RSS icon

Top Stories

Data Security

Data Security

Articles

Cybersecurity and the NLRB

November 18, 2014
Comments (0)
The NLRB potentially is looking to expand its reach in the area of cybersecurity.
Read More

Do Your BYOD Employees Understand the Remote-Wipe?

September 11, 2014
Comments (0)
The employer must have the ability to remote-wipe an employee's BYOD device to remove its data.
Read More

Data Dilemma: What to Do When BYOD Workers Say ‘Bye’

June 6, 2014
Comments (0)
How a good BYOD policy should protect your data after employees leave the company.
Read More

How to Build a Healthy Website, Power Plant, Spacecraft or Workplace

October 29, 2013
Comments (0)
It’s hard to believe that no one raised warnings about obvious design and operability concerns. They were too profound and widespread for that not to have happened.
Read More

Creating a Secure 'Sandbox' on Employee Devices

April 2, 2013
Comments (0)
Companies are tackling questions of security on worker mobile phones and tablets by creating special compartments in the devices.
Read More

State Jobs Banks in Michigan May Not be Open to All

October 29, 2012
Comments (0)
Michigan officials have received calls from about 30 staffing and recruiting companies concerned with the policy. While the state is not changing the policy for now, a workaround is available, officials say.
Read More

Don't Forget These Five Security Issues in Your BYOD Policy

August 14, 2012
Comments (0)
Any successful bring-your-own-device program results from a synergy among the C-suite, legal, IT, HR, and risk management. Involve all of these departments to make sure that your BYOD program is successful, and addresses all necessary security issues.
Read More

Disturbing Study About (Mis)Use of Employers' Confidential Information

April 9, 2012
Comments (0)
Welcome to our new Workforce blog, the Practical Employer. And meet our new blogger, employment law expert Jon Hyman. His debut post addresses the touchy topic of where Internet Protocol awareness starts. It should begin, he says, with a clear set of policies and agreements that prioritize the confidentiality of your information and data.
Read More

Survey: Crowd Sourcing a Second Job for Many

December 22, 2011
Comments (0)
Crowd sourcing can involve breaking up a large task such as validating data or translation into many small tasks and farming them out to numerous workers online instead of hiring a single worker or small number of workers to do the single large task.
Read More

Hr Jobs

Loading
View All Job Listings