News & Analysis as of

Science, Computers & Technology Labor & Employment General Business

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Compliance’s Role in Preventing the Next “WannaCry” Cyberattack

by NAVEX Global on

The global chaos unleashed by the WannaCry ransomware virus reinforces that cyberattacks are not just the problem of IT departments. Compliance must play an integral part of any organization’s cross-functional cybersecurity...more

Second Circuit Identifies Outer Limits of NLRA-Protected Speech

The National Labor Relations Act (NLRA) generally prohibits employers from retaliating against employees based on their union-related activities or for taking concerted action to improve the terms and conditions of their...more

Harvesting Innovation: 3 Tips for IP Managers

If you have ever gone apple picking in late season, you may recall seeing more apples on the ground than on trees. As you begin picking apples, you realize why. You haphazardly grab and yank an apple off a branch and the...more

Franchising Update

by K&L Gates LLP on

Many franchisors and other participants in the franchising sector are anticipating with concern the outcome of The Fair Work Amendment (Protecting Vulnerable Workers) Bill 2017 (Bill) which was introduced into the Federal...more

Employees Most Likely to Discover Data Security Breaches

by Revision Legal on

One thing that all data security breaches have in common is that someone must first uncover the breach and then reveal the breach to the appropriate parties (i.e., employers, law enforcement, other appropriate state and...more

It Lurks in the Last Place You Look – Preventing (or at Least Mitigating) Employee Data Leakage

by BakerHostetler on

Outside hacking attacks grab headlines. Data breach concerns cause sleepless nights within the C-suite of many organizations. And ransomware strikes fear into companies without sound backup practices and true Information...more

What To Do When You Hire A Thief

by Foley & Lardner LLP on

Employers victimized by trade secret misappropriation appropriately express righteous outrage, both at the offending ex-employee and sometimes at the new employer. However, on another day the roles can reverse: That same...more

How Policies Can Defeat a Breach of Contract Claim

Here is an interesting scenario for employers to consider. A company discovers that an employee working in information technology has taken de-commissioned company computers for himself and even given some away. After...more

Will Workplaces Be Going Off The Rails On The Blockchain?

by Fisher Phillips on

What if I told you that technology with internet-like potential will soon lead to a seismic revolution in our society, including the workplace? That you could greatly streamline your hiring process, eliminate...more

The Importance of Getting Inventorship Right: A Cautionary Tale in Two Cases

U.S. patent law elevates the importance of “the inventor” to an extent unseen in the rest of the world. Unlike many other countries, ownership of patent applications in the United States initially vests in the inventors...more

Top Board Concerns Heading into 2017 Remain a Hot Topic

by Snell & Wilmer on

Each year, a number of surveys and commentators describe and predict the trending topics of interest and importance to boards of directors in the for-profit and non-profit sectors. As we wrap up the first quarter of 2017, it...more

2016 Class Action Year-End Review

by BakerHostetler on

We are pleased to share BakerHostetler’s 2016 Class Action Year-End Review, which offers a summary of key developments in class action litigation during the past year. Class action litigation moved to the forefront of the...more

Watch for the Fox in Your Henhouse: Gig Companies at Risk

by Fisher Phillips on

Intellectual property threats (IPT) to companies participating in the gig economy may be greater than those experienced by traditional business. While this may seem self-evident to some, reflection on the matter confirms to...more

A Startup Attorney’s Tips to Advance Private Company Diversity

by Fenwick & West LLP on

One of the biggest contributors to a lack of corporate diversity is the size of a company. And the problems are often traceable to the company’s leanest, earliest days. One of my key messages to clients is that it’s never too...more

SEC Charges More Public Companies for Confidentiality Agreements That Might Deter Whistleblowers

by Hinshaw & Culbertson LLP on

In the past two years, the SEC has charged six public companies with violating SEC Rule 21F-17, which prohibits confidentiality agreements that could impede employees from making whistleblower claims directly to the SEC....more

“W-2 Phishing Attacks Targeting Businesses to Cash in on Busy Tax Season: 10 Tips to Protect Your Business”

by Sedgwick LLP on

Cyber criminals are taking advantage of tax season to lure valuable W-2 information from vulnerable businesses. An example of a common phishing scheme starts with a scammer posing as a legitimate employee of a company,...more

Expert Insights on Developing a Physical Security Program

by Jackson Lewis P.C. on

In today’s digital age, security tends to be thought about in terms of firewalls, malware, encryption and other safeguards for electronic systems. But the security of those systems, as well as an organization’s facilities,...more

Data Theft And What’s “Tangible”: New York Appellate Division Reinstates Conviction Of Former Goldman Sachs Programmer Sergey...

The law often lags behind developments in the tech world. One problem for employers seeking to protect their data is that some anti-theft and trade secret protection laws drafted long ago refer to “goods” and “tangible”...more

Top Developments/Headlines in Trade Secret, Computer Fraud, and Non-Compete Law in 2016

by Seyfarth Shaw LLP on

Continuing our annual tradition, we present the top developments/headlines for 2016 in trade secret, computer fraud, and non-compete law. Please join us for our first webinar of the New Year on February 2, 2017, at 12:00 p.m....more

The Employment Law Authority - January/February 2017

A Moving Target: The Not So Final Overtime Rule - On November 22, 2016, a federal judge for the Eastern District of Texas issued a preliminary injunction temporarily blocking the U.S. Department of Labor (DOL) from...more

Can a PA Employer be Liable to its Employees for a Data Breach?

It’s a nightmare scenario for any employer: you’ve been hacked. Thousands of your employees’ names, birthdates, Social Security numbers, and bank account information have been stolen. This information is used to file...more

Compliance Role in Mitigating Cyber Mayhem

by NAVEX Global on

In recent years, attention has been drawn to the impact of cyber and data breaches and the extent to which our organizations remain vulnerable to these threats. The cost of cyber and data security breaches is well known and...more

The Chancellor’s Autumn Statement

by Dentons on

It’s that time of the quarter again and Chancellor Philip Hammond’s first (and last) Autumn Statement. It’s also the first Statement ‘post-Brexit’. The focus of the Statement has, as predicted, been on austerity versus...more

Government Contracts Legislative and Regulatory Update - November 2016

by Dentons on

We are pleased to send you the November edition of "Government Contracts Legislative and Regulatory Update," which offers a summary of the relevant changes that took place during the month of October. Highlights this month...more

Six Tips to Help HR Professionals Avoid Criminal Antitrust Liability Under New DOJ/FTC Guidance

by Foley & Lardner LLP on

On October 20, the U.S. Department of Justice (DOJ) and Federal Trade Commission (FTC) jointly issued antitrust guidance for human resources professionals. The agencies also released a list of high-level red flags for the...more

297 Results
|
View per page
Page: of 12
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!