Data Governance for the BYOD Age
Corporate Compliance and Enforcement Hot Topics with IBM VP, Una Dean
Digital Workplace Issues
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Safeguards against Data Security Breaches (Part One)
Corporate Law Report: Managing Cyber Risks, BYOD, Obama's NLRB Crisis, Iran Sanctions, and More
Given the dire consequences a company can face once a valuable trade secret goes out the door, corporate executives need to understand what their trade secrets are as well as how to protect them. Under the law, a trade secret...more
Our increasingly connected world presents tremendous opportunities for employers as well as considerable confusion and risk. Should you Google a job applicant? Allowing employees to use their own mobile devices for work...more
We have previously posted on HR Headaches about the practical steps employers can take to protect their company’s trade secrets. ...more
For many companies, customer information ranks among its most important assets. Yet these days, employees often keep this sensitive customer information in electronic locations that are not readily accessible to or controlled...more
1: Accommodation in the Workplace - OVERVIEW - Employers have a duty to accommodate employees’ needs based on those grounds protected under federal and provincial human rights legislation. All employers are required...more
Seyfarth Synopsis: Protecting trade secrets from employee theft requires more than using an NDA when onboarding new employees. If businesses want to protect their confidential information, they need to take a cradle-to-grave...more
The combined topics of Facebook and race were in the news last week. A Pennsylvania judge ruled that an employee’s personal Facebook page laced with race-based stereotypes could be used to impeach her in her lawsuit, which...more
Learn how your company can prepare to act quickly and strategically to protect important relationships, information and trade secrets at the time that a key employee leaves. This webinar will review the latest developments in...more
In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more
Who Owns What - Unlike the marital relationship, which hypothetically balances power between spouses, the employment relationship is founded on the central concept of control: it is the employer who dictates the time,...more
Each year, LP’s Labor & Employment Practice Group is pleased to provide a short checklist of steps that all companies should consider taking to measure their readiness for the coming year. We hope that you find this 2015...more
Let’s face it: bring-your-own-device (BYOD) situations are here to stay. With the ubiquity of employees having and using smartphones and tablets – devices that have more capacity and processing power than desktop computers...more
On March 21, 2013, a broadly-worded social media privacy bill (A2878) received final legislative approval, and now awaits action by Governor Chris Christie. As discussed in several prior issues, this bill would bar an...more