News & Analysis as of

Science, Computers & Technology Labor & Employment Business Organization

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Does Your Website Comply With The ADA? Does It Even Need To?

by Pepper Hamilton LLP on

In the last few years, there has been an explosion in the number of cases being filed throughout the United States in which visually impaired or other disabled individuals claim that a company’s website violates the Americans...more

Does Your Website Comply With The ADA? Does It Even Need To? (PowerPoint Slides)

by Pepper Hamilton LLP on

In the last few years, there has been an explosion in the number of cases being filed throughout the United States in which visually impaired or other disabled individuals claim that a company’s website violates the Americans...more

The Data Report Episode 21: Employee Negligence Related to Data Security

by Bilzin Sumberg on

Module Six: Workplace Data Security (Part II) Litigation attorney Jay Ward discusses employee negligence related to data security in this episode of The Data Report. He highlights the importance of incorporating good data...more

The Data Report Episode 20: Workplace Data Security - Identifying Red Flags

by Bilzin Sumberg on

Module Six: Workplace Data Security (Part I) Litigation attorney Jay Ward begins a new module discussing workplace privacy and data security. This episode of The Data Report focuses on best practices for businesses to...more

Day 3 of One Month to 360-Degrees of Communications in Compliance-The D&B Experience

by Thomas Fox on

How does one company and one Chief Compliance Officer (CCO) actively use social media to make more effective the company’s compliance culture? The company is the Dun & Bradstreet (D&B) and its CCO, Louis Sapirman, whom I...more

Implementing a Policy Review to Ensure You Are Protected Under The Computer Fraud and Abuse Act, Part 2: How to Conduct Your...

by Hinshaw & Culbertson LLP on

In Part 1 of this series, we discussed the Computer Fraud and Abuse Act (“CFAA”) and situations that are readily prohibited by the CFAA, such as when current or former employees gain access to an employer's databases or files...more

Day 19 of One Month to More Effective Continuous Improvement-Use of Social Media for Continuous Improvement

by Thomas Fox on

Compliance does not exist in a time-warp vacuum, with programs living in 1977 when the first major anti-corruption legislation, the Foreign Corrupt Practices Act was passed. The law has advanced since that time, as has...more

In Case You Missed It: Launch Links - July, 2017 #5

by WilmerHale on

Some interesting links we found across the web this week: How to Successfully Go About Acquiring Another Startup - Sometimes your startup can achieve goals quicker through an acquisition. ...more

Gavel to Gavel: Preventing data breaches

by McAfee & Taft on

The risk data breaches and cyberattacks pose to small businesses cannot be overstated. Roughly half experienced a breach within the past year at an average cost of $665,000 and immeasurable lost revenue. Worse yet,...more

Compliance Lessons From Uber: Takeaways for Tech Startups

by Nilan Johnson Lewis PA on

While the media has widely covered the resignation of Uber’s CEO Travis Kalanick, it has largely ignored important lessons that tech startups can draw from Uber’s experience. In fact, the series of events leading up to...more

Compliance into the Weeds-Episode 40, COSO ERM Framework Update

by Thomas Fox on

In this episode Matt Kelly and I take a deep dive into the revisions to the COSO ERM Framework, which were based on comments by practitioners. We consider the role of culture and risk, the integration of the COSO ERM...more

Compliance’s Role in Preventing the Next “WannaCry” Cyberattack

by NAVEX Global on

The global chaos unleashed by the WannaCry ransomware virus reinforces that cyberattacks are not just the problem of IT departments. Compliance must play an integral part of any organization’s cross-functional cybersecurity...more

Harvesting Innovation: 3 Tips for IP Managers

If you have ever gone apple picking in late season, you may recall seeing more apples on the ground than on trees. As you begin picking apples, you realize why. You haphazardly grab and yank an apple off a branch and the...more

Health Alert (Australia) May 1, 2017

by DLA Piper on

In This Issue: - Judgments; Legislation; and Reports. - Excerpts from Judgments: 21 April 2017 - ILS Rehab Pty Ltd v Josephine Borg (as administrator of the estate of the late Damien Robert Borg) [2017] NSWSC 442...more

Navigating the IoT Workplace Quagmire

by Morgan Lewis on

The Internet of Things (IoT) promises a societal transformation based on a virtuous circle of constantly improving connectivity, integration, data, intelligence, and automation. One important element of this transformation is...more

Real Answers to Common Questions on Cybersecurity

by NAVEX Global on

Q: In my company, the IT directors see cybersecurity as an IT and software issue to be solved with software and hardware. How do I convince the team that employees need to also be trained on risky behavior – something that...more

Law à la Mode: The future of retail; Green fashion; E-commerce in China; Brexit update: trademarks and design; and more (UK) Issue...

by DLA Piper on

Management, a Belgian national and expert on retail management and customer experience for fashion, department stores and home improvement retailing. He tells us about the changes he has seen in the retail sector over the...more

Avoid Paying The Piper: Tune Your Startup to Avoid Harassment Claims

by Seyfarth Shaw LLP on

Seyfarth Synopsis: Heeding some lessons from HBO’s “Silicon Valley” can help employers avoid mistakes related to potential hostile work environments and discrimination that might occur in a startup environment. In a...more

Privacy Perils: Social Engineering Fraud - the C-Suite Maneuver

by Bass, Berry & Sims PLC on

It's a common misconception that cyber-criminals use sophisticated technical tools to hack into a person's computer or online accounts. More often than not, cyber attackers use old fashioned trickery or "social engineering"...more

Data Privacy and Security: A Practical Guide for In-House Counsel, 2017 Edition

by Bryan Cave on

Boulder Partner David Zetoony published the 2017 edition of his handbook, Data Privacy and Security: A Practical Guide for In-House Counsel, on Jan. 28 – Data Privacy Day. The guide provides an overview of laws relevant to a...more

Intertwining allegations and information… the case of the misused password

by Dentons on

In the case of Eiger Securities LLP v. Korshunova UKEAT/0149/16 the EAT considered what amounted to a protected disclosure when bringing a whistleblowing claim. ...more

Compliance Role in Mitigating Cyber Mayhem

by NAVEX Global on

In recent years, attention has been drawn to the impact of cyber and data breaches and the extent to which our organizations remain vulnerable to these threats. The cost of cyber and data security breaches is well known and...more

In Case You Missed It: Launch Links - September, 2016 #4

by WilmerHale on

Some interesting links we found across the web this week: The Hacking Law That Can’t Hack It - For 30 years and counting, courts have struggled with the vagaries of the Computer Fraud and Abuse Act, a federal law...more

Keeping Chinese tech talent

by DLA Piper on

The Chinese government announced plans in May to promote innovation-driven development, with the aim of becoming an 'innovative nation' by 2020, an international leader in innovation by 2030, and a scientific and...more

Rise of the robots

by White & Case LLP on

Experts warn of the threat posed by super-intelligent machines, but what does this new era of automation mean for the future of work as we know it? Earlier this year, the Japanese office of advertising agency McCann...more

98 Results
|
View per page
Page: of 4
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.