Science, Computers & Technology General Business Labor & Employment

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

BYOD In Australia - Cool, Cheap And (Potentially) Catastrophic!

THE ALLURE OF THE POTENTIAL COST SAVINGS OF BRING YOUR OWN DEVICE PROGRAMS IS TOO GREAT FOR MANY AUSTRALIAN ORGANISATIONS TO RESIST. Not only do the financials of Bring Your Own Device (BYOD) programs look good (the...more

The Major Threat Presented by a Tiny Thumb Drive

In our modern, ever-electronic, workplace, it continues to become ever-easier for dishonest employees to help themselves to their employer’s most sensitive and valuable assets through wholesale electronic copying of...more

Psst, a 3rd party ethics reporting system benefits any organization

"... even popular social media platforms, but, sh, don't tell" - Kind of like confessions in a personal diary, Whisper is an app that lets users anonymously share their secrets with millions of others in acts of...more

Walgreens CFO Jettisoned After $1 Billion Forecasting Error

Walgreen Co. CFO Wade Miquelon and another high-ranking executive in the company were let go from their positions after the revelation of a $1 billion projection error affecting the corporation’s Medicare-related business....more

Massachusetts Tax Developments: A Reed Smith Quarterly Update (3rd Quarter 2014)

Welcome to the latest Reed Smith Massachusetts State Tax Quarterly Update. In this update, we’ll look back to the developments from the first half of 2014, and look ahead to market-based sourcing and other issues on the...more

Technology Leaders Forecast Survey 2014

EXECUTIVE SUMMARY - Tech Leaders Burst Bubble Talk: Execs See No Signs of Irrational Exuberance, Just Steady Growth Ahead - With a thriving tech economy, ballooning valuations and an IPO market humming at a...more

Making UK Employees Aware of the Perils of Pilfering Their Employers' Confidential Information

Employers need to appreciate and address the fact that employees who remove their employers’ confidential information often do not appear to appreciate the risks of being caught or the potentially very serious consequences of...more

Delaware Laws on Proper Destruction of Personal Identifying Information Take Effect in January

When companies that conduct business in Delaware make their 2015 New Year’s resolutions, they should be sure to add compliance with 6 Del. Code §§50C-101 - 50C -104 ( Section 50C) and 7 Del. Code § 736 (Section 736) to their...more

Business Litigation Alert: "When Employees Turn Into 'Hackers'"

Sometimes the Greatest Risk Comes from the Inside - Cybersecurity continues to be an issue that dominates the news. Much has been made of the cyber-risk US companies face from foreign countries and outsiders. However,...more

Cliff Notes from the Joint OCR/NIST HIPAA Security Conference

As a service to our readers, we have distilled last week’s joint HHS Office of Civil Rights (OCR) and National Institute of Standards in Technology (NIST) conference, “Safeguarding Health Information: Building Assurance...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security, Continued - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the...more

How To Avoid Common Data Breach Pitfalls

Cost of Data Breach in 2014: - $5.9 million U.S. average cost of a data breach - 15% Annual increase in the average cost of a data breach around the world - $201 Average cost paid for each exposed...more

Today's special - fraud, hammers and nails

"... the company was slow to respond to early threats and only belatedly took action." By now we've all heard about the latest credit card breach within Home Depot - that account information of 56 million cardholders...more

New “Job Creation Project” EDIP Credits to Boost Tech Jobs in Massachusetts

In the battle for tech jobs, Massachusetts has added a significant new element to its arsenal of incentives in the form of “job creation project” Economic Development Incentive Program (EDIP) credits. EDIP is a tax incentive...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the data...more

Are you—or someone you love—a content hoarder?

Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more

Workplace-Diversity Data Continues To Drive Awareness in Silicon Valley

The technology industry has been criticized in recent years for its lack of diversity in its mostly male workforce as advocates call on companies to be more transparent with their demographic information. Apple Inc. is one of...more

Private Ruling Endorses Taxpayer-Friendly Reading of “Qualified Small Business” Under Section 1202

On September 5, 2014, the Internal Revenue Service (“IRS”) released Private Letter Ruling 201436001 (the “Ruling”), which found that a company providing products and services primarily within the pharmaceutical industry was a...more

Business Associate Agreements May Require Amendment

The Omnibus Final Rule (the "Omnibus Rule") under the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), was issued in January, 2013 effective March 26, 2013, but with a general compliance deadline of...more

Court Was Wrong to Re-Write Covenants

In Prophet v Huggett [2014] ECWA Civ 1013, the Court of Appeal has overturned a recent decision of the High Court in which it had re-written a non-compete covenant to give it commercial effect. You may recall that we...more

How Website Operators Use CFAA To Combat Data-Scraping

“Web scraping” or “Web harvesting” — the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders” — accounted for 18 percent of site visitors and 23 percent of all...more

When Acting to Prevent Data Breaches and Comply with Privacy Laws, Remember Overarching Employee Rights

The grocery business may be “fresh and easy,” but drafting a confidentiality and data protection policy that withstands the scrutiny of the current National Labor Relations Board (NLRB) is not. The NLRB, in its recent 2-1...more

Quirky Question #240, Breach Notification Laws

Question: Our company has employees and operations in multiple states, and I’m concerned about complying with data breach laws in the various locales. What’s the status of the law on data break...more

My “Momma Bear” Is Coming Out: Cyber Bullies Prove Social Media Training Needs An Anti-Harassment Element

More than 50% of teens have experienced cyber bullying. Parents have historically looked to their children’s schools and local government to address the issue, but what about the social media sites which contribute to the...more

Risks of BYOD

Q: BYOD (Bring your own device) is standard for our employees. What, if any, are the risks for BYOD when compared to company-provided devices?...more

173 Results
|
View per page
Page: of 7

Follow Science, Computers & Technology Updates on: