Science, Computers & Technology Privacy Labor & Employment

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Bring Your Own Device Doesn't Mean Bring in Security Breach

Bring-Your-Own-Device (“BYOD”) policies have been picking up steam because of increased productivity, improved communications, and the need for employees to work remotely. However, when implementing any BYOD policy there are...more

4 Cases Where Security Awareness Training Could Have Saved The Day

I’m very excited about our upcoming webinar, “Cybersecurity 2014: The Impact on Global Companies,” with Lisa Sotto. She is a well known data privacy rockstar and will provide an overview of cybersecurity in 2014, the current...more

Federal Prosecutors Bring Criminal Charges against Individual for Alleged HIPAA Violation

Federal prosecutors in the Eastern District of Texas recently brought criminal charges under the Health Insurance Portability and Accountability Act (“HIPAA”) against a former East Texas hospital employee. The former...more

The Affordable Care Act—Countdown to Compliance for Employers, Week 21: Self-Funded Group Health Plans, the Affordable Care Act...

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) ushered in broad national standards aimed at improving the efficiency and effectiveness of the U.S. health care system. Referred to generically as...more

Employment Law Commentary -- Volume 26, Issue 7 July 2014 -- Building A Workforce Culture Of Data Security In The Post-Snowden Era

Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more

Data Privacy Law in the UK, Part III: Employment Background Checks and Monitoring

In parts one and two of this series summarizing data protection law in the United Kingdom, we looked at the data protection principles to which employers must adhere in relation to obtaining, holding, or disposing of personal...more

Three Security Awareness Training Findings That Will Surprise You

As providers of ethics and compliance training solutions, we never tire of discussing topics like anti-bribery training, sexual harassment training, code of ethics training… and so many more. Lately, we have seen a real...more

Riley v. California Advances Individual Privacy Rights in this Digital Age

Employee privacy rights may have received a boost from the U.S. Supreme Court at the end of this year’s term. In Riley v. California, the most recent in a series of criminal search and seizure cases involving technology, the...more

Going Mobile: The Risks and Rewards of a BYOD Program

Employees are increasingly using their personal electronic devices, such as laptops, smartphones, and tablets, for work purposes. The trend, dubbed “Bring Your Own Device” or “BYOD,” has redefined what it means to “be at...more

Data Privacy Law in the UK, Part II: Data Security and Restrictions on Data Transfers for U.S. Employers

The European Court of Justice’s decision in the Google case that it was required to remove links to “outdated” or “irrelevant” information about an individual has brought EU data privacy laws to the forefront of public...more

Five Lessons for Employers from California v. Riley

In the waning days of its current term, the U.S. Supreme Court ruled unanimously in California v. Riley that police officers generally violate the Fourth Amendment's prohibition against unreasonable searches by conducting a...more

A Whistleblower Hotline can protect against medical identity theft

Last year, medical identity theft affected nearly two million Americans - 32% more than the year before. This is a staggering number! And considering that today, medical identity theft accounts for 43% of all identity theft...more

Data Privacy Law in the UK, Part I: An Introduction for U.S. Employers

The recent high-profile decision by the European Court of Justice involving Google has highlighted the existence of stringent data privacy laws in the European Union (EU). However, although the Google decision was...more

Does Your Company Align Compliance Training To An Annual Ranking of Risks?

PwC came out with their annual State of Compliance survey, which is always well done, and has given me lots of fodder for upcoming blogs. I found the below illustration in the accompanying “chart pack” and found it...more

10 Tips for Creating a Successful BYOD Policy

The “bring your own device” (BYOD) trend has become the norm at many companies and viewed as a way to both save money and increase productivity. By allowing employees to use their personal smartphones, tablets and laptops to...more

Supreme Court Prohibits Warrantless Mobile Phone Searches, Underscores Individual Right to Privacy

The Supreme Court of the United States released a unanimous decision last week barring law enforcement from searching the mobile phones of individuals placed under arrest without first obtaining a search warrant or the...more

U.S. Supreme Court Cell Phone Privacy Decision Deserves Employer Attention

In a unanimous decision, the U.S. Supreme Court ruled this week in Riley v. California that police generally may not conduct a warrantless search of digital data stored on the cell phone of someone who has been arrested. The...more

Week in Review

Technology's impact on privacy took center stage in news headlines this week. The New York Times and National Public Radio (NPR) both reported on alternative software tools to track employees in the workplace - one tool...more

Florida’s New Data Breach Notification Requirements Take Effect July 1

On June 20, 2014, Florida Governor Rick Scott signed the Florida Information Protection Act of 2014 (FIPA) into law. FIPA imposes stringent new security and notice requirements on businesses and employers that maintain...more

Appointment of a Data Protection Officer in Germany: You Wanna Avoid Trouble? Then Make Sure You Appoint the Right Person!

Data protection law is on the rise. Courts as well as local authorities become increasingly sensitive to the misuse of any individual’s personal data that applicable statutory provisions in Germany, such as the Federal Data...more

LAG Schleswig-Holstein: Kündigung wegen ausschweifender Internetnutzung trotz 21 Jahren im Betrieb ohne Abmahnung möglich

Einem Arbeitnehmer, der ohne Erlaubnis während der Arbeitszeit den vom Arbeitgeber zur Verfügung gestellten Computer exzessiv für privates ‘Surfen nutzt, kann auch ohne Abmahnung gekündigt werden. Dem stand in einer aktuellen...more

Don’t forget to close the back door: Vendor management and privacy

When you enter into a contract with a vendor that will access, use or disclose your customer or employee personal information, assume that you are responsible for any unauthorized access to, use, or disclosure of that...more

Data Breach Laws Continue to Come

Retail. Financial services. Health care. Energy. Not an industry has been spared when it comes to recent data and cyber breaches, and the colossal damage that occurs to the interests of the company, its employees, and third...more

Popular Reads on Social Media & the Law

There's much to be sorted out at the intersection of social media and the law, as evidenced by the following collection of popular reads on JD Supra....more

Data Security in a Technological World

The Uniform Trade Secrets Act, adopted by 47 states including Virginia, Maryland, and the District of Columbia, generally defines protectable trade secrets as information that derives independent economic value from not being...more

294 Results
|
View per page
Page: of 12

Follow Science, Computers & Technology Updates on: