Science, Computers & Technology Electronic Discovery Labor & Employment

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Mobile Device Privacy Considerations for Employers

The use of mobile devices in the workplace, including cell phones, tablets, and other devices, has generated significant risks for employers, both in terms of data security and of litigation strategy. Access to these devices...more

Advanced Cyber Security Center Panel Explores Reasonableness in Cybersecurity

I had the pleasure of moderating an excellent panel at the Advanced Cyber Security Center’s annual conference on November 4. The panel’s topic for discussion was “What is Reasonable in Cybersecurity: Responsibility and...more

No Matter Where You Go, There You Are: How Employee Movements Cause Major E-Discovery Risk

We lose things. Keys, phones, remotes. When I was a kid, if I told my mom that I couldn’t find something, she’d reply, “If I go in your room and find it, you’ll be in big trouble,” so I’d rush back in and look everywhere...more

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

The Big Move Toward Big Data in Employment

The world of Big Data has arrived, and it is beginning to affect employers and their decision-making in ways undreamed of even a few years ago. Employers can access more information about their applicant pool than ever...more

FTC's New Consumer Data Security Guidance Offers Businesses Practical Tips

The Federal Trade Commission has issued new guidance on data security for companies that collect, store and use consumer information, gleaned from the more than 50 enforcement actions brought by the agency over the past...more

Federal Employees’ Personal Information Compromised by Data Breach

In recent headlines, the Office of Personnel Management (“OPM”) has begun notifying millions of federal employees that it may have lost their personal information earlier this month in a data breach. The data breach...more

Status Updates: Facebook Posts—Reliable Evidence?; Quora Post Costs Applicant a Job; a New Ephemeral Messaging App

Facebook: Fact or fiction? These days, courts are more and more frequently faced with disputes over whether, as part of the discovery process, a litigant should be entitled to view the opposing party’s social media posts. As...more

Data Encryption and Its Potential Effect on Litigation and Discovery

In September 2014, Apple introduced a new mobile-operating system called iOS8. iOS8 offers enhanced data-encryption protection to Apple users and the content stored on their mobile devices. Apple's advancements in...more

Bring Your Own Device (Everywhere): Legal and Practical Considerations for International BYOD Programs

The cross-use of mobile devices for personal and professional purposes, commonly referred to as “Bring Your Own Device” or “BYOD”, is a relatively recent phenomenon that has created a host of legal and practical challenges...more

Takeaways for Employers on the Hillary E-mail Debacle

5 Reasons Employers Should Prohibit Employees From Using Personal Email Accounts - Recently, a political firestorm has erupted as news stories revealed that Former Secretary of State (and likely Presidential Candidate)...more

Bring Your Own Challenges

From reliable surveys and less dependable anecdotes in most major markets, including the UK and the US, opinions point to the almost inevitable expansion of BYOD – Bring Your Own Device – as a cost-saving model for employers....more

Top 10 Technology Blunders for Employers

As one who presumably has no nude selfies, you may not be too concerned about a “hack” like the one that continues to afflict celebrities like Jennifer Lawrence and Kate Upton. But that doesn’t mean there aren’t still plenty...more

Are you—or someone you love—a content hoarder?

Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more

Brown v. Tellermate: Cloud-based Data and E-discovery

According to PC Magazine, “[i]n the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive.” Cloud-based computing has become a very popular tool...more

Obtaining German Works Council Approval to Collect Employee E-Mail and Electronic Documents Using EnCase® Enterprise and EnCase®...

German companies sometimes are required to collect data for legitimate business purposes, including for compliance, to investigate malfeasance, for adjudication of claims and to protect personal data of customers from misuse....more

BYOD: Party Essentials for Corporations and Employees

The need to stay connected these days applies not only to our social universe, but also to our business universe. The result is a trend known as “bring your own device” or “BYOD.” BYOD is the practice where employees use...more

Risky Business: "Bring-Your-Own-Device" And Your Company

Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more

Cybercrimes and the Workplace

This article discusses that, in addition to civil liability that employment lawyers tend to be alert for in departing employee scenarios, departing employees can also be criminally liable for theft, misappropriation, or other...more

The Challenge of Young Employees and Technology

Cisco’s 2011 Connected World Technology Report found that 70% of young professional employees disregard their employer’s technology policies on a regular basis. This presents significant litigation and public relations risks...more

Obtaining and Using Social Media in Litigation: Tips for the Employment Practitioner

Tips for obtaining social media during litigation, and using for your client's advantage....more

Socially Aware: The Social Media Law Update - Vol. 2, Issue 5 - October 2011

In this issue: NLRB Report Provides Guidance to Employers on Social Media Issues; Rough Waters: Repeat Infringer Policies and the DMCA Safe Harbors; What Every Company Should Know About E Discovery and Social Media; CDA...more

Using Social Media in Pre-Litigation Investigation

Pre-litigation practice pointers for locating, obtaining, and protecting the wealth of often-overlooked information that is voluntarily disclosed via social and other electronic media content. Published in the September 2011...more

Social Media: Too Powerful To Ignore (FBA-MD Newsletter)

This article, published in the June 2011 issue of the newsletter of the Maryland Chapter of the Federal Bar Association, discusses the powerful tool that social media has become. Social media is too difficult to ignore and...more

Your Workplace Computer Is A Lonely Public Roadway

According to the third district appellate court in Holmes v. Petrovich, 2011 DJDAR 671, your office privacy is a lonely public roadway. And where the limits are clearly posted, you had better obey—no matter what kind of...more

29 Results
|
View per page
Page: of 2

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×