News & Analysis as of

Labor & Employment Science, Computers & Technology Privacy

Read need-to-know updates, commentary, and analysis on Labor & Employment issues written by leading professionals.

The EC New Alert Mechanism to Detect Cartels: A Teaser Before a European General Framework for Whistleblowing

Whistleblowing has been part of the U.S. legal tradition, if not since the resolution passed by the Continental Congress in 1778, at least since the adoption of the 1863 False Claims Act. With regard to the disclosure of...more

Littler Global Guide - Philippines - Q1 2017

by Littler on

Persons With Disabilities May Now Be Declared as Dependents for Tax Purposes - Enacted Legislation - Republic Act No. 10754, enacted on March 23, 2016 and effective on December 23, 2016, expanded the benefits of...more

A New Employment Law Frontier: Illinois' Biometric Information Privacy Act

by Holland & Knight LLP on

An emerging area of the law has become the focal point in a new class action lawsuit pending in the U.S. District Court for the Northern District of Illinois. In Baron v. Roundy's Supermarkets, Inc., et al. (No....more

Employers: Are You Ready for a Cyberwar? Attackers Using Ransomware are Saying Show Me Your Bitcoin!

by Dechert LLP on

Recently, the WannaCry ransomware attack impacted 150 countries and over 300,000 computers. Not all ransomware attacks are so massive but they all are fast moving and require swift action to prevent destruction and lose of...more

Protecting Intellectual Property from Employee Theft

by Revision Legal on

Business owners who, after an employee dispute or after terminating an employee, have been the victims of intellectual property theft often contact us. Often, the solutions to this problem can be incredibly costly. Here are...more

Update: Case Involving Sharing Of Passwords May Be Headed To The Supreme Court

by Jackson Lewis P.C. on

Last August, we reported on a Ninth Circuit case in which a former employee was convicted of a crime under the Computer Fraud and Abuse Act (“CFAA”) for accessing and downloading information from his former company’s database...more

Compliance’s Role in Preventing the Next “WannaCry” Cyberattack

by NAVEX Global on

The global chaos unleashed by the WannaCry ransomware virus reinforces that cyberattacks are not just the problem of IT departments. Compliance must play an integral part of any organization’s cross-functional cybersecurity...more

Helping To Protect Your Company From A Cyber-Attack: Eight Tips For Human Resources Professionals And In-House Employment Counsel

by Littler on

Recent, highly publicized data security incidents highlight the continued vulnerability of corporate information systems. Notably, employees who fall prey to sophisticated phishing e-mails and other scams often contribute to...more

Top 10 Issues for Employers, Issue #9: Personal Employee Information

This is the ninth instalment in our Top 10 Issues for Employers series. This instalment addresses privacy risks and best practices for employers with respect to the management of personal employee information. OVERVIEW...more

Employment Law Navigator – Week in Review: May 2017 #3

by Zelle LLP on

On Friday of last week, a ransomware cyberattack struck 45,000 targets in 74 countries, including organizations such as FedEx, Telefonica, and the UK’s National Health Service, which cancelled operations and diverted patients...more

Employers Take Note: Regulations on the Use of Biometric Data

by Fisher Phillips on

The use of biometric data is continuously increasing, including in the workplace. Biometric data may include facial characteristics, hand geometry, a retina/iris scan, a fingerprint or a voiceprint. Employers often collect...more

Company Awarded Damages After Former Employee Hacks Its Systems And Hijacks Its Website

by Jackson Lewis P.C. on

A company can recover damages from its former employee in connection with his hacking into its payroll system to inflate his pay, accessing its proprietary files without authorization and hijacking its website, a federal...more

Franchising Update

by K&L Gates LLP on

Many franchisors and other participants in the franchising sector are anticipating with concern the outcome of The Fair Work Amendment (Protecting Vulnerable Workers) Bill 2017 (Bill) which was introduced into the Federal...more

Employees Most Likely to Discover Data Security Breaches

by Revision Legal on

One thing that all data security breaches have in common is that someone must first uncover the breach and then reveal the breach to the appropriate parties (i.e., employers, law enforcement, other appropriate state and...more

How a Drone Could Save a Life at an Industrial Jobsite

According to the Occupational Safety and Health Administration (OSHA), 4,836 workers were killed on the job in 2015—that means, if you break it down, that more than 90 workers lost their lives each week on jobsites. These...more

Q: Could You Be Dragged Into Court For A Company Data Breach? A: It Depends

by Fisher Phillips on

This same time last year, many in the business community were eagerly anticipating the U.S. Supreme Court’s ruling in Spokeo, Inc. v. Robins, which was to decide the standard that should be applied to determine whether...more

It Lurks in the Last Place You Look – Preventing (or at Least Mitigating) Employee Data Leakage

by BakerHostetler on

Outside hacking attacks grab headlines. Data breach concerns cause sleepless nights within the C-suite of many organizations. And ransomware strikes fear into companies without sound backup practices and true Information...more

Computer Surveillance by Employers: Finding the Balance between Business Interests and Employee Privacy Rights

by Dickinson Wright on

As the use of computers and computer activity becomes more pervasive in the workplace, employers are facing new challenges. Generally speaking, greater network connectivity should be welcomed by employers. However, the use of...more

HIPAA Refresher for Workplace Wellness Programs

Now more than ever, workplace wellness programs are becoming increasingly popular among employers. A common concern many employers have is how to design a meaningful workplace program intended to improve the health of...more

What To Do When You Hire A Thief

by Foley & Lardner LLP on

Employers victimized by trade secret misappropriation appropriately express righteous outrage, both at the offending ex-employee and sometimes at the new employer. However, on another day the roles can reverse: That same...more

Security Breach Notification Becomes More Complex For Employers

by Littler on

With new and sophisticated schemes perpetrated by hackers and scammers, and sensitive personal information becoming increasingly accessible to numerous insiders, it is only a matter of time before most employers will be...more

Real Answers to Common Questions on Cybersecurity

by NAVEX Global on

Q: In my company, the IT directors see cybersecurity as an IT and software issue to be solved with software and hardware. How do I convince the team that employees need to also be trained on risky behavior – something that...more

Data Breach Risks for 401(k) and Retirement Plans

by Jones Day on

There has been a recent spike in attacks on 401(k) and retirement plans by cyber criminals. Some have been reported publicly, and we are aware of several nonpublic incidents as well....more

Defending Against Social Engineering Attacks

by Fisher Phillips on

The term “social engineering” used to conjure up images of social scientists with Ph.D’s brainstorming ways to improve race relations or provide lower income groups with greater access to education and employment...more

How Policies Can Defeat a Breach of Contract Claim

Here is an interesting scenario for employers to consider. A company discovers that an employee working in information technology has taken de-commissioned company computers for himself and even given some away. After...more

717 Results
|
View per page
Page: of 29
Cybersecurity

Follow Labor & Employment Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!