The Labor Law Insider: Whistleblower Breaks Details of NLRB Mail Ballot Election Abuse
What's the Tea in L&E? Why You Need Policies for Temps and Other Contractors
Fintech Focus Podcast | Managing a Workforce in a Regulated Environment
(Podcast) California Employment News: Understanding ADA/FEHA Requirements and the Interactive Process
California Employment News: Understanding ADA/FEHA Requirements and the Interactive Process
Exploring Employment Law Across Borders: Italy vs. US With White Lotus — Hiring to Firing Podcast
Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
#WorkforceWednesday®: Staples Sued Over MA’s Lie Detector Notice, NJ’s Gender-Neutral Dress Code, 2024 Voting Leave Policies - Employment Law This Week®
Employment Law Now VIII-150 - The FTC Noncompete Rule is Dead: What Now?
Employment Law Now VIII-149 - Part 2 of 2: The Final Interview With EEOC Commissioner Keith Sonderling
(Podcast) California Employment News: Court Ruling Halts FTC’s Non-Compete Ban – Implications for Employers
#WorkforceWednesday®: What the FTC Non-Compete Ban Block Means for Employers - Employment Law This Week®
What's the Tea in L&E? Are "Furries" Protected in the Workplace?
Employment Law Now VIII-148- Part 1 of 2: The Final Interview With EEOC Commissioner Keith Sonderling
Back to School: 3 Essential Employee Trainings
The Chartwell Chronicles: New Jersey Attorney Fees
Work This Way: A Labor & Employment Law Podcast - Episode 30: Plaintiff Legal Trends with Paul Porter of Cromer, Babb & Porter
PODCAST: Williams Mullen's Benefits Companion - Employment Law Edition: The Latest on Non-Competes and Independent Contractors
The Burr Broadcast: OSHA Clarifies Work-Relatedness of Employee Injuries While Traveling
Labor Law Insider - Collective Bargaining: Ins and Outs, Nuts and Bolts, Part II
In our June Privacy & Cybersecurity Update, we review new data privacy laws in Colorado, Connecticut, Florida and Montana; Verizon’s annual Data Breach Investigations Report; AM Best’s report on cyber insurance trends; and...more
Many prominent tech companies have recently conducted mass layoffs—some as a response to the slowing economy, and others to correct for pandemic hiring sprees. Whatever the reason, one of the risks that arise when laying off...more
Each month, Nossaman's complimentary Employment BUZZ webinar series covers a different topic of interest to employers, including tax, insurance, intellectual property and employment issues. These "quick hit" 30-minute...more
By now, we are all too familiar with the issues and pitfalls associated with cybersecurity breaches in a multitude of industries. Consider Equifax, Home Depot, Yahoo or Target, to name a few. Those well-publicized incidents...more
Recently, the Supreme Court of Pennsylvania issued a landmark decision in Dittman v. UPMC, 2018 Pa. LEXIS 6051 (Pa. Nov. 21, 2018) in which employers now have an independent duty to protect employee data from cyberattacks....more
Expanding the Boundaries of Coverage in the Face of Evolving Risks - Advances in technology, social change, new regulations—developments like these challenge companies’ risk-mitigation efforts and insurance programs. As the...more
Issues of digital privacy are multi-faceted and extend far beyond the now-routine data breaches that make headlines. The digital collection, use, and storage of biometric information (fingerprints, retinal or iris scans,...more
The New Jersey State Bar Association recently met to discuss, among other things, our favorite topic: Cybersecurity. (Perhaps our esteemed Privacy, e-Communication and Data Security Practice Group chair was there….) We wanted...more
The use of mobile devices in the workplace, including cell phones, tablets, and other devices, has generated significant risks for employers, both in terms of data security and of litigation strategy. Access to these devices...more
October ordinarily brings the return of crisp air, fall foliage and Halloween. This year, for the first time, it also brought National Cybersecurity Awareness Month. Yet designating a month to increase cybersecurity awareness...more
Please join us from Noon-1:00 p.m. CDT on Thursday, July 16 for an informative and timely webinar where we will address these questions: Did you know that hackers often use your employees to get into your company's...more
Breathing a sigh of relief that he neither works for U.S. agencies requiring security clearances nor do his hiring policies require the details of mental illnesses, drug and alcohol use, past arrests, bankruptcies, Joe Hyre...more
All employers have personnel data on their information technology systems and devices. This data includes personally identifiable information such as names, addresses, birth dates and Social Security numbers of employees and...more
Sony Pictures Entertainment, Inc. is the latest high-profile business victim of data theft. The consequences have been significant. In response to threats of violence, Sony has reconsidered its range of options for the...more
• Electronic data and credit card information can be compromised due to malware, phishing, spear phishing, data loss and data theft • The risk of cyber liability is real for ALL enterprises whether large or...more