pda

Financial Services Roundtable: Update on Compensation Trends in the Financial Services Industry




pda

ACA Update: Fees and Reporting Requirements




pda

2016 Employee Benefits Update - Rochester




pda

Washington State Legislative Updates

UPDATE: Since publication, we made a clarifying edit concerning the reasons an employee will be able to use paid sick leave under the amended law.

The Washington state legislature and certain localities recently passed several bills affecting employers, some of which have already been signed into law. These measures address non-compete agreements, mandatory employer-sponsored meetings, immigration reporting, paid leave, and the minimum wage. Each new bill or ordinance is discussed below. 

New Law Expands and Clarifies Non-Compete Statute




pda

EU Whistleblowing Directive – An Implementation Update

Protection of whistleblowers has been on the EU’s agenda for quite some time. Four years ago the EU issued the EU Whistleblowing Directive throughout its Member States.




pda

Whistle(Blowing) While You Work: An Update on Federal and Virginia State Whistleblower Retaliation Laws




pda

UK Whistleblowing Update: Three Key Cases

2024 has been a fruitful year in the UK for whistleblowing law so far, with three key cases employers should be aware of:

Can an external job applicant qualify as a whistleblower?

One of the very first questions to ask when presented with a whistleblowing claim in the UK is whether the person who made the disclosure was entitled to protection. The Employment Rights Act 1996 protects employees from dismissal, and protects employees and workers from detriment, for having made protected disclosures. But does it cover job applicants?




pda

Oregon Employment Law Update: Legislators Debate Big New Changes




pda

COVID-19: APAC Lockdown Restrictions (July Update)

We have created a high-level guide that gives an “at a glance” snapshot of the severity of lockdown restrictions in 15 countries across Asia Pacific (APAC).  The guide covers the following topics: 




pda

COVID-19: EMEA Lockdown Restrictions (June Update)

We have created a high-level guide that gives an “at a glance” snapshot of the severity of lockdown restrictions in 28 countries across Europe, the Middle East and Africa (EMEA). As COVID-19 developments across EMEA slow, the June guide will be the final monthly update of this guide and we will next update the guide when the information substantially changes. We hope you have found the content we have provided over the last 12 months useful.




pda

COVID-19 Vaccination: A Littler Global Guide on Legal & Practical Implications in the Workplace (January 2022 Update)

The Firm’s International Practice Group has once again updated its COVID-19 Vaccination: A Littler Global Guide on Legal & Practical Implications in the Workplace. Two years into the pandemic, experts agree that – in the absence of newly emerging and highly transmissible variants – COVID-19 might lose its pandemic status before the end of 2022 due to the development of various COVID-19 vaccines and increasing global vaccination rates.




pda

Littler COVID-19 Vaccine Employer Survey Report: Delta Variant Update

After more than a year of a crushing global pandemic, the early summer brought hope for a long-anticipated return to normal business operations, at least in the United States. But those plans were derailed by the rapid spread of the highly contagious delta variant and mounting COVID-19 infections. The abrupt change left companies – many of which had just updated plans with an eye toward a post-pandemic future – scrambling to adjust policies on such pressing issues as vaccination, return-to-office timing and mask wearing.




pda

Global Non-Compete Reform – At a Glance Tracker (Updated March 2024)

The United States is not the only country currently debating a reform to the law on non-competes. Notably, the UK Government has announced legislation that would limit the duration of non-competes to a period of 3 months after termination of employment.




pda

Updated FCRA Summary of Consumer Rights Released with a Mandatory Compliance Deadline of March 20, 2024

Updated March 24, 2023: The CFPB has edited its updated Summary of Rights document to include the correct contact number. 

*  *  *




pda

FDIC Approves Final Rule to Update Its Section 19 Regulations – Insured Depository Institutions Have Until October 1, 2024 to Comply

  • The FDIC has approved a final rule, effective October 1, 2024, to update its Section 19 regulations to conform to the Fair Hiring in Banking Act.
  • While the FDIC made certain clarifying changes based on public comments received, as predicted, the final rule largely aligns with the proposed rule.
  • Insured banks and credit unions must undertake a “reasonable, documented inquiry” to verify that a person with a covered offense on their record is not hired.




pda

Employment Law Update 2023: New Compliance Obligations for the New Year

2022 is coming to a close, and the new year will be here before we know it.  While many states, cities and counties seem to be willing to pass employment laws and regulations at any time, the first day of a new year is still the number one day for new employment laws to take effect. 2023 will be no exception. 




pda

IRS Updates FAQs on 1099-Ks Used for Gig Workers and Others

The IRS recently updated its guidance for completing Form 1099-K, used primarily by “gig” companies providing compensation using payment apps or online marketplaces and for individuals selling goods on online marketplaces such as Etsy. As background, in order to promote greater tax transparency and compliance, in 2008 Congress enacted Internal Revenue Code section 6050W to require that certain “third party network transactions” be reported on the then-new Form 1099-K.




pda

British Columbia Updates Rules for Investigations, Working Children

George Vassos explains new rules that broaden and clarify British Columbia’s ability to investigate employment compliance matters and tighten rules for hiring children younger than 16 years old.

SHRM Online

View (Subscription required.) 




pda

Regulatory Update: New Law Ends Sexual Harassment NDAs

In light of President Biden signing the Speak Out Act, Elizabeth A. Lalik, Lauren M. Bridenbaugh and Jim Paretti say this is a good time for employers to review their policies and practices for handling sexual harassment incidents that fall under all applicable federal and state statutes.

EHS Today

View




pda

2023 Update on False Claims Act Risks for Healthcare Employers




pda

#MeToo Update: The Adult Survivors Act for New York Employers

  • New York has enacted some of the most stringent #MeToo-related laws in the country, including the Adult Survivor’s Act (ASA), which extends temporarily the statute of limitations for bringing claims involving sexual offenses.
  • New York employers should therefore prepare to defend claims brought under the ASA, which could involve former employees and stale actions.




pda

DHS Announces Updated STEM Designated Degree Program List

On July 12, 2023, the U.S. Department of Homeland Security (DHS) updated the STEM Designated Degree Program List by adding eight new qualifying fields of study. The Program List is generally used to determine whether a degree completed by an F-1 nonimmigrant student qualifies as a science, technology, engineering, or mathematics (STEM) degree as determined by DHS.




pda

USCIS Updates Policy Guidance for International Students

The U.S. Citizenship and Immigration Services (USCIS) recently updated guidance in its policy manual regarding international students within F and M student classifications. This new guidance consolidates and provides greater clarity on existing policy for international students.




pda

Higher Education Labor Organizing Update




pda

USCIS Updates Guidance for F-1 Students on OPT and STEM OPT Eligibility

The F-1 nonimmigrant visa status allows noncitizens to study in the United States at U.S. colleges and universities. F-1 students may be eligible for off-campus employment under the following programs: Curricular Practical Training; Optional Practical Training (OPT); and Science, Technology, Engineering, and Mathematics Optional Practical Training Extension (STEM OPT). General eligibility requirements for off-campus F-1 employment include that the training be related to the student’s area of study and be authorized by the Designated School Official and U.S.




pda

Employment Law Update 2024: New Employment Laws for the New Year

The federal government, states, counties, and cities were active again this year passing workplace legislation intended for the most part to protect employees, creating new compliance obligations for employers. Littler’s Workplace Policy Institute (WPI) has been tracking these laws as they worked their way through the legislative and regulatory processes required for these changes to go into effect. Below is our annual summary of new laws and regulations employers will have to take into account in the first quarter of 2024.




pda

No April Foolin’ – OSHA Updates its Worker Walkaround Representative Regulation

On April 1, 2024, the U.S. Occupational Safety and Health Administration (OSHA) published its final rule clarifying that employees may designate a non-employee third party as their representative during an OSHA inspection.




pda

OSHA 101: Practical Inspection Guidance and Regulatory Updates




pda

2024 Massachusetts Employment Law Update




pda

2024 Legislative Update for Tennessee Employers




pda

Legal Update for Utah Employers




pda

2024 Maine Employment Law Update




pda

Annual California Legislative Employment Law Update




pda

Labor and Employment Law Update




pda

Labor and Employment Law Update




pda

Littler’s Labor & Employment Law Breakfast Series, Employment and Labor Laws Update




pda

2020 Legal Update




pda

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips. Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards.

Dive into six things that are top of mind for the week ending Oct. 25.

1 - CSA: How to prevent “shadow AI” 

As organizations scale up their AI adoption, they must closely track their AI assets to secure them and mitigate their cyber risk. This includes monitoring the usage of unapproved AI tools by employees — an issue known as “shadow AI.”

So how do you identify, manage and prevent shadow AI? You may find useful ideas in the Cloud Security Alliance’s new “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paper.

The white paper covers shadow AI topics including:

  • Creating a comprehensive inventory of AI systems
  • Conducting gap analyses to spot discrepancies between approved and actual AI usage
  • Implementing ways to detect unauthorized AI wares
  • Establishing effective access controls
  • Deploying monitoring techniques

 

 

“By focusing on these key areas, organizations can significantly reduce the risks associated with shadow AI, ensuring that all AI systems align with organizational policies, security standards, and regulatory requirements,” the white paper reads.

For example, to create an inventory that offers the required visibility into AI assets, the document explains different elements each record should have, such as:

  • The asset’s description
  • Information about its AI models
  • Information about its data sets and data sources
  • Information about the tools used for its development and deployment
  • Detailed documentation about its lifecycle, regulatory compliance, ethical considerations and adherence to industry standards
  • Records of its access control mechanisms

Shadow AI is one of four topics covered in the publication, which also unpacks risk management; governance and compliance; and safety culture and training.

To get more details, read:

For more information about AI security issues, including shadow AI, check out these Tenable blogs:

2 - Best practices for secure software updates

The security and reliability of software updates took center stage in July when an errant update caused massive and unprecedented tech outages globally.

To help prevent such episodes, U.S. and Australian cyber agencies have published “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers.

“It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements,” reads the 12-page document.

Although the guide is aimed primarily at commercial software vendors, its recommendations can be useful for any organization with software development teams that deploy updates internally.

 

 

The guide outlines key steps for a secure software development process, including planning; development and testing; internal rollout; and controlled rollout. It also addresses errors and emergency protocols.

“A safe software deployment process should be integrated with the organization’s SDLC, quality program, risk tolerance, and understanding of the customer’s environment and operations,” reads the guide, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the Australian Cyber Security Centre.

To get more details, read:

For more information about secure software updates:

3 - Report: GenAI, attack variety, data security drive cyber strategies

What issues act as catalysts for organizations’ cybersecurity actions today? Hint: They’re fairly recent concerns. The promise and peril of generative AI ranks first. It’s closely followed by the ever growing variety of cyberattacks; and by the intensifying urgency to protect data.

That’s according to CompTIA’s “State of Cybersecurity 2025” report, based on a survey of almost 1,200 business and IT pros in North America and in parts of Europe and Asia. 

These three key factors, along with others like the scale of attacks, play a critical role in how organizations currently outline their cybersecurity game plans.

“Understanding these drivers is essential for organizations to develop proactive and adaptive cybersecurity strategies that address the evolving threat landscape and safeguard their digital assets,” reads a CompTIA blog about the report.

Organizations are eagerly trying to understand both how generative AI can help their cybersecurity programs and how this technology is being used by malicious actors to make cyberattacks harder to detect and prevent.

Meanwhile, concern about data protection has ballooned in the past couple of years. “As organizations become more data-driven, the need to protect sensitive information has never been more crucial,” reads the blog.

Not only are organizations focused on securing data at rest, in transit and in use, but they’re also creating foundational data-management practices, according to the report.

“The rise of AI has accelerated the need for robust data practices in order to properly train AI algorithms, and the demand for data science continues to be strong as businesses seek competitive differentiation,” the report reads.

To get more details, read:

For more information about data security posture management (DSPM) and preventing AI-powered attacks, check out these Tenable resources:

4 - CISA lists software dev practices most harmful for security

Recommended best practices abound in the cybersecurity world. However, CISA and the FBI are taking the opposite tack in their quest to improve the security of software products: They just released a list of the worst security practices that software manufacturers ought to avoid.

Titled “Product Security Bad Practices,” the document groups the “no-nos” into three main categories: product properties; security features; and organizational processes and policies.

“It’s 2024, and basic, preventable software defects continue to enable crippling attacks against hospitals, schools, and other critical infrastructure. This has to stop,” CISA Director Jen Easterly said in a statement.

“These product security bad practices pose unacceptable risks in this day and age, and yet are all too common,” she added.

 

 

Here are some of the worst practices detailed in the document, which is part of CISA’s “Secure by Design” effort:

  • Using programming languages considered “memory unsafe”
  • Including user-provided input in SQL query strings
  • Releasing a product with default passwords
  • Releasing a product with known and exploited vulnerabilities
  • Not using multi-factor authentication
  • Failing to disclose vulnerabilities in a timely manner

Although the guidance is aimed primarily at software makers whose products are used by critical infrastructure organizations, the recommendations apply to all software manufacturers.

If you’re interested in sharing your feedback with CISA and the FBI, you can submit comments about the document until December 16, 2024 on the Federal Register.

To get more details, check out:

For more information about how to develop secure software:

5 - New EU law focuses on cybersecurity of connected digital products

Makers of digital products — both software and hardware — that directly or indirectly connect to networks and to other devices will have to comply with specific cybersecurity safeguards in the European Union.

A newly adopted law known as the “Cyber Resilience Act” outlines cybersecurity requirements for the design, development, production and lifecycle maintenance of these types of products, including IoT wares such as connected cars.

 

 

For example, it specifies a number of “essential cybersecurity requirements” for these products, including that they:

  • Aren’t shipped with known exploitable vulnerabilities
  • Feature a “secure by default” configuration
  • Can fix their vulnerabilities via automatic software updates
  • Offer access protection via control mechanisms, such as authentication and identity management
  • Protect the data they store, transmit and process using, for example, at-rest and in-transit encryption

“The new regulation aims to fill the gaps, clarify the links, and make the existing cybersecurity legislative framework more coherent, ensuring that products with digital components (...) are made secure throughout the supply chain and throughout their lifecycle,” reads a statement from the EU’s European Council.

The law will “enter into force” after its publication in the EU’s official journal and will apply and be enforceable 36 months later, so most likely in October 2027 or November 2027. However, some of its provisions will be enforceable a year prior.

For more information and analysis about the EU’s Cyber Resilience Act:

VIDEO

The EU Cyber Resilience Act: A New Era for Business Engagement in Open Source Software (Linux Foundation) 

6 - UK cyber agency: CISOs must communicate better with boards

CISOs and boards of directors are struggling to understand each other, and this is increasing their organizations’ cyber risk, new research from the U.K.’s cyber agency has found.

For example, in one alarming finding, 80% of respondents, which included board members, CISOs and other cyber leaders in medium and large enterprises, confessed to being unsure of who is ultimately accountable for cybersecurity in their organizations.

“We found that in many organisations, the CISO (or equivalent role) thought that the Board was accountable, whilst the Board thought it was the CISO,” reads a blog about the research titled “How to talk to board members about cyber.

As a result, the U.K. National Cyber Security Centre (NCSC) has released new guidance aimed at helping CISOs better communicate with their organizations’ boards titled “Engaging with Boards to improve the management of cyber security risk.

“Cyber security is a strategic issue, which means you must engage with Boards on their terms and in their language to ensure the cyber risk is understood, managed and mitigated,” the document reads.

Here’s a small sampling of the advice:

  • Understand your audience, including who are the board’s members and their areas of expertise; and how the board works, such as its meeting formats and its committees.
  • Talk about cybersecurity in terms of risks, and outline these risks concretely and precisely, presenting them in a matter-of-fact way.
  • Don’t limit your communication with board members to formal board meetings. Look for opportunities to talk to them individually or in small groups outside of these board meetings.
  • Elevate the discussions so that you link cybersecurity with your organization’s business challenges, goals and context.
  • Aim to provide a holistic view, and avoid using technical jargon.
  • Aim to advise instead of to educate.




pda

CSA provides update on binding dispute resolution

TORONTO – The Canadian Securities Administrators (CSA) is providing an update to interested parties on the status of its work to introduce binding authority for an independent dispute resolution service.




pda

At high level dialogue, Stakeholders Rally Support for Women’s Empowerment in Agriculture (National Update/Punch)

At high level dialogue, Stakeholders Rally Support for Women’s Empowerment in Agriculture (National Update/Punch)

This article published by National Update (Nigeria) wrote about a recent high-level dialogue on the CGIAR HER+ initiative in Abuja held on October 9, 2024, that aimed to address barriers women face in Nigeria’s agrifood sector.

The post At high level dialogue, Stakeholders Rally Support for Women’s Empowerment in Agriculture (National Update/Punch) appeared first on IFPRI.





pda

Updated Dates & Impacts with Extended Parking Lane Closures & Traffic Shifts at W. Foster Avenue between N. Broadway and N. Winthrop Avenue

Updated Dates & Impacts with Extended Parking Lane Closures & Traffic Shifts at W. Foster Avenue between N. Broadway and N. Winthrop Avenue for Street Reconstruction & Shoring Tower Construction & Staging.




pda

Updated Dates, Extended Partial Alley Closure at the alley east of 4801thru 4838 N. Broadway

Updated Dates, Extended Partial Alley Closure at the alley east of 4801 – 4838 N. Broadway for station foundation construction.




pda

Updated Dates, Extended Street Closures, W. Ardmore Avenue between N. Broadway and N. Winthrop Avenue

Updated Dates, Extended Street Closures, W. Ardmore Avenue between N. Broadway and N. Winthrop Avenue for street, sidewalk restoration and screen wall installation.




pda

Update Dates and Impacts with Parking Lane and Partial Sidewalk Closure at 5600 thru 5605 N. Broadway

Update Dates and Impacts with Parking Lane and Partial Sidewalk Closure at 5600 – 5605 N. Broadway




pda

Updated Dates Daily Alley Closures for the alley west of 4700 thru 4748 N. Winthrop Avenue (W. Leland Avenue to W. Lawrence Avenue)

Updated Dates Daily Alley Closures for the alley west of 4700 thru 4748 N. Winthrop Avenue (W. Leland Avenue to W. Lawrence Avenue) for wall cap installation.




pda

Updated Dates for Extended Partial Alley Closure for the alley west of 4700 thru 4748 N. Winthrop Avenue (W. Leland Avenue to W. Lawrence Avenue)

Updated Dates for Extended Partial Alley Closure for the alley west of 4700 thru 4748 N. Winthrop Avenue (W. Leland Avenue to W. Lawrence Avenue)




pda

Updated Dates Parking Lane and Partial Sidewalk Closure at 5600 thru 5605 N. Broadway

Updated Dates Parking Lane and Partial Sidewalk Closure at 5600 – 5605 N. Broadway for Decorative Sidewalk Paver Installation.




pda

Updated Dates for Extended Alley Closure for The alley behind 5300 thru 5358 N. Winthrop Avenue (W. Berwyn Avenue to W. Balmoral Avenue)

Updated Dates for Extended Alley Closure for The alley behind 5300 thru 5358 N. Winthrop Avenue (W. Berwyn Avenue to W. Balmoral Avenue) for alley reconstruction.




pda

Updated Dates and Extended Street Closure at W. Balmoral Avenue between N. Broadway and N. Winthrop Avenue

Updated Dates and Extended Street Closure at W. Balmoral Avenue between N. Broadway and N. Winthrop Avenue for street and sidewalk restoration.