Employment Law This Week®: DOL’s Final Overtime Rule, CA Codifies “ABC Test,” Pay Data Collection Beyond 2018, NLRB’s Busy Summer
DOJ Appeals Ruling on Pay Data Collection - Employment Law This Week® - Trending News
II-26 – Superbowl Concerns, Tax Reform/MeToo, Restrictive Covenant Crimes, and Expanded Religious Discrimination Theories
I-23- Stunning End-Of-Year NLRB Developments: An Extensive Interview With Former NLRB Associate General Counsel Barry Kearney
K&L Gates Triage: Reading the Fine Print: A Closer Look at the Proposed Regulation over Arbitration Clauses in Long-Term Care Resident Agreements
Wireless Legislation on the Way?
Polsinelli Podcast - An International Trade Issue That May Impact Your Business
Polsinelli Podcast - Conducting Business With the Obama Administration
Federal contractors, including defense contractors, should prepare for the emergence of new requirements in the coming months that are designed to strengthen software supply chain security, impose more stringent cybersecurity...more
In the wake of Edward Snowden’s disclosures, the United States administration faced a daunting series of challenges on surveillance, cybersecurity, and privacy. Congress was reluctant to enact comprehensive legislation....more
This year has been a busy year for education law in the area of data privacy. Educational institutions continue to be a rich target for hackers. Additionally, there were some important developments in the interpretation of...more
It has been reported that the White House is investigating a hacking of the Gmail account of a contract worker who was working on the First Lady’s advance team responsible for logistics. The hacking included emails from...more
On October 30, the White House released a memorandum to the heads of federal departments and agencies detailing the Cybersecurity Strategy and Implementation Plan (“CSIP”), a proposal designed to update and bolster federal...more
On August 30, 2015, the Washington Post broke a story that the Obama administration is developing a package of economic sanctions that will target Chinese companies and individuals who have benefitted from cybertheft. The new...more
U.S. officials have blamed Chinese government-backed attackers for many of the recent cyber attacks on U.S. government and business computer networks: “Researchers and government officials have determined that the Chinese...more
You may have missed it this past weekend, but reports indicate the United States is considering sanctioning Chinese companies and individuals who have benefited from their government’s alleged cyber hacking of U.S. trade...more
We’ve been talking potential bias in big data for some time now, and last week’s news was full of concerns about just that. The New York Times Upshot Blog interviewed a Microsoft computer scientist on the subject; NBC News...more
FCC Working Group Issues Report On Cybersecurity Best Practices – The June 2015 issue of the Intellectual Property & Technology Law Journal features an article by King & Spalding partner Steven Snyder on a Federal...more
Although most states have enacted some form of data privacy and breach notification laws, and certain federal statutory schemes cover specific industry sectors, there are no privacy protections for all personal data. Given...more
In This Issue - White House Releases Proposed Privacy Legislation - Lessons from the Anthem Data Breach - SEC and FINRA Release Results of Industrywide Cybersecurity Examination Sweeps - COSO Releases Report on...more
In This Issue: - The President’s Plan for Securing Cyberspace - The President’s Plan for Safeguarding American Consumers and Families - Conclusion - Excerpt from The President’s Plan for Securing...more
The Obama Administration's handling of cyber and data security was recently brought into question due to two distinct security incidents. On the same day that a former Administration official received a subpoena related to...more
Every day the headlines report another Fortune 500 company suffering a hacking incident. For companies, the hack itself creates substantial risks of economic devastation caused by the theft of valuable trade secrets. Add to...more