Science, Computers & Technology Labor & Employment Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Data Privacy Law in the UK, Part III: Employment Background Checks and Monitoring

In parts one and two of this series summarizing data protection law in the United Kingdom, we looked at the data protection principles to which employers must adhere in relation to obtaining, holding, or disposing of personal...more

Three Security Awareness Training Findings That Will Surprise You

As providers of ethics and compliance training solutions, we never tire of discussing topics like anti-bribery training, sexual harassment training, code of ethics training… and so many more. Lately, we have seen a real...more

Riley v. California Advances Individual Privacy Rights in this Digital Age

Employee privacy rights may have received a boost from the U.S. Supreme Court at the end of this year’s term. In Riley v. California, the most recent in a series of criminal search and seizure cases involving technology, the...more

Going Mobile: The Risks and Rewards of a BYOD Program

Employees are increasingly using their personal electronic devices, such as laptops, smartphones, and tablets, for work purposes. The trend, dubbed “Bring Your Own Device” or “BYOD,” has redefined what it means to “be at...more

Data Privacy Law in the UK, Part II: Data Security and Restrictions on Data Transfers for U.S. Employers

The European Court of Justice’s decision in the Google case that it was required to remove links to “outdated” or “irrelevant” information about an individual has brought EU data privacy laws to the forefront of public...more

Five Lessons for Employers from California v. Riley

In the waning days of its current term, the U.S. Supreme Court ruled unanimously in California v. Riley that police officers generally violate the Fourth Amendment's prohibition against unreasonable searches by conducting a...more

A Whistleblower Hotline can protect against medical identity theft

Last year, medical identity theft affected nearly two million Americans - 32% more than the year before. This is a staggering number! And considering that today, medical identity theft accounts for 43% of all identity theft...more

Data Privacy Law in the UK, Part I: An Introduction for U.S. Employers

The recent high-profile decision by the European Court of Justice involving Google has highlighted the existence of stringent data privacy laws in the European Union (EU). However, although the Google decision was...more

Does Your Company Align Compliance Training To An Annual Ranking of Risks?

PwC came out with their annual State of Compliance survey, which is always well done, and has given me lots of fodder for upcoming blogs. I found the below illustration in the accompanying “chart pack” and found it...more

10 Tips for Creating a Successful BYOD Policy

The “bring your own device” (BYOD) trend has become the norm at many companies and viewed as a way to both save money and increase productivity. By allowing employees to use their personal smartphones, tablets and laptops to...more

Supreme Court Prohibits Warrantless Mobile Phone Searches, Underscores Individual Right to Privacy

The Supreme Court of the United States released a unanimous decision last week barring law enforcement from searching the mobile phones of individuals placed under arrest without first obtaining a search warrant or the...more

U.S. Supreme Court Cell Phone Privacy Decision Deserves Employer Attention

In a unanimous decision, the U.S. Supreme Court ruled this week in Riley v. California that police generally may not conduct a warrantless search of digital data stored on the cell phone of someone who has been arrested. The...more

Week in Review

Technology's impact on privacy took center stage in news headlines this week. The New York Times and National Public Radio (NPR) both reported on alternative software tools to track employees in the workplace - one tool...more

Florida’s New Data Breach Notification Requirements Take Effect July 1

On June 20, 2014, Florida Governor Rick Scott signed the Florida Information Protection Act of 2014 (FIPA) into law. FIPA imposes stringent new security and notice requirements on businesses and employers that maintain...more

Appointment of a Data Protection Officer in Germany: You Wanna Avoid Trouble? Then Make Sure You Appoint the Right Person!

Data protection law is on the rise. Courts as well as local authorities become increasingly sensitive to the misuse of any individual’s personal data that applicable statutory provisions in Germany, such as the Federal Data...more

LAG Schleswig-Holstein: Kündigung wegen ausschweifender Internetnutzung trotz 21 Jahren im Betrieb ohne Abmahnung möglich

Einem Arbeitnehmer, der ohne Erlaubnis während der Arbeitszeit den vom Arbeitgeber zur Verfügung gestellten Computer exzessiv für privates ‘Surfen nutzt, kann auch ohne Abmahnung gekündigt werden. Dem stand in einer aktuellen...more

Don’t forget to close the back door: Vendor management and privacy

When you enter into a contract with a vendor that will access, use or disclose your customer or employee personal information, assume that you are responsible for any unauthorized access to, use, or disclosure of that...more

Data Breach Laws Continue to Come

Retail. Financial services. Health care. Energy. Not an industry has been spared when it comes to recent data and cyber breaches, and the colossal damage that occurs to the interests of the company, its employees, and third...more

Popular Reads on Social Media & the Law

There's much to be sorted out at the intersection of social media and the law, as evidenced by the following collection of popular reads on JD Supra....more

Data Security in a Technological World

The Uniform Trade Secrets Act, adopted by 47 states including Virginia, Maryland, and the District of Columbia, generally defines protectable trade secrets as information that derives independent economic value from not being...more

Have You Written Your BYOD Policy Yet? Don't Forget These 9 Must-Have Features

I read a great blog by Tricia Meyer of Meyer Law, on how crucial it is to prepare your business for the Bring Your Own Device (BYOD) movement. Surely you’ve heard about this; I even heard a story about BYOD on NPR a few...more

It’s Like Déjà Vu All Over Again: Yogi Berra On Information Security

It is Spring again, and the national pastime is in full swing. This year Spring also brought knowledge of the Heartbleed Bug – another threat to the security of information stored and transmitted online. And just as baseball...more

So, Are You Really Compliant With HIPAA?

As covered entities under the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”), healthcare providers are intimately familiar with the strict privacy and security requirements imposed on them by HIPAA and...more

EXPANDED – BYOD: Where the Employee and the Enterprise Intersect

BYOD Yesterday And Today - The proliferation of bring your own device programs – or “BYOD” as it is commonly referred – has drastically changed today’s corporate workplace environment. Employees are availing themselves...more

Europe Under Review: Part 5 Of 8 – Data Security

In the fifth instalment of our “Europe under Review” series, we will look at current data privacy laws and best practice in the UK in relation to data security, and, briefly, the impact of the new Data Protection Regulation....more

289 Results
|
View per page
Page: of 12

Follow Science, Computers & Technology Updates on: