Science, Computers & Technology Privacy Labor & Employment

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Cybersecurity in the Construction Industry - What Construction Executives Should Be Doing Now to Prepare for the Inevitable

Cybersecurity is everywhere in the news today because hackers have been very successful in exploiting human weaknesses across a broad array of industries. Our construction industry appears to be tempted to brush off these...more

Middle District of Pennsylvania Dismisses Data Breach Class Actions for Lack of Standing

Yet another federal judge has concluded that an individual whose personal information was allegedly accessed during a data breach lacks standing to sue unless and until there has been a misuse of that personal information or...more

Alert: FCC Continues Aggressive Action on Data Breaches

As noted in previous alerts, the FCC has dramatically increased its enforcement of data security practices and breaches resulting from what the FCC considers to be inadequate security measures. ...more

Former Uber Driver Files Class Action for Data Security Breach

Uber Technologies Inc., the internet-based taxi service, was recently hit with a putative class action lawsuit over a data breach involving the personal information of about 50,000 current and former drivers. Uber develops,...more

Securities and Exchange Commission: Critical Issues Facing Public Companies

Latham & Watkins partners William Baker, Alexander Cohen, Joel Trotter and Lawrence West hosted a webcast “Securities and Exchange Commission: Critical Issues Facing Public Companies.” Topics discussed included the increasing...more

BYOD: Five Things To Consider When Creating Your Policy

“BYOD” or “bring your own device” (also known as the “consumerization of IT”) is a fact of life in today’s workplace. BYOD refers to the practice of using personally owned devices—like smartphones, tablets, and laptops—for...more

Federal Financial Regulators Offer Advice To Address Malware, Compromised Credentials

In its recent press release, the Federal Financial Institutions Examination Council (FFIEC) issued two statements reiterating financial institutions' obligations to have measures in place to prevent and mitigate cybersecurity...more

Looking Over Your Employees' Shoulders

As shifting privacy lines allow employers to reach further and further into employee conduct, it’s increasingly important that you know the legal limits. Many employees will question the legality of increased employer...more

Seven Training Imperatives to Address Your Biggest Cyber Security Risk: Employee Behavior

One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more

US District Court in Pennsylvania Dismisses Data Breach Class Action on Article III Standing

In Storm & Holt v. Paytime, Inc., 1:14-cv-01138-JEJ (MD Penn. Mar. 13, 2015), the United States District Court for the Middle District of Pennsylvania addressed the Article III standing issue of when a cause of action may...more

Responding to Insider Data Theft

Our 2015 monthly Privacy Issues Wednesday webinar series continued this month with Jonathan Cain and Paul Pelletier’s Responding to Insider Data Theft & Disclosure presentation. Jonathan and Paul discussed how distinguishing...more

Takeaways for Employers on the Hillary E-mail Debacle

5 Reasons Employers Should Prohibit Employees From Using Personal Email Accounts - Recently, a political firestorm has erupted as news stories revealed that Former Secretary of State (and likely Presidential Candidate)...more

Effective cybersecurity: 8 questions for you and your team

Cybersecurity has become a top-tier risk for US and multinational organizations. It is only a matter of time before a determined hacker will penetrate your organization’s system and successfully exfiltrate some data. (Indeed,...more

10 Tips for Fostering a Business Culture of Cybersecurity Awareness

Businesses are recognizing the need for new approaches to data security as high-profile cybersecurity incidents reveal the true impact a data breach can have on an organization. One of the biggest realizations is that IT...more

Big Data and Human Resources—Letting the Computer Decide?

Employees are a company’s greatest asset, but if the company gets hiring decisions wrong, employees could also be the company’s greatest expense. Accordingly, recruiting the right people and retaining and promoting the best,...more

General Counsel, Is Your Website Vulnerable?

A report just released by security startup, Menlo Security, found that one-third of the top one million websites have already been compromised with malware or are running outdated or unpatched software that is vulnerable....more

Premera Cyber-Attack Announced: Defining Your Obligations as an Employer

On March 17, 2015, Premera announced a data breach involving the personal information of more than 11 million individuals resulting from what it characterized as a sophisticated, targeted cyber-attack. Employers and plan...more

Enforced subject access requests now a criminal offence in the UK

In September 2014 we reported on the UK’s intention to stamp out a practice commonly known as “enforced subject access requests”. This concerned the previously dormant section 56 of the UK Data Protection Act 1998 (‘DPA’),...more

Federal and State Governments Respond to Recent Data Breaches and Propose New Cybersecurity Laws

Over the past few months, major retailers and Internet content providers, like Target and Sony, have been victims of massive cyber-attacks resulting in the release of customer credit card data, private corporate e-mails, and...more

Wearable Tech in the Workplace, Version 2.0

Wearable technology or wearable tech is the latest craze in personal electronics. The phrase encompasses anything electronic that is worn by a user. It took center stage at the 2014 Consumer Electronics Show, and since then,...more

What Recent Case Law Can Teach About BYOD Workplaces

Bring Your Own Device (“BYOD”) is a movement that is changing the IT landscape of workplaces. In a BYOD workplace, employees use their own mobile device—smartphones, tablets, laptops, etc.—for both work and personal use. ...more

Anthem Data Breach Requires Plan Sponsor Attention

On January 29, 2015, Anthem Inc., one of the largest managed health care companies in the country, disclosed that the sensitive personal data of almost 80 million current and former participants in its network was breached in...more

A Different Kind of Data Breach—Loss or Disclosure of Company Information by Employee Theft

Data breaches are all over the news, but those stories most often cover high-profile cybersecurity breaches that result from the malicious efforts of hackers or other outsiders. Just as insidious, and more likely to occur,...more

Are your employees compromising information security efforts?

Companies devote significant resources to keeping computer networks and information secure, but those efforts can be undone when employees work outside the secure workspace. When an employee downloads a document to a personal...more

Is Your Computer Use Policy Legal? NLRB Finds a Presumptive Right for Employees to Use Employer’s Email System for Protected...

Does your company give employees access to company email? Do you prohibit employees from using the company email for personal, non-company use? If so, your policy may violate federal law....more

386 Results
|
View per page
Page: of 16

Follow Science, Computers & Technology Updates on:

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×