Current generation multifunction printer/scanner/copier devices are convenient, inexpensive, and very popular. Often overlooked is the fact that most modern printers, copiers, and scanners have many of the same attributes of computers, and are just as vulnerable to the same kind of cyber exploits and attacks as computers. A truly comprehensive data security and privacy risk ...Read more
On February 11, 2014, John Henitz and I spoke on a panel at the @Hospitality_Law 2014 Conference discussing maximizing coverage for large property and business interruption claims. We presented a hypothetical scenario in which Acme Hospitality is a full service Real Estate company that owns several hotels, including one in Galveston, Texas that a hurricane ...
Tags InsuranceRead more
The Department of Labor issued its Final Rule on Family Medical Leave Act (FMLA) rights on February 25, joining the Internal Revenue Service in adopting the “place of celebration”/“state of celebration” test. By virtue of this change, FMLA rights now extend to all workers in legal same-sex marriages regardless of the law of the state ...Read more
As you may have heard, the NLRB recently ruled that employees who are given access to their employer’s email system for their jobs must be permitted to use that email system during nonworking time to engage in protected activity, such as forming a union or discussing terms and conditions of employment. This ruling applies to ...Read more
Once data is held for ransom, there’s no guaranteed way to reclaim it — not even payment. Ransomware’s victims typically are those with the least protection. To avoid becoming a target, install strong security tools on your computer and mobile devices, back up data to a reliable cloud service, keep passwords in a secure location, ...Read more