Search Results (1006)
Documents on Labor And Employment, Internet & E-Commerce
Show: results per page
|Back to School - Avoiding Theft of Data and Money via the “Business Email Compromise” Scam|
Kevin Neil Ainsworth; Mintz Levin Cohn Ferris Glovsky Popeo P.C.;
September 21, 2016, previously published on September 8, 2016The FBI warned this summer that the “Business Email Compromise” (“BEC”) scam continues to grow, evolve, and target businesses of all sizes. As reported by the FBI in June, the scam had hit more than 22,000 victims for a combined dollar loss of greater than $3 billion -...
|Maison St-Patrice inc. v Cusson, 2016 QCTAT 482: Exclusion of Facebook Snooping Evidence in Québec — a minority view|
François Longpré; Borden Ladner Gervais LLP;
April 18, 2016, previously published on March 31, 2016This case deals with the admissibility of Facebook content as evidence. It arises in the context of a hearing before the Occupational Health and Safety Division of the new Québec Administrative Labour Tribunal. This tribunal results from the merger, as of January 1, 2016, of the Labour...
|Facebook Settles Derivative Lawsuit Challenging Outside Director Pay|
Lyle G. Ganske, Robert A. Profusek, Lizanne Thomas; Jones Day;
April 15, 2016, previously published on April 2016In settlement of a derivative lawsuit challenging compensation paid to Facebook's non-employee directors, Facebook agreed to submit its non-employee director compensation program, including specific equity grants, some historical grants, and retainer fees, to a vote of shareholders at its 2016...
|Employers Beware: Medical Identity Theft on the Rise and is the Golden Target for Hackers|
Lillian Chaves Moon; Jackson Lewis P.C.;
March 31, 2015, previously published on December 5, 2014As we’ve discussed previously, medical identity information is worth more than ten (10) times that of financial information on the black market. This gives hackers a financial incentive to obtain such information that is maintained not only by medical providers and pharmacies but also by...
|Top Five Tips for Employers Regarding Employee Use of Social Media|
Alana M. De Young; Modrall Sperling;
March 25, 2015Odds are that you, or at least one person you know, have at least some presence on social media, whether it be a Facebook or Instagram profile, a Twitter handle, a LinkedIn page, or a personal blog. Employers, too, are engaging more in social media in terms of marketing to clients, recruiting and...
|Honored in the Breach: Employer Action Items for an Insurer Data Breach|
Stephen A. Riga, Danielle Y. Vanderzanden, Timothy G. Verrall; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
March 19, 2015, previously published on February 5, 2015This morning, Anthem Blue Cross and Blue Shield, one of the largest health insurers in the country, notified its policyholders, members, and business partners that it was recently the target of an external cyber attack that appears to have comprised the confidentiality of medical and other personal...
|Will Companies Voluntarily Share Data Regarding Cyber Security at the President’s Request?|
Ashley Prickett Cuttino; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
March 19, 2015, previously published on February 16, 2015On Friday February 13, 2015, President Obama spoke at the White House Summit on Cybersecurity and Consumer Protection at Stanford University. After his address, President Obama signed an executive order, Promoting Private Sector Cybersecurity Information Sharing, that will encourage private...
|#SOTU2015: Employment, Immigration, Cyber Safety, and Education in a New Era|
Hera S. Arsen; Ogletree Deakins Nash Smoak Stewart P.C.;
March 10, 2015, previously published on January 20, 2015On the evening of January 20, 2015, President Obama delivered his sixth State of the Union address in the chamber of the U.S. House of Representatives with Supreme Court justices, members of Congress, the president’s cabinet, and special guests in attendance. The speech comes in the midst of...
|What Do Employers Need to Know in the Wake of the Latest Data Breach?|
Rebecca J. Bennett; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
February 25, 2015, previously published on December 22, 2014Sony Pictures Entertainment, Inc. is the latest high-profile business victim of data theft. The consequences have been significant. In response to threats of violence, Sony has reconsidered its range of options for the release and distribution of its feature film The Interview. Also last week,...
|The Line Out of This Place Is as Long as the Amazon.com River|
David J.B. Froiland; Foley & Lardner LLP;
October 30, 2014, previously published on October 20, 2014This month, the U.S. Supreme Court heard argument in a case that would seem to raise easy enough questions: When does an employee’s workday begin and end? What activities count as “work”? However, these questions have given way to tortured analysis and fairly arbitrary results.