Navigating Employee Integration in Mergers and Acquisitions: Lessons From Pretty Woman — Hiring to Firing Podcast
Legal Shifts in 2025 Put Employer Non-Compete Strategies at Risk - Employment Law This Week® - Spilling Secrets Podcast
Workplace ICE Raids Are Surging—Here’s How Employers Can Prepare - #WorkforceWednesday® - Employment Law This Week®
California Employment News: Gathering Information in a Workplace Investigation – Part 2 (Featured)
Handling References and Referrals While Safeguarding Your Business
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Multijurisdictional Employers, Part 1: Independent Contractors vs. Employees
Work This Way: A Labor & Employment Law Podcast - Episode 42: Non-Compete Agreements with Mitchell Greggs of Maynard Nexsen
Creativity and Compliance: Innovating Ethics - Creativity in Corporate Compliance with Katie Lawler
Culture Crafters: Preventing and Fixing a Cultural Disconnect
DE Talk | Using Employment Networks to Connect with Individuals with Disabilities in an Ever-Changing Workforce
Work This Way: A Labor & Employment Law Podcast - Episode 33: Generations in the Workplace with Caroline Warner of The South Carolina Power Team, Part 1
Managing Employee Compliance in Highly Regulated Industries — Hiring to Firing Podcast
The Labor Law Insider: Recent U.S. Supreme Court, NLRB Decisions Highlight Labor Issues in Higher Education
Podcast - The Latest on Antitrust and Non-Compete Agreements in Healthcare
Protecting Trade Secrets When Facing Lawsuits or Alternative Dispute Resolution Procedures
Episode 138 -- Employee Relations and Engagement in the COVID-19 Pandemic Era
Day 19 of One Month to More Effective Continuous Improvement-Use of Social Media for Continuous Improvement
A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more
A federal district court recently found that employees aren’t protected by Kentucky’s consumer protection law because they don’t qualify as consumers, handing a solid win to employers. The April 21 decision in Viviali v. One...more
The FBI is warning employers about increasing security risks from fraudulent job applications, resulting in hackers infiltrating companies and gaining access to sensitive data. To protect against these risks, employers should...more
What exactly is data exfiltration, and why should organizations be concerned about it? Data exfiltration is the movement or migration of company-owned trade secrets or intellectual property outside of the enterprise. It...more
Although the HHS Office for Civil Rights (OCR) described its recent $4.75 million agreement with a Bronx, New York, hospital as settling a “malicious insider cybersecurity investigation,” the agency considered a total of 11...more
Cyber Resilience Programs Falling Short on Preparing Workers for a Crisis- “At two-thirds of organizations, there is a fear that almost all employees, 95%, will not understand how to recover following a cyberattack.” ...more
Five former Memphis-based hospital employees and another man have pled guilty to unlawfully disclosing patient information in violation of HIPAA, U.S. Attorney for the Western District of Tennessee Kevin Ritz announced....more
Report on Patient Privacy Volume 23, no 2 (February 2023) DCH Health Systems, based in Tuscaloosa, Ala., said it fired an employee in December after a routine privacy audit revealed evidence that the worker had accessed some...more
As the COVID era drags on, it is clear that work life “post-COVID” may be very different from life “pre-COVID.” This is especially true as it relates to IT security. More and more employees have shifted to a telecommuting...more
It is tax season once again, and with it comes an increased threat of phishing scams targeting human resources and payroll personnel. In 2016, the IRS alerted employers to a then-emerging email phishing scheme in which...more
EXECUTIVE SUMMARY - 1. Cybersecurity threats. Cybersecurity preparedness is essential in 2018 as the risk of, and associated adverse impact of, breaches continue to rise. The past year redefined the upward bounds of the...more
If you are a business owner in the Inland Empire, what would you identify as the greatest threat to the security of your data? Is it hackers looking for credit-card numbers? Could it be foreign governments stealing industrial...more
Cybersecurity researchers at the Dell SecureWorks Counter Threat Unit (“Dell CTU”) uncovered a network of approximately 25 fake LinkedIn profiles that Dell CTU believes were used by an Iran-linked hacker group to establish at...more
There’s just no rest for employment lawyers this summer. We had another exciting week. The biggest news was the EEOC’s ruling that Title VII prohibits discrimination on the basis of sexual orientation. The agency found that...more
The FBI’s Internet Crime Complaint Center recently issued an alert “Criminals Continue to Defraud and Extort Funds from Victims Using Cryptowall Ransomware Schemes” that indicates that the Center continues to receive...more