Privacy Labor & Employment Science, Computers & Technology

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Are You Ready for the New Holacracy? Update on Social Media and the Hiring Process

The innovative folks at Zappos have eschewed the traditional job application/interview/job offer process for a social-media-driven process on a Zappos platform. While very up-to-date, does this push the envelope to the point...more

Business Associate Agreements May Require Amendment

The Omnibus Final Rule (the "Omnibus Rule") under the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), was issued in January, 2013 effective March 26, 2013, but with a general compliance deadline of...more

When Acting to Prevent Data Breaches and Comply with Privacy Laws, Remember Overarching Employee Rights

The grocery business may be “fresh and easy,” but drafting a confidentiality and data protection policy that withstands the scrutiny of the current National Labor Relations Board (NLRB) is not. The NLRB, in its recent 2-1...more

Quirky Question #240, Breach Notification Laws

Question: Our company has employees and operations in multiple states, and I’m concerned about complying with data breach laws in the various locales. What’s the status of the law on data break...more

My “Momma Bear” Is Coming Out: Cyber Bullies Prove Social Media Training Needs An Anti-Harassment Element

More than 50% of teens have experienced cyber bullying. Parents have historically looked to their children’s schools and local government to address the issue, but what about the social media sites which contribute to the...more

Employer Must Defend Against A Wrongful Death Lawsuit For Not Monitoring Employee Computer Use

An Illinois Appellate Court recently held that an employer must defend against a wrongful death lawsuit alleging that it was negligent in failing to investigate death threats that its employee had emailed to his family from...more

Wearable Devices in the Workplace Challenge Data Security and Privacy

Wearable devices, including health and activity monitors, video and audio recorders, location trackers, and other interconnected devices in the form of watches, wristbands, glasses, rings, bracelets, belts, gloves, earrings,...more

Week in Review

Significant electronic data breaches made headlines again this week. Supervalu announced that millions of customer credit card numbers were stolen at various stores. ...more

Bring Your Own Device Doesn't Mean Bring in Security Breach

Bring-Your-Own-Device (“BYOD”) policies have been picking up steam because of increased productivity, improved communications, and the need for employees to work remotely. However, when implementing any BYOD policy there are...more

4 Cases Where Security Awareness Training Could Have Saved The Day

I’m very excited about our upcoming webinar, “Cybersecurity 2014: The Impact on Global Companies,” with Lisa Sotto. She is a well known data privacy rockstar and will provide an overview of cybersecurity in 2014, the current...more

Federal Prosecutors Bring Criminal Charges against Individual for Alleged HIPAA Violation

Federal prosecutors in the Eastern District of Texas recently brought criminal charges under the Health Insurance Portability and Accountability Act (“HIPAA”) against a former East Texas hospital employee. The former...more

The Affordable Care Act—Countdown to Compliance for Employers, Week 21: Self-Funded Group Health Plans, the Affordable Care Act...

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) ushered in broad national standards aimed at improving the efficiency and effectiveness of the U.S. health care system. Referred to generically as...more

Employment Law Commentary -- Volume 26, Issue 7 July 2014 -- Building A Workforce Culture Of Data Security In The Post-Snowden Era

Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more

Data Privacy Law in the UK, Part III: Employment Background Checks and Monitoring

In parts one and two of this series summarizing data protection law in the United Kingdom, we looked at the data protection principles to which employers must adhere in relation to obtaining, holding, or disposing of personal...more

Three Security Awareness Training Findings That Will Surprise You

As providers of ethics and compliance training solutions, we never tire of discussing topics like anti-bribery training, sexual harassment training, code of ethics training… and so many more. Lately, we have seen a real...more

Riley v. California Advances Individual Privacy Rights in this Digital Age

Employee privacy rights may have received a boost from the U.S. Supreme Court at the end of this year’s term. In Riley v. California, the most recent in a series of criminal search and seizure cases involving technology, the...more

Going Mobile: The Risks and Rewards of a BYOD Program

Employees are increasingly using their personal electronic devices, such as laptops, smartphones, and tablets, for work purposes. The trend, dubbed “Bring Your Own Device” or “BYOD,” has redefined what it means to “be at...more

Data Privacy Law in the UK, Part II: Data Security and Restrictions on Data Transfers for U.S. Employers

The European Court of Justice’s decision in the Google case that it was required to remove links to “outdated” or “irrelevant” information about an individual has brought EU data privacy laws to the forefront of public...more

Five Lessons for Employers from California v. Riley

In the waning days of its current term, the U.S. Supreme Court ruled unanimously in California v. Riley that police officers generally violate the Fourth Amendment's prohibition against unreasonable searches by conducting a...more

A Whistleblower Hotline can protect against medical identity theft

Last year, medical identity theft affected nearly two million Americans - 32% more than the year before. This is a staggering number! And considering that today, medical identity theft accounts for 43% of all identity theft...more

Data Privacy Law in the UK, Part I: An Introduction for U.S. Employers

The recent high-profile decision by the European Court of Justice involving Google has highlighted the existence of stringent data privacy laws in the European Union (EU). However, although the Google decision was...more

Does Your Company Align Compliance Training To An Annual Ranking of Risks?

PwC came out with their annual State of Compliance survey, which is always well done, and has given me lots of fodder for upcoming blogs. I found the below illustration in the accompanying “chart pack” and found it...more

10 Tips for Creating a Successful BYOD Policy

The “bring your own device” (BYOD) trend has become the norm at many companies and viewed as a way to both save money and increase productivity. By allowing employees to use their personal smartphones, tablets and laptops to...more

Supreme Court Prohibits Warrantless Mobile Phone Searches, Underscores Individual Right to Privacy

The Supreme Court of the United States released a unanimous decision last week barring law enforcement from searching the mobile phones of individuals placed under arrest without first obtaining a search warrant or the...more

U.S. Supreme Court Cell Phone Privacy Decision Deserves Employer Attention

In a unanimous decision, the U.S. Supreme Court ruled this week in Riley v. California that police generally may not conduct a warrantless search of digital data stored on the cell phone of someone who has been arrested. The...more

300 Results
|
View per page
Page: of 12

Follow Privacy Updates on: