Science, Computers & Technology General Business Labor & Employment

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

SDNY Awards Front Pay in Sarbanes-Oxley Whistleblower Retaliation Case

Perez v. Progenics Pharmaceuticals, Inc., involved a case where Plaintiff Perez drafted a memo to Progenics’ general counsel and his department head, accusing Progenics of committing fraud by publishing a false press release...more

Paying for software development? Make sure you own it!

In a digital society dominated by the saying, “there’s an app for that,” copyright protection is essential. Paying to have a work created does not automatically vest ownership of the copyright in the paying party. When making...more

Pokémon GO Exposes Risks of Bring-Your-Own-Device (BYOD) Policies

There’s no denying it: Pokémon GO is a phenomenon. The smartphone game, in which players use their mobile device camera and GPS to capture, battle, and train virtual creatures, was released in the United States on July...more

Technology companies: Are your employment policies due for a reboot?

At any particular time, a technology company may devote all of its time and attention to an urgent development project, an investor pitch or closing a round of financing. Those activities certainly make for good press and...more

Food and Beverage Law Update: August 2016

When food and beverage companies think of their largest risks, data breaches have not historically come to mind, but this is changing because of reports in the past few months of major breaches by companies such as Noodles &...more

Employment Law This Week®: Executive Incentive Pay Rule, Race Discrimination, Pokémon Go, Commercial Non-Competes [Video]

We invite you to view Employment Law This Week® - a weekly rundown of the latest news in the field, brought to you by Epstein Becker Green. We look at the latest trends, important court decisions, and new developments that...more

Can Using Social Media Lead to a Lawsuit?

In an era where technology is not only constantly evolving, but prevalent in nearly every aspect of our lives, it is only fitting to discuss the legal implications of social media. This includes everything from defamation...more

Ninth Circuit Interprets “Without Authorization” under the Computer Fraud and Abuse Act

When we last left David Nosal, he had escaped liability under the Computer Fraud and Abuse Act after convincing some of his former colleagues at executive search firm Korn/Ferry to use their log-in credentials to download...more

Five Trending Challenges Facing Employers in the Technology, Media, and Telecommunications Industry

Employers in the technology, media, and telecommunications industry continue to face numerous workplace management and compliance challenges under changing laws. From evolving mandates regarding benefits and momentum toward...more

BDO’s 2016 Manufacturing Risk Factor Report

The 2016 BDO Manufacturing RiskFactor Report examines the risk factors in the most recent 10-K filings of the largest 100 publicly traded U.S. manufacturers across five sectors including fabricated metal, food processing,...more

EU Commission Adopts EU-U.S. Privacy Shield

On July 12, 2016, the European Commission formally adopted the EU-U.S. Privacy Shield to replace the previously invalidated Safe Harbor Framework as an adequate method of transferring personal data from the European Economic...more

How to Prepare for Theft of Company Information

Companies should take three steps now to ensure use of the Defend Trade Secrets Act. In May, President Barack Obama signed into law the Defend Trade Secrets Act that creates a federal civil cause of action for the...more

Client Alert: Brexit – What Silicon Valley Needs to Know

The vote of the UK Electorate to leave the EU has politicians, economists, lawyers and commentators from all sectors speculating on what will happen next and over exactly what period. While it is unlikely that there will be a...more

Back to the future: The digital disruption debate

Video killed the radio star…or did it? In its most recent research paper analysing the effects and possible responses to digital disruption, the Productivity Commission observes that with each wave of change “speculation...more

Pied Piper Is Like Empty Tables, and Empty Chairs (Silicon Valley – Episode 27)

“Not much to report this week, dear readers! Everything is perfectly fine.” Or so says Jared. But as Gilfoyle is quick to point out, “That’s a lie.” The problem is that even though the Pied Piper product has incredible...more

BREXIT = BEXIT? Will Global Business based in London Exit and Move Base Operations to Paris or Frankfurt – a “BEXIT?”

With UK’s surprise vote last Thursday to leave the EU, politicians, businessmen and women and pundits are scrambling to understand and predict the ramifications of the UK withdrawal, and there will be many. Of particular...more

Tennessee Updates Data Breach Notification Law

The State of Tennessee recently amended its data breach notification statute, Tenn. Code Ann. § 47-18-2107, which is set to go into effect on July 1, 2016. Numerous commentators have proclaimed that the amendment marks a...more

It’s Back for Spring 2016: The Annual Verizon Data Breach Investigations Report

Last year around this time we examined the results of Verizon’s annual Data Breach Investigations Report (DBIR). As in year’s past, Verizon analyzed the data it received from companies across the country about security...more

Five Steps to Guarding Your Trade Secrets

Have you ever wondered what makes your Coke and KFC wings taste so marvelous? While many do wonder, the true recipes have never been revealed. The Coca Cola formula and KFC recipe are two of the most valuable, closely-guarded...more

Hacked and Left Holding the Bag - Cyber Liability Issues

If you read any newspaper, trade publication or twitter feed, you know that ongoing concerns regarding cyber security continue to grow. We have seen an article in the New York Times discussing hacking of major law firms with...more

Most Frequently Hacked Industries Now Includes Manufacturing

Second only to health care, the manufacturing industry is now one of the most frequently hacked industries (according to IBM’s 2016 Cyber Security Intelligence Index). And more importantly, automotive manufacturing was the...more

What Start-Ups, Tech Companies and Marketers Need to Know About the New Overtime Rules

You may have heard about new overtime rules from the Department of Labor. It’s not all about bathroom laws. Michael Kelsheimer, author of the Employer Handbook, broke down the new rules in Federal Changes to Overtime...more

Here’s Another Fine Mess You’ve Gotten Me Into: Best Practices for Employee, Contractor and Consulting Agreements.

In This Presentation: Overview of Messes to Avoid: • Split Ownership • Agreements to Agree • Agreements with Unclear/Improper: – relation to prior agreements – term – royalty rate –...more

Immigration Laws Stifle US Business

US immigration laws have not been created with the growing global economy’s need for foreign talent in mind, and should be reformed to promote hiring the best minds for the US economy. With globalization of the modern...more

Employers Face Exposure for Cyberbreaches

A newly filed lawsuit in California and a recent decision from the U.S. Court of Appeals for the Seventh Circuit serve as reminders to employers that the protection of sensitive employee information from cyberthreats remains...more

269 Results
|
View per page
Page: of 11

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×