Science, Computers & Technology Labor & Employment General Business

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Cliff Notes from the Joint OCR/NIST HIPAA Security Conference

As a service to our readers, we have distilled last week’s joint HHS Office of Civil Rights (OCR) and National Institute of Standards in Technology (NIST) conference, “Safeguarding Health Information: Building Assurance...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security, Continued - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the...more

How To Avoid Common Data Breach Pitfalls

Cost of Data Breach in 2014: - $5.9 million U.S. average cost of a data breach - 15% Annual increase in the average cost of a data breach around the world - $201 Average cost paid for each exposed...more

Today's special - fraud, hammers and nails

"... the company was slow to respond to early threats and only belatedly took action." By now we've all heard about the latest credit card breach within Home Depot - that account information of 56 million cardholders...more

New “Job Creation Project” EDIP Credits to Boost Tech Jobs in Massachusetts

In the battle for tech jobs, Massachusetts has added a significant new element to its arsenal of incentives in the form of “job creation project” Economic Development Incentive Program (EDIP) credits. EDIP is a tax incentive...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the data...more

Are you—or someone you love—a content hoarder?

Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more

Workplace-Diversity Data Continues To Drive Awareness in Silicon Valley

The technology industry has been criticized in recent years for its lack of diversity in its mostly male workforce as advocates call on companies to be more transparent with their demographic information. Apple Inc. is one of...more

Private Ruling Endorses Taxpayer-Friendly Reading of “Qualified Small Business” Under Section 1202

On September 5, 2014, the Internal Revenue Service (“IRS”) released Private Letter Ruling 201436001 (the “Ruling”), which found that a company providing products and services primarily within the pharmaceutical industry was a...more

Business Associate Agreements May Require Amendment

The Omnibus Final Rule (the "Omnibus Rule") under the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), was issued in January, 2013 effective March 26, 2013, but with a general compliance deadline of...more

Court Was Wrong to Re-Write Covenants

In Prophet v Huggett [2014] ECWA Civ 1013, the Court of Appeal has overturned a recent decision of the High Court in which it had re-written a non-compete covenant to give it commercial effect. You may recall that we...more

How Website Operators Use CFAA To Combat Data-Scraping

“Web scraping” or “Web harvesting” — the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders” — accounted for 18 percent of site visitors and 23 percent of all...more

When Acting to Prevent Data Breaches and Comply with Privacy Laws, Remember Overarching Employee Rights

The grocery business may be “fresh and easy,” but drafting a confidentiality and data protection policy that withstands the scrutiny of the current National Labor Relations Board (NLRB) is not. The NLRB, in its recent 2-1...more

Quirky Question #240, Breach Notification Laws

Question: Our company has employees and operations in multiple states, and I’m concerned about complying with data breach laws in the various locales. What’s the status of the law on data break...more

My “Momma Bear” Is Coming Out: Cyber Bullies Prove Social Media Training Needs An Anti-Harassment Element

More than 50% of teens have experienced cyber bullying. Parents have historically looked to their children’s schools and local government to address the issue, but what about the social media sites which contribute to the...more

Risks of BYOD

Q: BYOD (Bring your own device) is standard for our employees. What, if any, are the risks for BYOD when compared to company-provided devices?...more

Wearable Devices in the Workplace Challenge Data Security and Privacy

Wearable devices, including health and activity monitors, video and audio recorders, location trackers, and other interconnected devices in the form of watches, wristbands, glasses, rings, bracelets, belts, gloves, earrings,...more

Bring Your Own Device Doesn't Mean Bring in Security Breach

Bring-Your-Own-Device (“BYOD”) policies have been picking up steam because of increased productivity, improved communications, and the need for employees to work remotely. However, when implementing any BYOD policy there are...more

4 Cases Where Security Awareness Training Could Have Saved The Day

I’m very excited about our upcoming webinar, “Cybersecurity 2014: The Impact on Global Companies,” with Lisa Sotto. She is a well known data privacy rockstar and will provide an overview of cybersecurity in 2014, the current...more

Non-Compete Provisions in ERISA Plans – A Recent 5th Circuit Case

A recent case out of the Northern District of Texas and the Fifth Circuit Court of Appeals touches upon the intersection of non-compete agreements and ERISA plans....more

Three Security Awareness Training Findings That Will Surprise You

As providers of ethics and compliance training solutions, we never tire of discussing topics like anti-bribery training, sexual harassment training, code of ethics training… and so many more. Lately, we have seen a real...more

3 Reasons Why Tech Startups Struggle with Discrimination and Harassment Training (And 5 Effortless Ways to Protect Your Startup)

I get it – snooze-worthy, old-fashioned harassment and discrimination training isn’t in line with the vibe you’re trying to create at your hip tech startup. You want to be laid back, cut out all the corporate bull$&^*, build...more

Data Privacy Law in the UK, Part II: Data Security and Restrictions on Data Transfers for U.S. Employers

The European Court of Justice’s decision in the Google case that it was required to remove links to “outdated” or “irrelevant” information about an individual has brought EU data privacy laws to the forefront of public...more

Does Your Company Align Compliance Training To An Annual Ranking of Risks?

PwC came out with their annual State of Compliance survey, which is always well done, and has given me lots of fodder for upcoming blogs. I found the below illustration in the accompanying “chart pack” and found it...more

10 Tips for Creating a Successful BYOD Policy

The “bring your own device” (BYOD) trend has become the norm at many companies and viewed as a way to both save money and increase productivity. By allowing employees to use their personal smartphones, tablets and laptops to...more

164 Results
|
View per page
Page: of 7

Follow Science, Computers & Technology Updates on: