News & Analysis as of

Employees Data Security

Cooley LLP

How to (Appropriately) Use AI to Take Notes

Cooley LLP on

Recently, I blogged about considerations to ponder when deciding which situations are appropriate to use AI to help you take notes. I offered the reasons why it’s never appropriate to use AI to take notes at board and board...more

Fox Rothschild LLP

Web Filtering: What Employers Need to Know

Fox Rothschild LLP on

Employers are increasingly monitoring and filtering the web browsing habits of employees. The Commission Nationale de l’Informatique et des Libertés (CNIL) recently released new guidance (for public comment) on how...more

Clark Hill PLC

Employers: A cautionary tale about new cyber threats involving employee handbooks

Clark Hill PLC on

Cybercriminals are obtaining copies of real or fake employee handbooks and distributing them by email, spoofing a legitimate employer email address so that the email and its attachment appear authentic. The email asks the...more

Jackson Lewis P.C.

Different Country, Same Challenges: Lessons from a Breach That Could Have Been Prevented

Jackson Lewis P.C. on

A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more

Ius Laboris

Implementing AI Guidelines in Hong Kong

Ius Laboris on

Hong Kong’s Privacy Commissioner for Personal Data (PCPD) recently published Guidelines for the Use of Generative AI by Employees. We look at the key points contained in the Guidelines below....more

Robinson+Cole Data Privacy + Security Insider

Employees Hiding Use of AI Tools at Work

A new study by Ivanti illustrates that one out of three workers secretly use artificial intelligence (AI) tools in the workplace. They do so for varying reasons, including “I like a secret advantage,” “My job might be...more

Fisher Phillips

Court Confirms Kentucky Consumer Protection Act Doesn’t Cover Employees, But Legal Risks Remain: 5 Steps for Employers to Avoid...

Fisher Phillips on

A federal district court recently found that employees aren’t protected by Kentucky’s consumer protection law because they don’t qualify as consumers, handing a solid win to employers. The April 21 decision in Viviali v. One...more

Schwabe, Williamson & Wyatt PC

Employees using free or unauthorized AI tools at work?

The rise of artificial intelligence has brought both opportunities and challenges to the workplace. However, a growing trend of employees using free or unauthorized AI tools poses significant risks, from security breaches to...more

Farella Braun + Martel LLP

Employers Must Be Vigilant to Protect Against Security Risks from Fraudulent Hires

The FBI is warning employers about increasing security risks from fraudulent job applications, resulting in hackers infiltrating companies and gaining access to sensitive data. To protect against these risks, employers should...more

Troutman Pepper Locke

Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast

Troutman Pepper Locke on

In this episode of Hiring to Firing, hosts Tracey Diamond and Emily Schifter explore eDiscovery processes and procedures with Alison Grounds, founder and managing partner of eMerge. Learn about the importance of eDiscovery in...more

Robinson+Cole Data Privacy + Security Insider

Insight Into DOGE’s Access to HHS’ Systems

Becker’s Hospital Review reports that the Department of Government Efficiency (DOGE) “has access to sensitive information in 19 HHS databases and systems,” according to a court filing obtained by Wired. HHS provided the...more

Wolf, Greenfield & Sacks, P.C.

Spring Cleaning and Tune-up for Your Trade Secret Portfolio: Eight Steps

Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more

Purpose Legal

How to Prevent Data Exfiltration and Protect Your IP – Q&A with Steve Davis

Purpose Legal on

What exactly is data exfiltration, and why should organizations be concerned about it? Data exfiltration is the movement or migration of company-owned trade secrets or intellectual property outside of the enterprise. It...more

Littler

Considerations for Artificial Intelligence Policies in the Workplace

Littler on

In recent years, many organizations have implemented new policies on artificial intelligence (AI) use to help prevent bias, plagiarism, or use of AI tools that produce inaccurate or misleading information. Meanwhile, many...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #433 – Privacy and Security Personnel Throughout Federal Government Fired

The Trump administration has systematically fired federal privacy- and security-focused employees since taking office. Three members of the bipartisan, independent agency, the Privacy and Civil Liberties Oversight Board...more

Ius Laboris

Saving Face: 5 Top Tips for Using Biometric Data in the Workplace

Ius Laboris on

As we become more accustomed to using our faces or fingerprints to unlock devices in our everyday life, it’s not surprising that employers in Hong Kong are considering using biometric systems in the workplace. However,...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #426 – CyberArk Report Confirms Employees Bypass Cybersecurity Policies

CyberArk, an identity security provider, has issued a new report on employee risk that is a must-read for IT Professionals and executives. The report highlights several findings that are directly related to the risks...more

Quarles & Brady LLP

New York DFS Cybersecurity Regulation Outlines Actions with High ROI

Quarles & Brady LLP on

As of November 1, 2024, financial services companies regulated by the New York Department of Financial Services Cybersecurity Regulation face new requirements relating to cybersecurity governance, encryption, and incident...more

Spilman Thomas & Battle, PLLC

Remote Work Strategies for Managing Cybersecurity Teams

Managing a remote cybersecurity team at colleges and universities involves addressing a unique set of challenges to ensure the security of sensitive data and infrastructure. There is an additional overlay of potential...more

Spilman Thomas & Battle, PLLC

Are Privacy Policies Alone Enough to Protect Employee Privacy? Ask Tesla

From application to termination, employee privacy considerations live throughout all stages of the employment lifecycle. Thus, employers should take heed of best practices and mechanisms when handling employee personal...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 5, May 2023

Cyber Resilience Programs Falling Short on Preparing Workers for a Crisis- “At two-thirds of organizations, there is a fear that almost all employees, 95%, will not understand how to recover following a cyberattack.” ...more

Bradley Arant Boult Cummings LLP

Collision at the Intersection of Construction and Intellectual Property Law: Are You Protecting Your Firm's Trade Secrets?

The construction industry is full of valuable business information including customer lists, pricing information, project budgets, and more. The value of such information may be lost if it becomes known to a competitor or the...more

J.S. Held

Off-Channel Communications: How Financial Services Organizations Can Address Regulators’ Latest Target

J.S. Held on

As a number of recent headlines demonstrate, the U.S. Securities and Exchange Commission (SEC) and other regulators have fined and penalized employers and employees in the financial services industry for non-compliance with...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 23, Number 2. Privacy Briefs: February 2023

Report on Patient Privacy Volume 23, no 2 (February 2023) DCH Health Systems, based in Tuscaloosa, Ala., said it fired an employee in December after a routine privacy audit revealed evidence that the worker had accessed some...more

McDermott Will & Schulte

Illinois Supreme Court Eliminates Defense to Biometric Privacy Class Actions

Illinois’ Biometric Information Privacy Act (BIPA) has spawned a tsunami of class actions against employers who utilize biometric timekeeping or security systems. Now, the Illinois Supreme Court in McDonald v. Symphony...more

39 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide