employee Who Aided Hacking Convicted; Could Face Jail Time

by King & Spalding on

On October 7, 2015, former Tribune Company employee Matthew Keys was convicted of three felonies stemming in part from assistance he provided to the hacking collective Anonymous to alter content on the LA Times’ website. ...more

Beware the Feds: Emerging Risks to Health Care Executives Under the Yates Memo

by Reed Smith on

Last month’s “Yates Memo” from the Department of Justice (DOJ) promises to be a game-changer in the world of government investigations and enforcement activity. While several U.S. Attorney Offices had been applying many of...more

Blog: BEWARE: DOJ Announces New Policy to Increase Prosecutions of Individuals Involved in Corporate Fraud

by Cooley LLP on

Earlier this week, Deputy Attorney General (AG) Sally Quillian Yates issued a memorandum to Department of Justice (DOJ) attorneys discussing the need to hold individuals accountable for corporate wrongdoing in both civil and...more

Business E-mail Compromise Scam v2.0

In March, we reported on the Business E-mail Compromise (BEC) scam where criminals target employees responsible for wiring company money, and trick them into wiring money under false pretenses to fraudulent accounts...more

Massachusetts Appeals Court Set to Consider Scope of Employer Liability for Employee Data Breaches

Many of the highest-profile and headline-catching data breaches involve external breaches of a company’s electronic systems. But the reality that these headlines obscure is the fact that internal data breaches are generally...more

123 Results
|
View per page
Page: of 5
Cybersecurity

Follow Labor & Employment Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!