Privacy Labor & Employment Business Organization

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Agreement on Safe Harbor Replacement, the New EU-U.S. Privacy Shield: Considerations for HR Departments

Our winter 2016 edition of the Employment Law Briefing Newsletter discussed the implications of the Court of Justice of the European Union’s (CJEU’s) decision to invalidate the Safe Harbor framework. Concern about the lack of...more

The Problem With Data Security is not the Hardware or the Software, It’s the Wetware

Remember this? - “Wetware” – coder slang for biological life forms (i.e., people) – is the weak link in most companies’ data security protections, according to a new data security report issued by the Association of...more

Legal Issues Business Leaders Need to Know in 2016

A compilation of time-sensitive and trending legal and regulatory issues that general counsels and business leaders should be aware of in 2016. ...more

Game of Phones: Employer-Issued Smartphones and Employee Fifth Amendment Protections

A recent court decision holding that employees can claim the Fifth Amendment and refuse to unlock password-protected smartphones, even though the phones were issued by their employer for company business, demonstrates the...more

Securities and Corporate Governance Litigation Quarterly

Welcome to the fifth issue of Securities and Corporate Governance Litigation Quarterly, Seyfarth’s quarterly publication of the Securities & Financial Litigation Group focusing on decisions or other items of interest for...more

Preview of NAVEX Global’s 2015 Ethics and Compliance Virtual Conference

As 2015 draws to a close (where did the time go?), the 2016 planning season is in full swing. You likely already have an idea of initiatives you’ll want to tackle, but taking your ethics and compliance program to the next...more

5 Questions to Ensure Your Policies Keep Up With the Pace of Change

You hear a lot these days about the ways that individuals’ private data is collected and potentially exposed—to technology companies, employers, the government and so on. You hear less about the concern of many employers, who...more

Cybersecurity and Risk Management: “Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers”

A timely new resource for business executives, technology professionals, and lawyers alike is the newly-published Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers from the New York...more

9 Things Employees Should Do to Prevent Data Breaches

Avoiding employee mistakes that lead to inadvertent failures will free up valuable resources to fight the bad guys—and may save your job. ...more

Florida’s CADRA a Powerful New Data Protection

Florida businesses will soon have an important and powerful new legal cause of action to combat unauthorized access to protected computer systems or data by employees, former employees, directors, officers, and others....more

Are Your Trade Secrets Safe?

A few years back, we had a client – a manufacturing business – that decided to sue an ex-employee for stealing its trade secrets. Our client had developed a process that was unique. Using this process, it was able to...more

Popular Cybersecurity Reads on JD Supra

From latest data breach laws to cyber liability insurance to the FTC's consumer data safety guidance ... a recap of popular cybersecurity reads on JD Supra during the second half of July 2015....more

Corporate Espionage is Real

Last month the country learned about the unauthorized access of the Houston Astros “Ground Control” database, which contained trade talks, proprietary statistics, and scouting reports, by members of the St. Louis Cardinals...more

Twitter Terrorism: Criminals Choose the Hack Attack

In what appears to be yet another brazen demonstration of capability following an earlier hijack of government social media sites, a group calling itself the Syrian Electronic Army (SEA) recently hacked into the U.S. Army’s...more

What Employees Need to Know about IP Protection

Do your employees understand the importance of intellectual property (IP) to your company and steps that they should be taking to protect it? Do they recognize that exposing proprietary information, such as product...more

Rise of the Video Vigilantes: Handling Secret Workplace Recordings

Video vigilantes are on the rise, and their recordings can quickly go viral. What should employers do to prepare for, handle and prevent covert recordings made in the workplace? Just a few short years ago HR and...more

7 Important Considerations for European Hotlines

As any organization that operates internationally knows, there are varying levels of data protection that are implemented from country to country. The idea is to share data in a manner that also protects personal privacy and...more

Cybersecurity Workforce Measures Present Business Opportunities

As part of the federal government’s efforts to address cybersecurity needs in our age of state-sponsored hacking and other high-profile data breaches, the Department of Homeland Security (DHS) will soon undertake a...more

Goal? Identify Rogue Employees Before They Misbehave. Means? Computer Algorithm. Impact? TBD...

In an attempt to weed out bad actors before they act, JPMorgan Chase & Co. is implementing a computer surveillance program to identify potential problem employees. Here's a legal perspective on the initiative from Keith...more

Securities and Exchange Commission: Critical Issues Facing Public Companies

Latham & Watkins partners William Baker, Alexander Cohen, Joel Trotter and Lawrence West hosted a webcast “Securities and Exchange Commission: Critical Issues Facing Public Companies.” Topics discussed included the increasing...more

Effective cybersecurity: 8 questions for you and your team

Cybersecurity has become a top-tier risk for US and multinational organizations. It is only a matter of time before a determined hacker will penetrate your organization’s system and successfully exfiltrate some data. (Indeed,...more

What Obama's Proposed Anti-Hacking Legislation Means for Entrepreneurs

The slew of highly publicized data breaches over the past few years has brought the issue of cyber-security truly to the mainstream -- most recently reaching our living rooms through President Barack Obama’s State of the...more

Health Care Update - December 2014 #4

Let’s Get to Work: OIG Releases 2015 Work Plan, Focusing on Long-Term Care and Health Reform - The U.S. Department of Health and Human Services (HHS)--Office of Inspector General (OIG) released its 2015 Work Plan (Work...more

When Tech Innovation Outpaces the Law, A Minefield Of Workplace Issues in Social Media

Part of JD Supra's series on innovation and the law. The NLRB has famously struck down employers’ social media policies based on a law that was adopted during the New Deal and has not been amended since....more

Nothing Personal: How to be Smart About Your BYOD Workplace Policy (And Why It Matters!)

You might think people are making more out of BYOD than it deserves, that it is a relatively benign issue. Alas, you’d be wrong....more

54 Results
|
View per page
Page: of 3

Follow Privacy Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×