How Employers Can Adapt to Immigration Policy Shifts
ERGs: Valuable or Vulnerable?
Key Considerations for Companies Navigating Global Remote Work: Part 1 – Immigration
Workplace Sexual Assault and Third-Party Risk: What’s the Tea in L&E?
Daily Compliance News: August 11, 2025, The Boss Doesn’t Work Edition
Nationwide FLSA Lawsuits Just Got Harder—Here’s Why - #WorkforceWednesday® - Employment Law This Week®
Off the Clock, On the Radar: Managing Off-Duty Conduct and Workplace Impact
Daily Compliance News: July 22, 2025, The I-9 Hell Edition
Blowing the Whistle: What Employers Should Know About DEI & the False Claims Act
(Podcast) California Employment News: Creating the Report for a Workplace Investigation – Part 4 (Featured)
California Employment News: Creating the Report for a Workplace Investigation – Part 4 (Featured)
Essential Steps to Sell Your Business
Workplace Risks Meet Holistic Legal Solutions: One-on-One with Adam Tomiak
Legal Shifts in 2025 Put Employer Non-Compete Strategies at Risk - Employment Law This Week® - Spilling Secrets Podcast
Podcast - How Do You Define Success?
Hiring Smarter: Best Practices for Interviews: What's the Tea in L&E?
New Executive Order Targets Disparate Impact Claims Nationwide - #WorkforceWednesday® - Employment Law This Week®
Podcast - The Law as a Force for Change
Strategic HR Insights with Kelly Mitchell
Work This Way: A Labor & Employment Law Podcast - Episode 41: Employment & Labor Law Issues for Construction Companies with Bridget Blinn-Spears of Maynard Nexsen
Recently, we had interesting questions from a client that was implementing two-factor authentication for employees to access the company’s information systems. The process requires employees to install the authentication app...more
Is it time to revisit your organization’s Bring Your Own Device (BYOD) policies? The answer to this question is subjective, but doing so can be beneficial as the workforce and productivity behaviors change. Having a BYOD...more
On November 10, 2021, Germany’s Federal Labor Court (Bundesarbeitsgericht) ruled (Case No. 5 AZR 334/21) that employers must provide employed bicycle couriers with all the equipment essential for the performance of their...more
Perhaps no COVID-19 phenomenon will have a more lasting impact than the virtual office. Many employers recently marked the first anniversary of the decision to ask their employees to work from home in an effort to combat the...more
Many companies have implemented Bring Your Own Device (“BYOD”) policies. For some, it has been years since they were put in place. Has your policy withstood the test of time? Employees are using their devices differently than...more
Our increasingly connected world presents tremendous opportunities for employers as well as considerable confusion and risk. Should you Google a job applicant? Allowing employees to use their own mobile devices for work...more
Employees seem permanently attached to their smart phones today, but allowing employees to use their personal devices to make work calls, and send and receive work emails can carry substantial risks. ...more
Data security and privacy concerns have become one of the top issues keeping business leaders up at night. According to the Ponemon Institute’s 2018 study regarding the cost of data breaches, data breaches are increasingly...more
Many employers are moving towards a "Bring Your Own Device" (BYOD) program, in which employees are allowed to connect their own personal cell phones, iPads, and laptops to the employer's network and systems. ...more
We have previously posted on HR Headaches about the practical steps employers can take to protect their company’s trade secrets. ...more
Recent developments in privacy law and a rise in class action lawsuits related to data collection offer a cautionary tale about understanding legal and ethical boundaries of monitoring “on-the-clock” employee conduct. With a...more
Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more
For many companies, customer information ranks among its most important assets. Yet these days, employees often keep this sensitive customer information in electronic locations that are not readily accessible to or controlled...more
As technology continues to evolve, organizations are increasingly facing challenges concerning whether, and to what extent, they allow employees to utilize their own devices for work purposes. When employees use their own...more
BYOD — Bring Your Own Device - Should defendants be permitted to adopt a policy concerning employee use of personal computing devices in business that benefits the defendant and then hide behind that policy to its benefit...more
Many organizations struggle with whether to permit employees to use their own electronic devices (e.g., mobile phones, tablets, laptops) to conduct business on behalf of the organization. In addition to discovery challenges...more
By now, most employers are familiar with “Bring Your Own Device to Work” policies. These policies allow employees to access company information through their own computers, smartphones, tablets, etc. ...more
Many companies permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more
Some of us may remember a time when companies were not as concerned about where their information was maintained, as most of it was kept in some form or fashion in file cabinets or individual desks, or perhaps stored offsite...more
1: Accommodation in the Workplace - OVERVIEW - Employers have a duty to accommodate employees’ needs based on those grounds protected under federal and provincial human rights legislation. All employers are required...more
Seyfarth Synopsis: As OSHA’s enforcement relating to employee cell phone use gains more notoriety, it can be expected that it will have a significant collateral impact on law enforcement at all levels to address this hazard....more
There’s no denying it: Pokémon GO is a phenomenon. The smartphone game, in which players use their mobile device camera and GPS to capture, battle, and train virtual creatures, was released in the United States on July...more
The use of mobile devices in the workplace, including cell phones, tablets, and other devices, has generated significant risks for employers, both in terms of data security and of litigation strategy. Access to these devices...more
Learn how your company can prepare to act quickly and strategically to protect important relationships, information and trade secrets at the time that a key employee leaves. This webinar will review the latest developments in...more
I. OVERVIEW – THE MODERN LANDSCAPE - A. Physical Conduct PLUS Digital Activity - Traditional concerns for employers have included: conduct leading to liability to third-parties; “frolic and detour” or other...more