The Labor Law Insider: Whistleblower Breaks Details of NLRB Mail Ballot Election Abuse
What's the Tea in L&E? Why You Need Policies for Temps and Other Contractors
Fintech Focus Podcast | Managing a Workforce in a Regulated Environment
(Podcast) California Employment News: Understanding ADA/FEHA Requirements and the Interactive Process
California Employment News: Understanding ADA/FEHA Requirements and the Interactive Process
Exploring Employment Law Across Borders: Italy vs. US With White Lotus — Hiring to Firing Podcast
Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
#WorkforceWednesday®: Staples Sued Over MA’s Lie Detector Notice, NJ’s Gender-Neutral Dress Code, 2024 Voting Leave Policies - Employment Law This Week®
Employment Law Now VIII-150 - The FTC Noncompete Rule is Dead: What Now?
Employment Law Now VIII-149 - Part 2 of 2: The Final Interview With EEOC Commissioner Keith Sonderling
(Podcast) California Employment News: Court Ruling Halts FTC’s Non-Compete Ban – Implications for Employers
#WorkforceWednesday®: What the FTC Non-Compete Ban Block Means for Employers - Employment Law This Week®
What's the Tea in L&E? Are "Furries" Protected in the Workplace?
Employment Law Now VIII-148- Part 1 of 2: The Final Interview With EEOC Commissioner Keith Sonderling
Back to School: 3 Essential Employee Trainings
The Chartwell Chronicles: New Jersey Attorney Fees
Work This Way: A Labor & Employment Law Podcast - Episode 30: Plaintiff Legal Trends with Paul Porter of Cromer, Babb & Porter
PODCAST: Williams Mullen's Benefits Companion - Employment Law Edition: The Latest on Non-Competes and Independent Contractors
The Burr Broadcast: OSHA Clarifies Work-Relatedness of Employee Injuries While Traveling
Labor Law Insider - Collective Bargaining: Ins and Outs, Nuts and Bolts, Part II
The United States Court of Appeals for the Third Circuit recently held that a plaintiff had standing to sue her former employer for a data breach that exposed her personal information to the “Dark Web” because she...more
It is every employer’s worst nightmare: an unsuspecting employee receives an email in the early morning from an individual claiming to be his supervisor. The email asks him to follow up on an urgent work assignment that needs...more
1. If you use third-party organizations to search social media accounts of applicants, be sure to comply with the Fair Credit Reporting Act as well as state and local equivalent laws. ...more
Cybercriminals exploited remote work during the COVID-19 pandemic. In 2020, the FBI’s Internet Crime Complaint Center (IC3) saw a record 70% increase in the number of reported internet scams and losses exceeding $4.2...more
Pick the date and news publication. After a few flips of the pages (or a scroll of the mouse), you’ll no doubt find an article about “ABC Company” reeling from a ransomware attack. This proliferation of cyberattacks is all...more
In McFarlane v. Altice USA, Inc., a recent decision out of the Southern District of New York, a class of plaintiffs successfully established standing and stated a plausible claim for breach of implied contract based on a data...more
For the past several years, thousands of businesses have been hit with phishing scams during tax season. Through these social engineering scams, hackers obtain employee Forms W-2 for filing fraudulent tax returns seeking...more
It’s #WorkforceWednesday! This week we’re focusing on the long-term operations plans employers are putting in place due to COVID-19, whether it is utilizing extended remote work models or training their managers on return to...more
In this month's edition of our Privacy & Cybersecurity Update, we examine Washington state's new facial recognition law, the U.K. Supreme Court's ruling that an employer is not liable for a data breach caused by a disgruntled...more
Seyfarth Synopsis: As individuals and businesses continue to focus on the rising number of confirmed Coronavirus cases throughout the world and what steps they can take to guard against infection, malicious actors are...more
The British writer and politician Benjamin Disraeli once observed that the fear of danger should be a spur to preventing it, noting too that he who fears not gives advantage to the danger. This sentiment seems especially...more
In accordance with the CDC’s guidance on social distancing, more and more companies are increasing the number of employees working from home. As the number of employees working from home increases, so do the related cyber...more
For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more
Because cybercriminals don’t take holidays, December is an appropriate time for all employers to take steps to protect tax data and identities (both their own and their employees’) in advance of the 2019 tax-filing season....more
The New Jersey State Bar Association recently met to discuss, among other things, our favorite topic: Cybersecurity. (Perhaps our esteemed Privacy, e-Communication and Data Security Practice Group chair was there….) We wanted...more
By now, you’ve surely been warned of so-called “phishing” e-mails. The failure to heed such warnings may become more costly for North Carolina employers. According to a recent federal court decision, an employee who is...more
As the global focus on data protection increases, so expands the liability exposure for data holders following a breach. Employers collect significant amounts of sensitive personal information about their employees over the...more
Phishing. Spoofing. - These words may sound silly, but for employers, they are anything but. Phishing is the attempt to obtain sensitive electronic information—such as usernames, passwords, or financial...more
It’s hard to keep up with all the recent changes to labor and employment law. While the law always seems to evolve at a rapid pace, there were an unprecedented number of changes all through 2017. And if the first two months...more
A recent report from The Seattle Times provides details on a series of social engineering and ransomware attacks successfully perpetrated on a Seattle suburb during the second half of 2017. The incidents of cyber scams...more
It is tax season once again, and with it comes an increased threat of phishing scams targeting human resources and payroll personnel. In 2016, the IRS alerted employers to a then-emerging email phishing scheme in which...more
Seyfarth Synopsis: Employers have been scammed into sending sensitive W-2 information to malicious third parties. This article outlines the key steps California employers must immediately take if subject to this unfortunate...more
You continue to hear that your employees are your biggest risk when it comes to causing a data breach. Recent incidents that we have been involved in that were caused by employee error include...more
Recently, the WannaCry ransomware attack impacted 150 countries and over 300,000 computers. Not all ransomware attacks are so massive but they all are fast moving and require swift action to prevent destruction and lose of...more
With new and sophisticated schemes perpetrated by hackers and scammers, and sensitive personal information becoming increasingly accessible to numerous insiders, it is only a matter of time before most employers will be...more