News & Analysis as of

Risk Management Social Media Social Networks

Buckingham, Doolittle & Burroughs, LLC

How to Report Social Media Harassment

Social media platforms have become an integral part of our daily lives, enabling us to connect with friends, family, and communities worldwide. However, the openness of these platforms also exposes users to the risk of...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #342 – If You Use Twitter, Be Aware and Stay Tuned

This week, in addition to the news-catching, ongoing dispute between Twitter and Elon Musk, Twitter’s former head of cybersecurity, Peiter Zatko, claimed in a whistleblower filing with several federal agencies that Twitter...more

Kohrman Jackson & Krantz LLP

Riot’s Listening: Valorant Combats Player Toxicity

Riot Games’ (Riot) team-based, first-person-shooter game, Valorant, has received mixed emotions upon its announcement that it will monitor the game’s voice chat. Team-games especially benefit from players being able to...more

Kohrman Jackson & Krantz LLP

Seven Things You Should Do Right Now to Protect Your Online Reputation

Billions of Google searches occur every day. Sources estimate that the average person conducts between three to four daily Google searches....more

Franczek P.C.

Do Virtual Sticks and Stones Also Break Bones? Addressing Cyberbullying Under Title IX

Franczek P.C. on

Cyberbullying is nothing new. A majority of teens have experienced the phenomenon and college campuses certainly are not immune. Just because something is common does not make it simple to deal with, however. And this is...more

Cozen O'Connor

#No Filter: Terminating an Employee for Social Media Posts – Part 2

Cozen O'Connor on

Prior to the advent of social media and especially the #MeToo movement, employers were generally comfortable drawing a bright line between what employees did on their own time and workplace misconduct. ...more

K2 Integrity

Has Twitter Declared You Dead?

K2 Integrity on

It’s a Saturday afternoon, and your cell phone rings: it’s your company’s CEO. Curious why the CEO would choose to call you on a quiet Saturday, you answer, only to hear a relieved voice on the end: “Oh Jack, you don’t know...more

K2 Integrity

Too Good to Be True: Cyber Safety Tips

K2 Integrity on

When seasoned investigators are exposed to online scams, the protective warnings they give to others on social media safety and internet fraud suddenly become real. Read on to see how one of our own dodged an online rental...more

Hogan Lovells

Social media and the workplace

Hogan Lovells on

Social media is one of the most significant developments in communication and has changed the way and speed at which people interact with one another. It has naturally infiltrated the working environment and brought about...more

Littler

How a Multinational Employer Can Craft a Global Social Media Policy

Littler on

Social media is so powerful that some argue Russian manipulation of it changed the result of a U.S. presidential election. In the employment context, social media is not quite that powerful, but employment context social...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #125 – Check + Set LinkedIn Privacy Settings

It is well known that hackers and fraudsters surf Facebook to find individuals who have not protected their information through Facebook’s privacy settings. People put a lot of information on Facebook that is very personal...more

Seyfarth Shaw LLP

LinkedIn – in whose professional interest?

Seyfarth Shaw LLP on

LinkedIn is the biggest online network of professionals in the world. Many employers encourage staff to use LinkedIn to promote their organisation. While employees may share content relating to their organisation, they...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #111 – Stop Cyber Bullying: Check Out nobully.org

I was fortunate this week to be able to attend and speak at the annual Privacy Xchange Conference sponsored by CyberScout. There were amazing presentations during the conference, but one in particular touched me and is worthy...more

K2 Integrity

Cybersecurity Awareness: Limiting Your Exposure and Visibility

K2 Integrity on

We spend so much time on our mobile phones and on social media, yet often we don’t think of how these tools are broadcasting our lives as we work and play. With just a few steps, you can limit what you are digitally telling...more

Seyfarth Shaw LLP

LinkedIn – in whose professional interest?

Seyfarth Shaw LLP on

LinkedIn is the biggest online network of professionals in the world. Many employers encourage staff to use LinkedIn to promote their organisation. While employees may share content relating to their organisation, they...more

Baker Donelson

Cybersecurity in the Workplace: Obama's Proposals and More

Baker Donelson on

In the past five years, employers both big and small have become accustomed to social media and increased technology in the workplace. Everyone and their parents are on Facebook, and one cannot go anywhere without being asked...more

NAVEX

Social Media Risk Management Toolkit

NAVEX on

Explore four areas key to managing social media use by employees in your organization. Craft a best practice social media policy, navigate thelegal landscape, and view examples of organizations that have established social...more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide