March 2018 is the deadline for compliance with a European Union law called the General Data Privacy Regulation, or GDPR, and many American businesses have been caught off guard.
How much do you really worry anymore about a breach of your credit card? If your card is lost or your number is stolen, a thief might make a purchase or two before the fraud is detected and the card is deactivated.
Strong anti-hacking and privacy protections exist under federal law. Businesses and their counsel need to understand the company's anti-hacking rights and remedies as well as the privacy limitations...
How much do you really worry much anymore about a breach of your credit card? If your card is lost or your number is stolen, a thief might make a purchase or two before the fraud is detected ...
Cyber attacks and costly accidental losses of sensitive personal and financial information are no longer confined to retailers like Target or Sony or banks and investment houses like JP Morgan.
The digital age has heralded an explosive growth in the volume of information created, stored and transmitted on computers and mobile devices, over the Internet and broadband, and on social media sites.
With
Ramey Sylvester
Cyber-attacks and costly accidental losses of sensitive personal and financial information are no longer confined to retailers like Target or Sony or banks and investment houses like JP Morgan.
With
Kevin Lin
Cyber attacks and costly accidental losses of sensitive personal and financial information are no longer confined to retailers like Target or Sony or banks and investment houses like JP Morgan.
Most businesses know (or should know by now) that they must comply with state and federal data security laws and regulations.
For the past two years, businesses have struggled with a law that unintentionally prohibited the use of non-competes in a host of legitimate situations.
Businesses reported more than 47,000 data security incidents in 2012 alone, and that is just a fraction of the total that actually occur annually.
The moral of the story for employers seeking to enforce non-solicitation agreements is that these agreements really do have teeth, and employers should seek appropriate relief from the courts to enforce them.
Employers frequently access and review data created or stored by employees on company-owned electronic devices, such as computers, laptops, tablets, and cellphones.
Non-competition agreements are vital tools for businesses to use to protect their confidential information and customer relationships from misappropriation by departing employees and competitors.
RSA 275:70 states as follows: "Prior to or concurrent with making an offer of change in job classification or an offer of employment, every employer shall provide a copy of any non-compete or non-piracy agreement that is part of the employment agreement to the employee or potential employee. Any contract that is not in compliance with this section shall be void and unenforceable. "
Based on Mondaq users readership, this author is ranked as Very Popular in United States for the topics, user groups and industry sectors listed below:
Topics
Finance and BankingFinancial ServicesWhite Collar Crime, Anti-Corruption & FraudCriminal LawPrivacy ProtectionPosition
Corporate/Company Secretary, Compliance OfficerIndustry
Consumer IndustriesMedia & InternetAerospace & DefenceFinancial Services & Insurance* Rankings are based on analysis of the last 12 months of Mondaq readership data across more than 25,000 contributing authors. To be ranked ‘Very Popular’ an author must be in the top 20% of results within the selected criteria.