Back to School: 3 Essential Employee Trainings
The New EEOC Guidelines on Workplace Harassment
Managing Employee Compliance in Highly Regulated Industries — Hiring to Firing Podcast
What's the Tea in L&E? Supervisor Liability: What Managers Need To Know
Clocking in with PilieroMazza: The Labor Equation: Pricing for Success
Webinar: Is Your DEI Policy Setting You Up for a Lawsuit?
DE Talk Podcast | The Platinum Rule of Diversity, Equity, & Inclusion
DE Talk Podcast | Embracing Generational Differences at Work
What's the Tea in L&E? Truth Hurts or Rumors? Lizzo’s Harassment Allegations Serve As A Good Reminder
Transforming Leadership with Wisdom from the LGBTQ Community: On Record PR
DE Talk | From Human “Doing” to Human “Being”: Transforming to Own Your 50
Employment Law Now VII-137 - Training Managers to Manage and Avoiding The Peter Principle
DE Talk | Uncovering the Non-Traditional Workforce: Recruiting & Retaining Talent in Addiction Recovery
Cybersecurity: What Healthcare Providers Need to Know
DE Talk | Moving Off the DEIB “Treadmill” & Onto Progressive Change
Compliance Training & Adult Learning Theory
DE Talk | Top 5 Actions to Take After You Complete Your Affirmative Action Plan
What’s the Tea in L&E? Is There Such a Thing as a Purely Verbal Counseling?
California Employment News: The Basics of Mandatory Harassment Prevention Training
Podcast: California Employment News - The Basics of Mandatory Harassment Prevention Training
Insights for this month’s article are provided by ARDA members Gregory Szewczyk, partner at Ballard Spahr Practice Leader of the firm’s Privacy and Data Security Group, and Aaron Tantleff, partner in Foley & Lardner’s...more
Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more
The HIPAA Privacy, Security, and Breach Notification Rules apply to healthcare providers who engage in certain electronic transactions, healthcare clearinghouses, and health plans, including employee group health plans with...more
Healthcare data breaches are occurring more frequently and on larger scales than ever before – and while you defend against cyberattacks and other external threats, make sure you do not overlook the critical role your...more
Data privacy and security are a rapidly expanding area of regulatory activity and patient attention. For most health care providers, central data privacy and security legal obligations flow from the federal Health Insurance...more
Phishing has long been a favorite tactic for threat actors (hackers) to commence a cyberattack. The rapid expansion of more adaptable and available artificial intelligence (AI) technologies, such as natural language...more
Most human resources professionals are concerned about the privacy and security of the vast amounts of personal information they manage. This article discusses steps to consider taking against the challenges. Deluge of...more
As artificial intelligence (“AI”) technology continues to advance, more and more people are logging on and experimenting with the technology. ChatGPT, one free and popular AI, is reportedly the fastest-growing consumer...more
Throughout 2022, we continue to see regulators placing an emphasis on the importance of protecting and securing information, in particular consumer personal information, at both the federal and state levels. ...more
In a recent post, we highlighted the need for a privacy and cybersecurity training program, one not solely focused on spotting phishing attempts (although that is quite important as well). A primary reason, quite simply, is...more
The global food and beverage e-commerce market is expected to grow to $22.4 billion in 2020, possibly reaching $36.4 billion in 2023. That’s up from $14.9 billion in 2019. Food and beverage e-commerce revenue in the United...more
Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more
Organizations that meet the definition of "covered entity" under the Health Insurance Portability and Accountability Act of 1996 and its implementing regulations (HIPAA) must be diligent to maintain the privacy and security...more
In our last article, we showed you how to evaluate where your organization sits on the landscape of readiness and preparedness. In this concluding article, we identify concrete steps you can immediately employ to move your...more