Privacy General Business Labor & Employment

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Data Privacy Challenges & Considerations for Cross-Border Ethics & Compliance Investigations

What investigators need to know—and do—to adhere to data privacy laws relating during ethics and compliance investigations. Investigations of potential misconduct can be taxing for any organization. But for...more

15 Things To Do To Protect Value After April 15

April 15, a date that lives in infamy. That is what FDR said about December 7, 1941, but many people feel the same way about April 15, also known as “Tax Day”. No one likes paying money to the IRS, even those persons who...more

Toss or Keep Document Retention in a Hospital Setting

Deciding how long to hold on to specific records in your hospital can be a challenging task, especially when the facility deals with so many different types of records. You may be tempted to hold on to everything indefinitely...more

Seven Training Imperatives to Address Your Biggest Cyber Security Risk: Employee Behavior

One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more

10 Tips for Fostering a Business Culture of Cybersecurity Awareness

Businesses are recognizing the need for new approaches to data security as high-profile cybersecurity incidents reveal the true impact a data breach can have on an organization. One of the biggest realizations is that IT...more

Employee Handbooks Should Be Reviewed in Light of NLRB Report

Your employee handbook may be unlawful. That’s the takeaway from a 30-page report issued by the National Labor Relations Board’s Office of the General Counsel on March 18, 2015....more

A Different Kind of Data Breach—Loss or Disclosure of Company Information by Employee Theft

Data breaches are all over the news, but those stories most often cover high-profile cybersecurity breaches that result from the malicious efforts of hackers or other outsiders. Just as insidious, and more likely to occur,...more

Workplace Privacy: What Every CCO Needs to Consider

Most of us go through our daily lives unthinkingly assuming that our actions, movements and conversations are private. However, in today’s high tech and connected world, that is no longer the case. If you drive a car, carry a...more

Developments & Predictions for the 2015 Proxy Season

In a January 2015 webcast, Latham & Watkins partners Jim Barrall, global Co-chair of the firm's Benefits and Compensation Practice, and Steven Stokdyk, global Co-chair of the firm's Public Company Representation Practice,...more

Five 2015 Corporate Compliance / Litigation Issues Manufacturers Need To Keep An Eye On

It is our annual tradition at the beginning of each year to report on significant issues that face manufacturers/distributors in the year ahead.  Two weeks ago, Matt reported on significant issues in the labor/employment...more

Business Law Newsletter - January 2015

In This Issue: - FirstPay Decision: IRS Bests Trustee in Local Tax Case - Privacy Policies for Mobile Apps: One Size Does Not Fit All - Trademark Fees are Decreasing - Excerpt from Trademark Fees are...more

Expect Focus - Spot The Regulator, Volume IV, Fall 2014

In This Issue: - IN THE SPOTLIGHT ..Crisis Management: Five Steps to Take Before Providing That Comment - LIFE INSURANCE ..Third Circuit Limits ERISA Fiduciary Liability to those with Ultimate...more

Government Contracts Quarterly Update - January 2015

The Government Contracts Quarterly Update is published by BakerHostetler’s Government Contracts Practice team to inform our clients and friends of the latest developments in federal government contracting. Topics in...more

Sizing Up Cyber Risks after the Sony Breach

Sony’s most recent data breach underscores the difficulties in underwriting and insuring cyber risk. Sony incurred losses that were surprising in both their scope and type. The company already is a defendant in at least four...more

2015 Hot Topics for Multinational Companies

As we enter the New Year, Littler's international practice has identified a number of key employment and labor law issues for multinational companies (MNCs). The past year has brought to the fore some challenging issues...more

Enforceability of Confidentiality Agreements – Confidential Information Must Be “Confidential”

For many companies, entering into confidentiality or non-disclosure agreements is common practice when sharing confidential or proprietary information with third parties. However, as the recent case nClosures, Inc. v. Block...more

Updating IT and BYOD Policies to Reflect CASL Software Notification Requirements

On January 15, 2015, the software provisions in Canada’s Anti-Spam Legislation (CASL) will come into force, creating significant prohibitions and requiring consent to, among other things, install software, change device...more

Privacy Alert: Privacy Lessons Learned From Uber

It’s not just health care companies, credit card companies, or big box retailers that need to be careful when it comes to privacy. Any company collecting user data from mobile apps—including geolocation data, user address...more

Texas Supreme Court weekly orders (11/14)

In its weekly orders (11/21/14), the Texas Supreme Court issued five new opinions and granted review in three cases. Click here to read the order list and find the opinions....more

BYOD In Australia - Cool, Cheap And (Potentially) Catastrophic!

THE ALLURE OF THE POTENTIAL COST SAVINGS OF BRING YOUR OWN DEVICE PROGRAMS IS TOO GREAT FOR MANY AUSTRALIAN ORGANISATIONS TO RESIST. Not only do the financials of Bring Your Own Device (BYOD) programs look good (the...more

Data protection obligations on banks into force in Italy

The Italian Data Protection Authority issued regulations introducing new relevant data protection obligations for banks in the processing of customers’ personal data by their employees aimed at monitoring the transfer of...more

Making UK Employees Aware of the Perils of Pilfering Their Employers' Confidential Information

Employers need to appreciate and address the fact that employees who remove their employers’ confidential information often do not appear to appreciate the risks of being caught or the potentially very serious consequences of...more

Delaware Laws on Proper Destruction of Personal Identifying Information Take Effect in January

When companies that conduct business in Delaware make their 2015 New Year’s resolutions, they should be sure to add compliance with 6 Del. Code §§50C-101 - 50C -104 ( Section 50C) and 7 Del. Code § 736 (Section 736) to their...more

Business Litigation Alert: "When Employees Turn Into 'Hackers'"

Sometimes the Greatest Risk Comes from the Inside - Cybersecurity continues to be an issue that dominates the news. Much has been made of the cyber-risk US companies face from foreign countries and outsiders. However,...more

Cliff Notes from the Joint OCR/NIST HIPAA Security Conference

As a service to our readers, we have distilled last week’s joint HHS Office of Civil Rights (OCR) and National Institute of Standards in Technology (NIST) conference, “Safeguarding Health Information: Building Assurance...more

149 Results
|
View per page
Page: of 6

Follow Privacy Updates on:

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×