Search Results (2135)
Documents on information services
Show: results per page
|Employers Receive Greater Protection under 4th Circuit: Two Free Slurs Rule|
September 25, 2014, previously published by The Gavel - Wong Fleming The Gavel, Diverse Viewpoints in the Law on Spring 2014What defines a hostile work environment has been and remains to be a formidable line neither employer nor employee wishes to touch let alone cross
|Statutory Limitation on the Collection of Personal Data of Job Applicants or Employees by the Employers|
Teresa Huang; Lee Tsai Partners Attorneys-at-Law;
July 17, 2014, previously published by To actively and effectively look for appropriate employees, employers in modern economy and society strive to understand the identity, backgrounds and competence of job applicants through all kinds of channels before employees are formally recruited. To this end, most employers tend to ask job seekers to provide a certain degree of personal information at the time of recruitment. However, whether such approach meets relevant provisions under existing labor laws and regulations and the requirements for privacy protection or whether all potential liabilities can be avoided if the employers also require information providers to sign a letter of consent seems to warrant further discussions and explorations.Statutory Limitation on the Collection of Personal Data of Job Applicants or Employees by the Employers
|Is it Ethical to Check Jurors’ Social Media Accounts?|
Jonathan T. Hyman; Kohrman Jackson & Krantz PLL;
July 2, 2014, previously published on June 23, 2014Every jury trial starts with what is called voir dire—a question-and-answer session between the lawyers and the pool of potential jurors. As lawyers, we are trying to deselect those jurors whom we feel would be unfairly biased against our case or our client. It is much more an art than a...
|Microsoft and Other Major Technology Companies Push Back Against Warrant to Access Data Held on Foreign Servers|
Lawrence R. Freedman, Ari Z. Moskowitz, Mark E. Schreiber; Edwards Wildman Palmer LLP;
July 1, 2014, previously published on June 26, 2014A dispute between Microsoft and the U.S. government over a search warrant could have major repercussions for cloud service providers. Historically, European data privacy and protection standards have been stricter generally speaking than those in the U.S. The "Safe Harbor" arrangement...
|Canada's New Anti-Spam Legislation: What Does It Mean for U.S. Nonprofits?|
Stuart P. Ingis, Tiffany M. Nichols, Michael A. Signorelli, Jeffrey S. Tenenbaum; Venable LLP;
June 24, 2014, previously published on June 2014Under Canada's new Anti-Spam Law (CASL), as of July 1, 2014, for-profit companies and nonprofit organizations engaged in marketing and fundraising campaigns from within Canada or to recipients in Canada must acquire prior "express consent" from recipients before sending commercial...
|FDA Issues “Receipt Date” Guidance for Electronic Submissions; Make Your Submissions Before Midnight With Time to Spare|
Kurt R. Karst; Hyman, Phelps & McNamara, P.C.;
February 14, 2014, previously published on February 11, 2014The Electronic Age has changed nearly every aspect of our daily lives, and the day-to-day operations of the U.S. Federal Government are no different. The government is no longer open for business from 9-5, but rather 24 hours a day by virture of electronic media. This 24-hour business day cycle is...
|Cybersecurity: Coming Soon to a Government Contract Near You|
Keir X. Bancroft, Rebecca E. Pearson, William L. Walsh; Venable LLP;
February 13, 2014, previously published on February 2014 Do you want to be eligible for government contracts in the future? Per President Obama’s Cybersecurity Executive Order, a DoD and GSA joint working group recently recommended how cybersecurity can be implemented in federal acquisitions. The White House has recommended that the joint working...
|DoD’s New Cybersecurity Rules On Unclassified “Controlled Technical Information”|
David M. Newman; Husch Blackwell LLP;
January 13, 2014, previously published on January 8, 2014The United States Defense Department has published a final cybersecurity regulation concerning unclassified “controlled technical information.” See 78 Fed. Reg. 69,273 (Nov. 18, 2013). The objective of the regulation is to require contractors to maintain “adequate security”...
|Data Brokers Under Scrutiny|
Mintz Levin Cohn Ferris Glovsky Popeo P.C.;
December 20, 2013, previously published on December 18, 2013The Senate Commerce Committee released this morning its majority staff report, A Review of the Data Broker Industry: Collection, Use, and Sale of Consumer Data for Marketing Purposes, on the practices data brokers use to collect and sell personal information of consumers and how those practices...
|The Growing Use of Information Technology in the Deliverance of Legal Services in the Middle East|
Rany J. SADER, Rebecca Younan; SADER & Associates (Advocates & Legal Consultants);
October 29, 2013, previously published on October 29, 2013The world we live in today has changed drastically through the advent of the Internet and developments in information technology. In fact, we are witnessing a cross-industrial change in the delivery of goods and services, and even a change in the goods and services themselves.