Pierce Atw ood Em ploym ent Group
October 1 2 , 2 0 1 7
The Technology Challenge: Privacy, I nform ation Security and Com - - PowerPoint PPT Presentation
The Technology Challenge: Privacy, I nform ation Security and Com pliance Pierce Atw ood Em ploym ent Group October 1 2 , 2 0 1 7 INFORMATION SECURITY Risks, Systems, Breaches, Training Presented by: Vivek J. Rao Pierce Atw ood LLP ( 2 0 7
October 1 2 , 2 0 1 7
Presented by: Vivek J. Rao Pierce Atw ood LLP ( 2 0 7 ) 7 9 1 -1 1 7 1 vrao@pierceatw ood.com
Source: IBM Security, March 2017
Source: IBM Security, March 2017
– Outside counsel – Cybersecurity expert – Public relations consultant
Presented by: Daniel Strader Pierce Atw ood LLP ( 2 0 7 ) 7 9 1 -1 2 0 2 dstrader@pierceatw ood.com
16
17
18
19
20
relationship
21
“narrowest” seizure of property (e.g. customer lists, laptops, phones) necessary to prevent the propagation or dissemination of the trade secret
1. Injunction would be inadequate 2. Immediate and irreparable injury without seizure 3. Balance of hardships favors seizure 4. Likely to succeed on merits 5. Third party has property to be seized 6. Application describes property and location 7. Third party would destroy, move, hide, or otherwise make property inaccessible to the court 8. Applicant has not publicized the request
22
23
Confidentiality Policy
maintain secrecy of trade secrets during and following employment
improper use or disclosure
party (e.g., former employer) trade secrets
immunity language Electronic Communications Policy
to all technological controls
personal email for work purposes
personal cloud storage for work purposes
passwords Return of Employer Property
property, including electronic
than last day of employment
portable devices, state that device will be remotely wiped
24
25
26
Presented by: Lily B. Rao Pierce Atw ood LLP ( 2 0 7 ) 7 9 1 -1 1 7 2 lrao@pierceatw ood.com
28
29
30
31
32
33
34
35
36
37
Source: Pew Research Center (2014)
38
Source: Pew Research Center (2014)
39
40
41
42
43
44
45
Presented by: Katy Rand Pierce Atwood LLP (207) 791-1267 krand@pierceatwood.com
2
3
4
5
6
7
8
9
10
11
Presented by: Allan Muir Pierce Atwood LLP (207) 791-1365 amuir@pierceatwood.com
13
14
15
16
17
18
(B) information obtained regarding the medical condition or history of the applicant is collected and maintained on separate forms and in separate medical files and is treated as a confidential medical record, except that— (i) supervisors and managers may be informed regarding necessary restrictions on the work or duties of the employee and necessary accommodations; (ii)first aid and safety personnel may be informed, when appropriate, if the disability might require emergency treatment; and (iii) government officials investigating compliance with this chapter shall be provided relevant information
(C) the results of such examination are used only in accordance with this subchapter.
19
Presented by: Meg LePage Pierce Atwood LLP (207) 791-1382 mlepage@pierceatwood.com
21
22
remote ASL interpreters, communication access rela-time translation (“CART”), internet based real time transcription and video relay services.
about 100 videos are captioned.
provided him with transcripts or ASL interpreters instead.
transcripts at the time they are posted.
23
24
25
irritable bowel syndrome
4 days a week.
site attendance essential to Harris’ “highly interactive job.”
jobs that better suited telecommuting.
discrimination.
high absences.
retaliation for filing a charge.
26
27
28
Presented by: Tony Derosby Pierce Atwood LLP (207) 791-1343 aderosby@pierceatwood.com
Balancing Risk and Efficiency
generate and retain Form I-9s, provided:
The resulting form is legible; There is no change in the name, content or sequence of the data elements and instructions; No additional data elements or language is inserted; and All standards specified in the regulations are met.
30
paper and digital generation or storage systems, provided the system includes:
Reasonable controls to ensure integrity, accuracy and reliability; Reasonable controls designed to prevent and detect the unauthorized
deterioration of Form I-9s; An inspection and quality assurance program that regularly evaluates the system and includes periodic checks of digitally stored I-9s; An indexing system that allows identification and retrieval; and The ability to reproduce legible and readable paper copies.
31
storage systems, provided all I-9s remain fully accessible and compliant with the rules.
systems as long as each system continues to meet all performance requirements.
must maintain and make available upon request complete descriptions of the system and procedures relating to use, as well as an indexing system that allows retrieval of relevant documents.
32
using a digital signature, the system must allow signatories to acknowledge that they read the Form I-9 attestation and attach the e-signature to the form I-9.
Attach the e-signature at the time of the transaction; Create and preserve a record of the identity of the person producing the signature; and Upon employee request, provide a printed confirmation of the transaction.
to complete Section 2 must attest to inspection of original documents.
33
effective records security program that
Ensures only authorized personnel have access to the records; Provides for back-up and recovery to protect against information loss; Ensures that employees are trained to minimize risk of unauthorized or accidental erasure or alteration; and Ensures that the system creates a secure and permanent record that establishes date of access, identity, and particular action whenever an individual creates, completes, updates, modifies, alters or corrects a digital record.
34
verify.
award date for any new federal contract with a FAR clause.
information occurs.
including periodic risk assessments, subordinate plans, security awareness training, periodic testing, corrective processes, COOPs, and appropriate user rules.
35
Presented by: Jim Erwin Pierce Atwood LLP (207) 791-1237 jerwin@pierceatwood.com
37 20000 40000 60000 80000 100000 120000 <5 5‐9 10‐14 15‐19 20‐24 25‐29 30‐34 35‐39 40‐44 45‐49 50‐54 55‐59 60‐64 65‐69 70‐74 75‐79 80‐84 >84
Age Cohort
Source: US Census
‐100,000 ‐50,000 50,000 100,000 150,000 200,000 250,000 <15 15‐24 25‐34 35‐44 45‐54 55‐64 65+ Δ 2000‐10 2010
38
Source: MDOL
‐100,000 ‐50,000 50,000 100,000 150,000 200,000 16‐19 20‐24 25‐34 35‐44 45‐54 55‐64 65+ Δ 2000‐12 2012
39
Source: MDOL
40
Source: MDOL
62.00% 63.00% 64.00% 65.00% 66.00% 67.00% 68.00% 69.00% 70.00% 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012
41
42
Source: MDOL
43
Source: MDOL
44
0% 10% 20% 30% 40% 50% 1995 1999 2003 2007 2011
45
46
47
48
49
50
Source: John Dorrer
51
52
53
54
55
56
57
58
59
60
61
62
63