Showing 36 posts in News.
It's not hyperbole to say that the General Data Protection Regulation's May 25th enforcement date marks one of the largest shifts in the history of privacy laws. Read More ›
Influencer marketing on social media is a very big business. Here’s how it works: brands team up with individuals with large and engaged followings on social media platforms such as YouTube, Facebook and Instagram (i.e., “influencers”), and pay them to promote their products. Read More ›
Businesses are understandably concerned about negative reviews posted on popular websites such as Yelp, Facebook, and TripAdvisor. Read More ›
Supreme Court Strikes Down Provision of Lanham Act That Barred Registration of Disparaging Trademarks
The United States Supreme Court recently struck down a provision of the Lanham Act that denies registration of disparaging trademarks. Read More ›
The United States Department of Labor (the "DOL") published a request for comment in the Federal Register on July 6 with respect to its often discussed fiduciary rule (the "Fiduciary Rule"). This time, the DOL hopes to clarify uncertainty moving forward, as the Fiduciary Rule and its related prohibited transaction exemptions (the "PTEs") became partially effective on June 9, 2017, and will be fully implemented on January 1, 2018. However, recent events have brought the wisdom of a January 1, 2018 applicability date into question. Read More ›
On June 5, 2017, the United States Supreme Court held that employee benefit plans established by church-affiliated organizations are church plans pursuant to the church plan exemption under the Employee Retirement Income Security Act of 1974 (“ERISA”). Read More ›
Cyber attacks can be costly. Target recently reached a settlement with 47 states to pay $18.5 million, the largest multistate data breach settlement to date. In November 2013, Target's systems were infiltrated and 40 million customers' payment card information was stolen as was the personal information of 60 million customers. In addition to the settlement, Target paid for free credit monitoring services for consumers affected by the breach as part of a $10 million class-action lawsuit settlement. Read More ›
Categories: Cybersecurity, News
How does the "Hire American" portion of the "Buy American, Hire American" Executive Order impact H-1B visa applicants and start-up businesses?
Much ado has been made about the Trump administration's stance on immigration issues. Throughout the 2016 campaign and into the first months of the new presidency, immigration has been a hot-button issue that has consistently garnered media attention. Last month, the administration took one of its first major swings at immigration reform in putting into effect an Executive Order titled "Buy American and Hire American" (the "Executive Order.") The "Hire American" portion of this Executive Order focuses on the H-1B visa program, a program that is used to give skilled foreign workers a temporary visa, granting them work authorization to utilize their skills in the United States. This blog post will analyze the impact of the proposed reforms, and in particular, the impact of those reforms on startup businesses. Read More ›
We are all at risk for a cybersecurity breach. Speakers from Michigan State University, ASK and Foster Swift will help you determine the legal and technical processes you need to have in place. Learn more in this short video. Read More ›
Categories: Cybersecurity, News
Recently, international travelers have noticed US Customs and Border Protection agents with increased interest in searching cell phones, laptops, and other portable technology. Employers should be aware that this trend increases the risk that an unauthorized individual will access sensitive company information, which could result in an inadvertent data breach.
Some international travelers have been asked by border agents to unlock cell phones or provide a password needed to unlock the device. One report included a customs agent threatening to seize a travelers' phone if he did not unlock his cellphone. Employers are rightfully concerned that these searches may allow unauthorized individuals to access sensitive company information. Read More ›
- Radio Broadcasts
- IT Contracts
- Cloud Computing
- Employee Benefits
- Venture Capital/Funding
- Did you Know?
- Digital Assets
- Personal Publicity Rights
- Intellectual Property
- Electronic Health Records
- Fraud & Abuse
- Domain Name Registration
- Social Media
- Trade Secrets