News & Analysis as of

Science, Computers & Technology Labor & Employment General Business

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Employment Law Navigator – Week in Review: June 2017 #3

by Zelle LLP on

Last week, in recognition of the 50th anniversary of the passage of the Age Discrimination in Employment Act, the EEOC held a public meeting at which experts advised that age discrimination and bias against older workers...more

Health Alert (Australia) 19 June 2017

by DLA Piper on

In This Issue: - Judgments; Legislation; and Reports. - Excerpts from Judgments: 9 June 2017 - Health Services Union v St John of God Health Care [2017] FWC 2981 - Alleged dispute arising under an enterprise...more

Non-Competes Can Cost You More Than A Job

by Foley & Lardner LLP on

Normally in this space we write about case developments after the case is decided. This time, though the story involves a mid-case development which led to a company firing an employee it fought hard to keep....more

Retail and Consumer Products Law Roundup - May 2017

Supreme Court Refuses to Hear Interchange Settlement Appeal - The U.S. Supreme Court denied a request to review the U.S. Court of Appeals for the Second Circuit's ruling overturning a $7.25 billion settlement agreement in...more

Japan Legal Update - Volume 25 | May 2017

by Jones Day on

Bill to Partially Amend the Civil Code was Passed by the House of Representatives - On April 14, 2017, the House of Representatives passed a bill to partially amend the Civil Code ("Bill"). The Bill is under deliberation in...more

Compliance’s Role in Preventing the Next “WannaCry” Cyberattack

by NAVEX Global on

The global chaos unleashed by the WannaCry ransomware virus reinforces that cyberattacks are not just the problem of IT departments. Compliance must play an integral part of any organization’s cross-functional cybersecurity...more

Second Circuit Identifies Outer Limits of NLRA-Protected Speech

The National Labor Relations Act (NLRA) generally prohibits employers from retaliating against employees based on their union-related activities or for taking concerted action to improve the terms and conditions of their...more

Harvesting Innovation: 3 Tips for IP Managers

If you have ever gone apple picking in late season, you may recall seeing more apples on the ground than on trees. As you begin picking apples, you realize why. You haphazardly grab and yank an apple off a branch and the...more

Franchising Update

by K&L Gates LLP on

Many franchisors and other participants in the franchising sector are anticipating with concern the outcome of The Fair Work Amendment (Protecting Vulnerable Workers) Bill 2017 (Bill) which was introduced into the Federal...more

Employees Most Likely to Discover Data Security Breaches

by Revision Legal on

One thing that all data security breaches have in common is that someone must first uncover the breach and then reveal the breach to the appropriate parties (i.e., employers, law enforcement, other appropriate state and...more

It Lurks in the Last Place You Look – Preventing (or at Least Mitigating) Employee Data Leakage

by BakerHostetler on

Outside hacking attacks grab headlines. Data breach concerns cause sleepless nights within the C-suite of many organizations. And ransomware strikes fear into companies without sound backup practices and true Information...more

What To Do When You Hire A Thief

by Foley & Lardner LLP on

Employers victimized by trade secret misappropriation appropriately express righteous outrage, both at the offending ex-employee and sometimes at the new employer. However, on another day the roles can reverse: That same...more

How Policies Can Defeat a Breach of Contract Claim

Here is an interesting scenario for employers to consider. A company discovers that an employee working in information technology has taken de-commissioned company computers for himself and even given some away. After...more

Will Workplaces Be Going Off The Rails On The Blockchain?

by Fisher Phillips on

What if I told you that technology with internet-like potential will soon lead to a seismic revolution in our society, including the workplace? That you could greatly streamline your hiring process, eliminate...more

The Importance of Getting Inventorship Right: A Cautionary Tale in Two Cases

U.S. patent law elevates the importance of “the inventor” to an extent unseen in the rest of the world. Unlike many other countries, ownership of patent applications in the United States initially vests in the inventors...more

Top Board Concerns Heading into 2017 Remain a Hot Topic

by Snell & Wilmer on

Each year, a number of surveys and commentators describe and predict the trending topics of interest and importance to boards of directors in the for-profit and non-profit sectors. As we wrap up the first quarter of 2017, it...more

2016 Class Action Year-End Review

by BakerHostetler on

We are pleased to share BakerHostetler’s 2016 Class Action Year-End Review, which offers a summary of key developments in class action litigation during the past year. Class action litigation moved to the forefront of the...more

Watch for the Fox in Your Henhouse: Gig Companies at Risk

by Fisher Phillips on

Intellectual property threats (IPT) to companies participating in the gig economy may be greater than those experienced by traditional business. While this may seem self-evident to some, reflection on the matter confirms to...more

A Startup Attorney’s Tips to Advance Private Company Diversity

by Fenwick & West LLP on

One of the biggest contributors to a lack of corporate diversity is the size of a company. And the problems are often traceable to the company’s leanest, earliest days. One of my key messages to clients is that it’s never too...more

SEC Charges More Public Companies for Confidentiality Agreements That Might Deter Whistleblowers

by Hinshaw & Culbertson LLP on

In the past two years, the SEC has charged six public companies with violating SEC Rule 21F-17, which prohibits confidentiality agreements that could impede employees from making whistleblower claims directly to the SEC....more

“W-2 Phishing Attacks Targeting Businesses to Cash in on Busy Tax Season: 10 Tips to Protect Your Business”

by Sedgwick LLP on

Cyber criminals are taking advantage of tax season to lure valuable W-2 information from vulnerable businesses. An example of a common phishing scheme starts with a scammer posing as a legitimate employee of a company,...more

Expert Insights on Developing a Physical Security Program

by Jackson Lewis P.C. on

In today’s digital age, security tends to be thought about in terms of firewalls, malware, encryption and other safeguards for electronic systems. But the security of those systems, as well as an organization’s facilities,...more

Data Theft And What’s “Tangible”: New York Appellate Division Reinstates Conviction Of Former Goldman Sachs Programmer Sergey...

The law often lags behind developments in the tech world. One problem for employers seeking to protect their data is that some anti-theft and trade secret protection laws drafted long ago refer to “goods” and “tangible”...more

Top Developments/Headlines in Trade Secret, Computer Fraud, and Non-Compete Law in 2016

by Seyfarth Shaw LLP on

Continuing our annual tradition, we present the top developments/headlines for 2016 in trade secret, computer fraud, and non-compete law. Please join us for our first webinar of the New Year on February 2, 2017, at 12:00 p.m....more

The Employment Law Authority - January/February 2017

A Moving Target: The Not So Final Overtime Rule - On November 22, 2016, a federal judge for the Eastern District of Texas issued a preliminary injunction temporarily blocking the U.S. Department of Labor (DOL) from...more

300 Results
|
View per page
Page: of 12
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.