Monthly Archives: March 2015

Don’t Forget Copiers, Scanners and Fax Machines in Your Data Security Program

Current generation multifunction printer/scanner/copier devices are convenient, inexpensive, and very popular. Often overlooked is the fact that most modern printers, copiers, and scanners have many of the same attributes of computers, and are just as vulnerable to the same kind of cyber exploits and attacks as computers. A truly comprehensive data security and privacy risk ...
Read more

Importance of Business Income From Dependent Properties Coverage

On February 11, 2014, John Henitz and I spoke on a panel at the @Hospitality_Law 2014 Conference discussing maximizing coverage for large property and business interruption claims. We presented a hypothetical scenario in which Acme Hospitality is a full service Real Estate company that owns several hotels, including one in Galveston, Texas that a hurricane ...
Read more

DOL Issues Final Rule Providing FMLA Rights to All Workers in Legal Same-Sex Marriages

The Department of Labor issued its Final Rule on Family Medical Leave Act (FMLA) rights on February 25, joining the Internal Revenue Service in adopting the “place of celebration”/“state of celebration” test. By virtue of this change, FMLA rights now extend to all workers in legal same-sex marriages regardless of the law of the state ...
Read more

How Does the NLRB’s Ruling on Non-Business Use of Email Affect Your Business?

As you may have heard, the NLRB recently ruled that employees who are given access to their employer’s email system for their jobs must be permitted to use that email system during nonworking time to engage in protected activity, such as forming a union or discussing terms and conditions of employment. This ruling applies to ...
Read more

Yikes! Ransomware Could Take Over Your Hard Drive

Once data is held for ransom, there’s no guaranteed way to reclaim it — not even payment. Ransomware’s victims typically are those with the least protection. To avoid becoming a target, install strong security tools on your computer and mobile devices, back up data to a reliable cloud service, keep passwords in a secure location, ...
Read more