Electronic Devices

News & Analysis as of

Proportionality Factors Persuade Court to Grant Motion to Compel (Pennsylvania)

First Niagara Risk Mgmt. v. Folino, 2016 U.S. Dist. LEXIS 106094 (E.D. Pa. Aug. 11, 2016) - In this dispute over the violation of a non-compete agreement, the plaintiff moved the court to compel a discovery request....more

“Rather Broad” Discovery Request Is Nonetheless Proportional to Case

First Niagara Risk Mgmt., Inc. v. Folino, No. 16-1779 (E.D. Pa. Aug. 11, 2016). The court concluded that the plaintiff’s requested scope of discovery from the defendant’s electronic devices, while “rather broad,” was...more

Privacy Tip: Cover Your Computer Camera and Microphone

Someone may be using your laptop or your desktop web camera to watch and listen to you without your knowledge. It happens, and yes, it’s downright creepy. And to think that someone may be spying on your kids that way is...more

FTC Weighs-in on Telehealth, Comments on Delaware’s Occupational Therapy Practice Rule

On August 3, 2016, the Federal Trade Commission (FTC) staff submitted public comments regarding the Delaware Board of Occupational Therapy Practice’s proposed regulation for the provision of occupational therapy services via...more

Five Tips for Handling Pokémon Go in the Workplace

In the past several weeks, Pokémon Go has taken the world, and many workplaces, by storm. If you’re concerned about reducing the negative impact that this game may be having on your employees’ productivity – and, more...more

Employees Behaving Badly – Ten Signs (S)He’s Just Not Into You

There are many computer behaviors which, in a certain light, might suggest that an employee is skimming the accounts, paying bribes, pushing deals to friends or relatives, or planning to steal company IP to compete with them....more

Let’s be “Friends” – Should I “Friend” My Employees? And Other Questions Raised by the Internet Privacy Protection Act

On the last day of the 2016 Regular Session, the West Virginia Legislature passed a bill that will require all West Virginia employers to evaluate their social media policies and practices. HB 4364, known as the Internet...more


Il presente alert viene redatto al fine di fornire prime indicazioni relative alle ultime novità in materia di Diritto del Lavoro, con particolare riferimento alla disciplina dei controlli a distanza, delle dimissioni e del...more

Banning Employee E-Mailing?

“Everything in moderation,” I’m always saying. Exercise, TV, French fries. Well, I tend to moderate my exercise a tad more than my French fries, but I digress. What about technology? Social media? Those who know me know that...more

Protecting GUI Designs in Australia: More Questions than Answers

Many countries allow graphical user interface (GUI) features to be protected by registered designs. The current position in Australia is not clear. The position of the Australian Designs Office, which is responsible...more

Divisional Court Confirms Lawfulness of SFO Procedures for Isolating Privileged Material

On 27 January, the Divisional Court in R (McKenzie) v Director of the Serious Fraud Office [2016] EWHC 102 (Admin) confirmed the lawfulness of the SFO’s procedures for dealing with material potentially subject to legal...more

The Perils of BYOD Policies

Over the holidays, many employees are out of the office on family vacations or otherwise using their time off. Many employers rely on employees' use of their own personal electronic devices to keep up with what is going on in...more

Historic FMCSA E-Logging Rule Met With Immediate Challenge in the Seventh Circuit

In an action immediately challenged in court, the Federal Motor Carrier Safety Administration (FMCSA) finalized a long-anticipated rule (the “ELD Rule”) to require use of electronic logging devices (ELDs) by all drivers...more

DOL’s Request for Information on Employees’ Use of Electronic Devices Expected in February 2016

In its July 2015 notice of proposed rulemaking on the forthcoming changes to the “white collar” overtime regulations, the U.S. Department of Labor (DOL) recognized employer concerns regarding the remote use of electronic...more

How Not To Carry Out Dawn Raids: Supreme Court Sets New Rules

Unannounced inspections of the Antimonopoly Office of the Slovak Republic (dawn raids) have recently become more and more frequent. They represent a very intrusive interference and certainly a most unpleasant encounter, as...more

California Gives the Fourth Amendment a 21st Century Makeover

The average American today generates more media than they did at any other point in history, and the ease with which our communications, photos, and videos are sent and stored digitally means most of us have more media stored...more

California Enacts More Sweeping Data Privacy Laws

Perennially leading the country — and challenging companies to keep up — California has, for the third time in three years, enacted several new data laws, including a groundbreaking digital privacy law and amendments to its...more

New California Law Expands Privacy Rights Applicable To Electronic Data

On October 8, 2015, California Governor Jerry Brown signed into law the California Electronic Communications Privacy Act (“CalECPA” or the “Act”), sponsored by Senator Mark Leno (D-San Francisco). The Act requires law...more

California Enacts CalECPA, Requiring a Search Warrant to Obtain or Access Users’ Electronic Information

On Thursday, October 8, 2015, California Governor Jerry Brown signed into law the Electronic Communications Privacy Act (the “California ECPA”). This legislation, which takes effect on January 1, 2015, has been heralded by...more

California Joins Other States with the Passage of CalECPA

Law enforcement requests for electronic information, particularly from technology companies such as Google and Twitter, have skyrocketed in recent years. In response, several states—Maine and Texas in 2013, Utah in 2014 and...more

Data Security 101 for Business – Guidance from the Federal Trade Commission

Recently the Federal Trade Commission (FTC) issued a guide, Start with Security: A Guide for Business, which pulls from lessons learned from the 50+ data security enforcement actions that the FTC has announced. To be clear,...more

China Proposes “RoHS 2” Framework for Comment

On May 15, 2015, China’s Ministry of Industry and Information Technology (“MIIT”) released a latest Draft for Comments (“May 2015 Draft”) of the “Management Methods for the Restriction of the Use of Hazardous Substances in...more

Product Law: Legal regime for electronic products in Germany set to change

By way of the Directive on Waste Electrical and Electronic Equipment (Directive 2012/19/EU; so-called WEEE Directive), the EU has required its Member States to adapt their electrical and electronic equipment law until 2014....more

The New Frontier in Interest Based Advertising: FTC Shifts Focus to Cross-Device Tracking

As consumers increasingly connect to the Internet using multiple devices—such as mobile phones, tablets, computers, TVs and wearable devices—advertising technology companies have rapidly developed capabilities to reach the...more

Remote Search Warrants and the Continued Threat to Privacy Rights

What were you doing Wednesday, November 5, 2014? If you are a staunch Republican, you might have been toasting the election results from the day before, dreamy-eyed and dancing. If you are a staunch Democrat, you might have...more

41 Results
View per page
Page: of 2
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.