How to Balance Diverse Views in the Office
Off the Clock, On the Radar: Managing Off-Duty Conduct and Workplace Impact
Navigating Employee Integration in Mergers and Acquisitions: Lessons From Pretty Woman — Hiring to Firing Podcast
Legal Shifts in 2025 Put Employer Non-Compete Strategies at Risk - Employment Law This Week® - Spilling Secrets Podcast
Workplace ICE Raids Are Surging—Here’s How Employers Can Prepare - #WorkforceWednesday® - Employment Law This Week®
California Employment News: Gathering Information in a Workplace Investigation – Part 2 (Featured)
Handling References and Referrals While Safeguarding Your Business
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Multijurisdictional Employers, Part 1: Independent Contractors vs. Employees
Work This Way: A Labor & Employment Law Podcast - Episode 42: Non-Compete Agreements with Mitchell Greggs of Maynard Nexsen
Creativity and Compliance: Innovating Ethics - Creativity in Corporate Compliance with Katie Lawler
Culture Crafters: Preventing and Fixing a Cultural Disconnect
DE Talk | Using Employment Networks to Connect with Individuals with Disabilities in an Ever-Changing Workforce
Work This Way: A Labor & Employment Law Podcast - Episode 33: Generations in the Workplace with Caroline Warner of The South Carolina Power Team, Part 1
Managing Employee Compliance in Highly Regulated Industries — Hiring to Firing Podcast
The Labor Law Insider: Recent U.S. Supreme Court, NLRB Decisions Highlight Labor Issues in Higher Education
Podcast - The Latest on Antitrust and Non-Compete Agreements in Healthcare
Episode 16 | The Basics for Building Your Workforce
Protecting Trade Secrets When Facing Lawsuits or Alternative Dispute Resolution Procedures
Episode 138 -- Employee Relations and Engagement in the COVID-19 Pandemic Era
Employers are increasingly monitoring and filtering the web browsing habits of employees. The Commission Nationale de l’Informatique et des Libertés (CNIL) recently released new guidance (for public comment) on how...more
A federal district court recently found that employees aren’t protected by Kentucky’s consumer protection law because they don’t qualify as consumers, handing a solid win to employers. The April 21 decision in Viviali v. One...more
The Trump administration has systematically fired federal privacy- and security-focused employees since taking office. Three members of the bipartisan, independent agency, the Privacy and Civil Liberties Oversight Board...more
As we become more accustomed to using our faces or fingerprints to unlock devices in our everyday life, it’s not surprising that employers in Hong Kong are considering using biometric systems in the workplace. However,...more
As of November 1, 2024, financial services companies regulated by the New York Department of Financial Services Cybersecurity Regulation face new requirements relating to cybersecurity governance, encryption, and incident...more
Managing a remote cybersecurity team at colleges and universities involves addressing a unique set of challenges to ensure the security of sensitive data and infrastructure. There is an additional overlay of potential...more
From application to termination, employee privacy considerations live throughout all stages of the employment lifecycle. Thus, employers should take heed of best practices and mechanisms when handling employee personal...more
Cyber Resilience Programs Falling Short on Preparing Workers for a Crisis- “At two-thirds of organizations, there is a fear that almost all employees, 95%, will not understand how to recover following a cyberattack.” ...more
The construction industry is full of valuable business information including customer lists, pricing information, project budgets, and more. The value of such information may be lost if it becomes known to a competitor or the...more
As a number of recent headlines demonstrate, the U.S. Securities and Exchange Commission (SEC) and other regulators have fined and penalized employers and employees in the financial services industry for non-compliance with...more
Report on Patient Privacy Volume 23, no 2 (February 2023) DCH Health Systems, based in Tuscaloosa, Ala., said it fired an employee in December after a routine privacy audit revealed evidence that the worker had accessed some...more
Since the introduction of the Data Protection Act (the “DPA”) in 2017, there has been a steady increase in the number of data protection breaches that have been reported to the Office of the Ombudsman . It is expected that...more
Earlier this month, the governor of Colorado signed into law the Colorado Privacy Act (CPA), making Colorado the third state to enact a comprehensive data security law after California in 2018 and Virginia in March 2021. The...more
In the past decade, the prevalence of videoconferencing, social media, and other technological platforms have flooded college dorm rooms and boardroom meetings alike. The ubiquity of these technologies is unavoidable, and...more
As the COVID era drags on, it is clear that work life “post-COVID” may be very different from life “pre-COVID.” This is especially true as it relates to IT security. More and more employees have shifted to a telecommuting...more
Generally, contact tracing refers to an effort by public health officials to identify individuals with whom a patient who has tested positive for an infectious disease has been in close proximity. Public health officials will...more
As we are early into the new year, for many, hope springs eternal to get in shape during 2018. Many of us wear some kind of fitness activity tracker that monitors steps, heart rate, calories, sleep patterns, etc. Recent news...more
TheCloud: Good Morning! TheCloud is a leading cloud-based provider, striving to secure your apps, email and confidential data in the cloud. How may we help you today? Mr. Techie: My name is Mr. TechieTechie, I’m the CEO...more
There are several reasons an employer might have employee health information, ranging from the results of a pre-employment physical to the contents of a request for FMLA leave to what’s written in a health provider’s note...more
Cybersecurity researchers at the Dell SecureWorks Counter Threat Unit (“Dell CTU”) uncovered a network of approximately 25 fake LinkedIn profiles that Dell CTU believes were used by an Iran-linked hacker group to establish at...more
Florida businesses will soon have an important and powerful new legal cause of action to combat unauthorized access to protected computer systems or data by employees, former employees, directors, officers, and others....more