Back to School: 3 Essential Employee Trainings
The New EEOC Guidelines on Workplace Harassment
Managing Employee Compliance in Highly Regulated Industries — Hiring to Firing Podcast
What's the Tea in L&E? Supervisor Liability: What Managers Need To Know
Clocking in with PilieroMazza: The Labor Equation: Pricing for Success
Webinar: Is Your DEI Policy Setting You Up for a Lawsuit?
DE Talk Podcast | The Platinum Rule of Diversity, Equity, & Inclusion
DE Talk Podcast | Embracing Generational Differences at Work
What's the Tea in L&E? Truth Hurts or Rumors? Lizzo’s Harassment Allegations Serve As A Good Reminder
Transforming Leadership with Wisdom from the LGBTQ Community: On Record PR
DE Talk | From Human “Doing” to Human “Being”: Transforming to Own Your 50
Employment Law Now VII-137 - Training Managers to Manage and Avoiding The Peter Principle
DE Talk | Uncovering the Non-Traditional Workforce: Recruiting & Retaining Talent in Addiction Recovery
Cybersecurity: What Healthcare Providers Need to Know
DE Talk | Moving Off the DEIB “Treadmill” & Onto Progressive Change
Compliance Training & Adult Learning Theory
DE Talk | Top 5 Actions to Take After You Complete Your Affirmative Action Plan
What’s the Tea in L&E? Is There Such a Thing as a Purely Verbal Counseling?
California Employment News: The Basics of Mandatory Harassment Prevention Training
Podcast: California Employment News - The Basics of Mandatory Harassment Prevention Training
If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more
2023 was the most devastating year yet for ransomware attacks, with businesses forking over $1 billion in ransom payments for the first time ever – and 2024 is expected to be even worse. Beyond the payments, the average cost...more
Throughout 2022, we continue to see regulators placing an emphasis on the importance of protecting and securing information, in particular consumer personal information, at both the federal and state levels. ...more
The Federal Trade Commission has reached a settlement in the matter of CafePress. Here are some things you should know: Data minimization: •Storing information indefinitely on your network without a business need creates...more
Today, the U.S. Department of Labor’s Employee Benefits Security Administration (EBSA) issued much anticipated cybersecurity guidance for employee retirement plans. This comes more than four and a half years after the ERISA...more
The FTC recently summarized three major changes it made to its orders in data security cases. In a blog signaling these changes, the FTC Indicated that some of the things it has been requiring of companies in 2019 are here to...more
October is National Cybersecurity Awareness Month (NCAM). NCAM serves as a timely reminder to continue to assess and improve organizational cybersecurity. In honor of NCAM, here are five fundamental steps that every...more
California’s San Diego Unified School District recently disclosed that it had sustained a data breach when multiple phishing emails from malicious hackers were used to gather login information of staff members throughout the...more
Organizations that meet the definition of "covered entity" under the Health Insurance Portability and Accountability Act of 1996 and its implementing regulations (HIPAA) must be diligent to maintain the privacy and security...more
In late December, New York State’s Department of Financial Services (“DFS”) released its revised proposed cybersecurity regulation (the “DFS Rule”). While the revisions pare back some of the DFS Rule’s original requirements...more
On Dec. 28, 2016, the New York State Department of Financial Services (NYDFS) published a revised version of its “Cybersecurity Requirements for Financial Services Companies” (the “Regulations”). The revised Regulations...more
On September 13, 2016, the New York State Department of Financial Services (DFS) proposed new rules that would require certain “Covered Entities” to establish and implement cybersecurity programs designed to protect nonpublic...more
In the two decades since its original passage, complying with the federal Health Insurance Portability and Accountability Act (HIPAA) hasn’t gotten any easier. Enacted with the primary goal of protecting the confidentiality,...more