News & Analysis as of

Science, Computers & Technology Labor & Employment Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Washington’s New Biometric Privacy Law: What Businesses Need to Know

by Davis Wright Tremaine LLP on

With the rise in hackings and data breaches, companies and government agencies are looking for ways to protect their data that offer more security than passwords. Because passwords are easily lost, stolen, guessed, and...more

Article 29 Working Party Releases Detailed Opinion on Data Processing in the Workplace

by Reed Smith on

The Article 29 Working Party (“WP29”) recently published an opinion on data processing at work (“Opinion”). The Opinion restates the position and conclusions in WP29’s 2001 Opinion on processing personal data in the...more

Review Of Previously Opened Email May Violate SCA

by Jackson Lewis P.C. on

In the midst of a heated litigation commenced by an employer against its former employee for alleged violations of a non-compete agreement, an employee returned the cell phone she used during her employment. Prior to...more

Former Employee Need Not Allege Emails Were Unopened to Assert Claim of Unauthorized Access Under Stored Communications Act

by McGuireWoods LLP on

Earlier this month, a federal court denied an employer’s motion to dismiss a claim that it violated the Stored Communications Act (SCA) by accessing a former employee’s personal emails, concluding that the plaintiff need not...more

Federal Tax Treatment of Employer-Provided Identity Protection Services

In the wake of several recent high-profile security breaches, employers are increasingly viewing identity theft protection as an essential employee benefit for employees. According to Willis Towers Watson’s 2016 voluntary...more

Living in the Clouds: Is Your Business Data at Risk Because of a Disgruntled Employee?

by Baker Donelson on

TheCloud: Good Morning! TheCloud is a leading cloud-based provider, striving to secure your apps, email and confidential data in the cloud. How may we help you today? Mr. Techie: My name is Mr. TechieTechie, I’m the CEO...more

The General Data Protection Regulation (GDPR): action plan for pension scheme trustees

by Hogan Lovells on

The European General Data Protection Regulation (GDPR) will apply directly in the UK from 25 May 2018, and will make some fundamental changes to the current requirements surrounding data protection. Key areas of change...more

Personal data security for pension scheme trustees

by Hogan Lovells on

Cybersecurity and protection of personal data are increasingly to the forefront of concerns for pension trustees. The European General Data Protection Regulation (GDPR), applicable in the UK from 2018, will impose additional...more

Amendment To Japan’s Omnibus Data Protection Law Mean New Compliance Requirements For U.S. Multinational Employers With Operations...

by Littler on

Effective May 30, 2017, Japan amended its omnibus data protection law, the Personal Information Protection Act (“PIPA”), to add new compliance requirements that will have an immediate impact on many U.S. multinational...more

Top 10 Employment & Labour Issues for Employers

1: Accommodation in the Workplace - OVERVIEW - Employers have a duty to accommodate employees’ needs based on those grounds protected under federal and provincial human rights legislation. All employers are required...more

“Opening Clauses” and the GDPR – It Might Not Be As Easy As We Thought

by Seyfarth Shaw LLP on

The General Data Protection Regulation is coming, and along with it, a significant expectation of increased harmonization in the privacy rules across the EU. Considering the 60-plus articles which directly impose obligations...more

Training Employees Can Be Key To Avoiding Cyberattacks

by Fox Rothschild LLP on

A massive cyberattack was in the news again last week. This latest ransomware – dubbed “Petya” – crippled consumer product companies, transportation companies, law firms, and many other types of businesses worldwide. It is...more

Disgruntled Employees and Other Internal Threats to Your Cyber Security

by Baker Donelson on

Baker Donelson's Data Protection, Privacy and Cybersecurity attorneys are pleased to continue a series of client alerts that address significant cyber-threats to your business and discuss ways you can protect your business...more

Strengthening Data Security Through Human Resources And Information Technology Teamwork

by Jackson Lewis P.C. on

Human Resources (“HR”) and information technology (“IT”) departments play unique and important roles within an organization. With instances of data breaches on the rise, however, companies should be mindful of the importance...more

Employees Assert Illinois Biometric Privacy Claims against Supermarket over Fingerprint Collection Practices

Even though Washington passed its own biometric privacy law last month (HB 1493), and other states are currently debating their own bills, Illinois’s Biometric Information Privacy Act (BIPA) is still the crux of biometric and...more

What Employers Need to Know about Europe’s General Data Protection Regulation

On April 14, 2016, the European Parliament approved the General Data Protection Regulation (“GDPR” or the “Regulation”), a new regulation that will replace the European Union’s (“EU”) current data privacy standard. As a...more

Banking & Financial Services E-Note - May 2017

by Burr & Forman on

Starting on Friday, May 12th, computers in countries around the world have fallen victim to the latest ransomware attack. As of May 15th, it is estimated that more than 150 countries have infected systems, totaling over...more

The EC New Alert Mechanism to Detect Cartels: A Teaser Before a European General Framework for Whistleblowing

Whistleblowing has been part of the U.S. legal tradition, if not since the resolution passed by the Continental Congress in 1778, at least since the adoption of the 1863 False Claims Act. With regard to the disclosure of...more

Littler Global Guide - Philippines - Q1 2017

by Littler on

Persons With Disabilities May Now Be Declared as Dependents for Tax Purposes - Enacted Legislation - Republic Act No. 10754, enacted on March 23, 2016 and effective on December 23, 2016, expanded the benefits of...more

A New Employment Law Frontier: Illinois' Biometric Information Privacy Act

by Holland & Knight LLP on

An emerging area of the law has become the focal point in a new class action lawsuit pending in the U.S. District Court for the Northern District of Illinois. In Baron v. Roundy's Supermarkets, Inc., et al. (No....more

Employers: Are You Ready for a Cyberwar? Attackers Using Ransomware are Saying Show Me Your Bitcoin!

by Dechert LLP on

Recently, the WannaCry ransomware attack impacted 150 countries and over 300,000 computers. Not all ransomware attacks are so massive but they all are fast moving and require swift action to prevent destruction and lose of...more

Protecting Intellectual Property from Employee Theft

by Revision Legal on

Business owners who, after an employee dispute or after terminating an employee, have been the victims of intellectual property theft often contact us. Often, the solutions to this problem can be incredibly costly. Here are...more

Update: Case Involving Sharing Of Passwords May Be Headed To The Supreme Court

by Jackson Lewis P.C. on

Last August, we reported on a Ninth Circuit case in which a former employee was convicted of a crime under the Computer Fraud and Abuse Act (“CFAA”) for accessing and downloading information from his former company’s database...more

Compliance’s Role in Preventing the Next “WannaCry” Cyberattack

by NAVEX Global on

The global chaos unleashed by the WannaCry ransomware virus reinforces that cyberattacks are not just the problem of IT departments. Compliance must play an integral part of any organization’s cross-functional cybersecurity...more

Helping To Protect Your Company From A Cyber-Attack: Eight Tips For Human Resources Professionals And In-House Employment Counsel

by Littler on

Recent, highly publicized data security incidents highlight the continued vulnerability of corporate information systems. Notably, employees who fall prey to sophisticated phishing e-mails and other scams often contribute to...more

734 Results
|
View per page
Page: of 30
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.