Labor & Employment Science, Computers & Technology Privacy

Read need-to-know updates, commentary, and analysis on Labor & Employment issues written by leading professionals.
News & Analysis as of

Reputation Matters: Don’t Lose Opportunities Due to Inaccurate Personal Data

Consumers may be injured by inaccurate data that they cannot review or correct. There’s a hole in the bucket, dear Congress. The children’s song, “There’s a Hole in the Bucket,” exemplifies the conundrum many consumers...more

EU Data Protection reform – six top tips for pension scheme trustees

After more than four years of negotiations, the new EU data protection framework has finally been agreed. Following a two-year transition period, the General Data Protection Regulation (GDPR) will apply in all member states...more

Employment Law Navigator – Week in Review: June 2016 #3

Last week, cybersecurity was a big issue. Fortune reported that the average cost of a data breach is $4 million, and Inc. explained that even mom-and-pop shops can be victims of a hack. HR Examiner framed the discussion a...more

Data Security Safeguards Can Help Healthcare Employers Withstand Cyberattacks—and Government Audits

The last couple of years have brought a steady rain of bad news for the healthcare industry when it comes to data security: Insurers faced with massive data breaches affecting thousands of health plans and millions of...more

Tennessee Updates Data Breach Notification Law

The State of Tennessee recently amended its data breach notification statute, Tenn. Code Ann. § 47-18-2107, which is set to go into effect on July 1, 2016. Numerous commentators have proclaimed that the amendment marks a...more

How employers can stop departing employees taking client lists with them

When an employee departs for a role with a competitor, there is often a risk that the employee might take confidential client details with them, with potentially damaging consequences for the employer. However, a recent court...more

Privacy Tip #39 – Be Wary of IRS Phone Scams

Although the IRS has warned taxpayers on multiple occasions about IRS phone scams, consumers continue to be victims. A lucrative scam for years, which according to the IRS, has cost victims more than $26 million since 2013,...more

The Paper Trail: The Potential Data-Breach Sitting in your Printer

In April 2016, the sensitive personal medical information of NFL players was stolen from the car of a trainer who had left the files in a backpack in his locked car. In 2014, Safeway, Inc. settled charges brought by the...more

Mobile Device Privacy Considerations for Employers

The use of mobile devices in the workplace, including cell phones, tablets, and other devices, has generated significant risks for employers, both in terms of data security and of litigation strategy. Access to these devices...more

Employee Error Accounts for Most Security Breaches

A recent study by a well-known information security company captures one of the most common information security fallacies: that information security is a technology problem. Most businesses view mitigating information...more

ERISA and Cybersecurity

Employee benefit plan data stored online may include participants’ names and Social Security numbers, account information and protected health information (PHI), all of which are inviting targets for hackers....more

HHS Releases HIPAA Privacy and Security Audit Guidelines as it Starts its Second Round of Audits and Continues Enforcement Efforts

During April 2016 the Department of Health and Human Services (“HHS”) posted lengthy audit guidelines for HIPAA Privacy and Security on its website (over 400 pages). As HHS starts its audits of health care providers, health...more

Innocents Abroad: Lost laptop with customer data

Carrie, A couple of weeks ago, you wrote me about an employee who will be engaging in a six-month temporary assignment around Europe to scope market opportunities. The employee was Abbie Absent-Minded. Well, we hit a...more

Experian sponsors Ponemon study on data breach

Experian Data Breach Resolution sponsored a recently released Ponemon Study entitled “Managing Insider Risk through Training & Culture.” The report is quite timely in light of all of the recent successful W-2 phishing...more

It’s Back for Spring 2016: The Annual Verizon Data Breach Investigations Report

Last year around this time we examined the results of Verizon’s annual Data Breach Investigations Report (DBIR). As in year’s past, Verizon analyzed the data it received from companies across the country about security...more

Milwaukee Bucks become latest victim to w-2 phishing scheme

We have been repeatedly warning our clients and readers about the massive and successful W-2 phishing schemes where hackers impersonate the CEO or CFO and send emails to payroll and/or HR folks in companies requesting W-2...more

Right to Privacy in Disciplinary Proceedings

In Garamukanwa v Solent NHS Trust UKEAT/0245/15, the Employment Appeal Tribunal (EAT) considered whether an employee had a reasonable expectation of privacy in respect of material on his mobile phone during disciplinary...more

Hacked and Left Holding the Bag - Cyber Liability Issues

If you read any newspaper, trade publication or twitter feed, you know that ongoing concerns regarding cyber security continue to grow. We have seen an article in the New York Times discussing hacking of major law firms with...more

Health Care Employees at the Frontline in The Battle Against Ransomware

As recent noteworthy attacks have shown, no health care organization or provider is safe from ransomware threats, and the results of an attack can be devastating. Ransomware is a virus which limits or eliminates access to...more

Germany Issues Privacy Guidelines for Employer Access to Employee Email and Internet Use

Can employers look at the company email accounts of employees, such as when they do not show up to work? Can employers monitor employee Internet use during working hours? Can employers read employee emails if they use the...more

Employment Law Reporter - May 2016

The Age of The Data Breach : The Top 5 Best Practices - What will you do? We live in The Information Age. Increasingly, business success depends on the ability to obtain, maintain and intelligently utilize increasing...more

Employee Data Security: Perquisite or Prerequisite?

One of the many costs of doing business in this day and age is the threat of a data breach. In the past several years data breach incidents have occurred with increasing frequency. From Target to eBay and Sony to Ashley...more

Privacy Tip #35 – Employees still careless—don’t be that employee

According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more

LinkedIn admits that 2012 data breach in fact affected 117 million users’ data

A LinkedIn data breach in 2012 supposedly exposed 6.5 million LinkedIn users’ hashed passwords. LinkedIn announced yesterday (May 18, 2016) that in fact, it impacted more than 177 million user accounts, and that the...more

Big Data, Background Checks, and Discrimination

On May 4, 2016, the White House released a report entitled “Big Data: A Report on Algorithmic Systems, Opportunity, and Civil Rights” to herald its focus on discrimination in “big data” assisted personnel screening...more

579 Results
|
View per page
Page: of 24

Follow Labor & Employment Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×