ring

Second Chance Employment: Addressing Concerns About Negligent Hiring Liability

Rod Fliegel co-authors a report that explains negligent hiring, employers’ risks and how they can protect their company. 

Legal Action Center

View




ring

Negligent Hiring Risk Less Than Employers Believe

Rod Fliegel says he's seeing an uptick in negligent hiring concerns because of the growth of gig work.

SHRM Online

View (Subscription required.)




ring

The FDIC Proposes Revised Regulations Concerning Section 19 of the Federal Deposit Insurance Act to Conform to the Fair Hiring in Banking Act

  • The FDIC has proposed revised regulations implementing Section 19 of the Federal Deposit Insurance Act.
  • Section 19 generally prohibits individuals convicted of certain offenses from participating in the affairs of an FDIC-insured depository institution.
  • The rule would affect approximately 4,680 FDIC-insured depository institutions.
  • Comments to the rule are due by January 16, 2024.




ring

New Pennsylvania Legislation and Philadelphia Ordinance Amendment Tackle Pardoned Convictions, Expunged Records, and Negligent Hiring Liability

Pennsylvania and Philadelphia recently enacted changes that impact employer criminal background screening.

State Law

Enacted on December 14, 2023, and effective February 12, 2024, Pennsylvania’s House Bill No. 689 amends Pennsylvania law relating to the expungement of certain criminal record information and employer immunity when hiring individuals with expunged records. 




ring

Continuing Privacy Headache for Ordering Criminal Background Checks in California

Companies that hire employees and engage independent contractors in California should brace themselves for an even greater slowdown in background checks that include criminal record searches in Los Angeles County.1 This will result from the drastic impact of the court of appeal’s 2021 opinion in All of Us or None v.




ring

San Diego County Adds a New Layer to California’s Complex Web of Laws Regulating the Use of Criminal Records in the Hiring Process

  • Effective October 10, 2024, employers in San Diego County must assess compliance with new criminal record screening regulations.
  • The ordinance applies only in the unincorporated areas of San Diego County.




ring

Dear Littler: What is so Taxing about our Wandering Workers?

Dear Littler: You alerted us to some wage & hour and leaves & benefits issues stemming from our “wandering workers” who have scattered across the country during the pandemic, yet continue to work for our Texas-based company.




ring

New Law Prohibits Florida Businesses from Requiring Vaccine Passport from Patrons and Customers

On May 3, Governor Ron DeSantis signed into law SB 2006 (codified as Section 381.00316, Florida Statutes).  The law prevents business entities from requiring that patrons or customers provide documentation certifying COVID-19 vaccination or post-infection recovery to enter or obtain service from a business in Florida. It also prohibits educational institutions from requiring students or residents, and governmental entities from requiring persons, to provide vaccination passports or proof of post-infection recovery.




ring

Pandemic-Based Workplace Restructuring Persists, Employers Say

Devjani Mishra discusses the pandemic’s ongoing impact on the workplace revealed by key findings from Littler’s 2024 Annual Employer Survey Report.

Bloomberg Law

View (Subscription required.)




ring

House Subcommittee Hearing Raises Concerns About Proposed Heat Illness Rule

Felicia Watson discusses three concerns about a proposed OSHA rule that would protect indoor and outdoor workers from heat illness.

SHRM

View (Subscription required)




ring

OSHA Issues New Inspection Guidance Targeting Animal Slaughtering and Processing Establishments

On October 15, 2024, the U.S. Department of Labor released expanded guidance for OSHA inspections of employers in the animal slaughtering and processing industry. This guidance supersedes previous guidance issued in 2015, which had been limited to poultry processing establishments.




ring

New Case Provides Lessons That May Help Companies Avoid Pitfalls When Structuring Independent Contractor Relationships

The district court's opinion denying cross-motions for summary judgment in Bobbitt v. Broadband Interactive, Inc., No. 8:11-cv-2855 (M.D. Fla. Oct. 21, 2013) illustrates how not to structure an independent contractor relationship and how not to lay the groundwork to defend that relationship in the event of litigation.  The case also serves as a warning that even well-conceived independent contractor relationships may be open to question by a court that is inclined to distrust them.

Background




ring

Preparing for 2018

On page 54, Eric Stevens urges bank executives to begin preparing now for changes to employee data reporting in 2018 by the Equal Employment Opportunity Commission.  

The Tennessee Banker

View Article




ring

Employers Should Start Preparing their EEO-1 Reports Now

Jim Paretti talks about submitting workforce data correctly on EEO-1 reports.

SHRM Online

View (Subscription required.)




ring

Littler Continues Hiring Streak with Addition of Shareholder Kelly Cardin in New York City

NEW YORK (May 28, 2024) – Littler, the world’s largest employment and labor law practice representing management, has added Kelly M. Cardin as a shareholder in its New York City office. Cardin – who joins the firm from Ogletree Deakins, where she was co-chair of the Pay Equity practice group – marks Littler’s fifth shareholder level addition since the beginning of April.




ring

California’s SB 1047 establishes stringent requirements for large-scale AI models

Niloy Ray and Alice H. Wang say California’s Senate Bill 1047 represents another significant step forward in the state’s wide-ranging efforts to regulate the development and use of AI.

Daily Journal

View (Subscription required)




ring

Cybersecurity Considerations for Employers Sponsoring ERISA Plans

  • Cyber-criminals often steal funds and personal data from employee benefit plans.
  • Employers face increasing liability for failures in cybersecurity of the employee benefit plans they sponsor, including for the security of plan assets and data managed by service providers.
  • The DOL has updated its detailed guidance on cybersecurity for ERISA-covered benefit plans.




ring

Mission Critical Implementations tested during the fourth ETSI MCX Plugtests

Mission Critical Implementations tested during the fourth ETSI MCX Plugtests

Sophia Antipolis, 30 September 2019

The 4th ETSI MCX PlugtestsTM have concluded with a success rate of 95% of the executed tests in the validation of 3GPP mission critical services vendor interoperability.

Read More...




ring

ETSI launches specification group on Securing Artificial Intelligence

ETSI launches specification group on Securing Artificial Intelligence

Sophia Antipolis, 2 October 2019

ETSI is pleased to announce the creation of a new Industry Specification Group on Securing Artificial Intelligence (ISG SAI). The group will develop technical specifications to mitigate threats arising from the deployment of AI throughout multiple ICT-related industries. This includes threats to artificial intelligence systems from both conventional sources and other AIs.

Read More...




ring

ETSI's Securing Artificial Intelligence group appoints Chair and Vice Chairs

ETSI's Securing Artificial Intelligence group appoints Chair and Vice Chairs

Sophia Antipolis, 27 January 2020

ETSI's new Industry Specification Group on Securing Artificial Intelligence (ISG SAI) met last week for its second meeting and appointed Alex Leadbeater (BT) as its Chair. Dr Kate Reed (NCSC) was appointed as First Vice Chair and Tieyan Li (Huawei) was appointed as Second Vice Chair. This second meeting, after the launch of the group last October, was also the place to discuss work priorities.

Read More...




ring

ETSI Top 10 Webinars in 2020 - Starring: cybersecurity, the Radio Equipment Directive, the new smart secure platform and AI

ETSI Top 10 Webinars in 2020 - Starring: cybersecurity, the Radio Equipment Directive, the new smart secure platform and AI

Sophia Antipolis, 8 December 2020

As 2020 comes to an end, we have selected for you our most popular webinars of the year. If you missed them, listen to the recorded presentations and their Q&A sessions, deep dive into cybersecurity novelties, discover the RED latest developments and find out about the new smart secure platform and AI.

Read More...




ring

ETSI Report Paves the Way for First World Standards in Securing Artificial Intelligence

ETSI Report Paves the Way for First World Standards in Securing Artificial Intelligence

Sophia Antipolis, 19 January 2021

The ETSI Securing Artificial Intelligence Industry Specification Group (SAI ISG) last month released its first Group Report, ETSI GR SAI 004, which gives an overview of the problem statement regarding the securing of AI. ETSI SAI is the first standardization initiative dedicated to securing AI.

The Report describes the problem of securing AI-based systems and solutions, with a focus on machine learning, and the challenges relating to confidentiality, integrity and availability at each stage of the machine learning lifecycle. It also points out some of the broader challenges of AI systems including bias, ethics and ability to be explained. A number of different attack vectors are outlined, as well as several cases of real-world use and attacks.

Read More...




ring

ETSI unveils its Report comparing worldwide COVID-19 contact-tracing systems – a first step toward interoperability

ETSI unveils its Report comparing worldwide COVID-19 contact-tracing systems – a first step toward interoperability

Sophia Antipolis, 2 February 2021

The COVID-19 pandemic has stretched the planet’s health systems to their limits and tested the measures adopted to alleviate difficulties. Contact tracking or tracing to identify infected people has been one such example. However, contact tracing based on interviews with identified or suspected patients presents known weaknesses from previous pandemics. Turning to digital means in a world where global mobility is the rule was therefore of the essence.

Read More...




ring

ETSI releases Mitigation Strategy Report on Securing Artificial Intelligence

ETSI releases Mitigation Strategy Report on Securing Artificial Intelligence

Sophia Antipolis, 18 May 2021

ETSI has recently released ETSI GR SAI 005, a report which summarizes and analyses existing and potential mitigation against threats for AI-based systems. Setting a baseline for a common understanding of relevant AI cyber security threats and mitigations will be key for widespread deployment and acceptance of AI systems and applications. This report sheds light on the available methods for securing AI-based systems by mitigating known or potential security threats identified in the recent ENISA threat landscape publication and ETSI GR SAI 004 Problem Statement Report. It also addresses security capabilities, challenges, and limitations when adopting mitigation for AI-based systems in certain potential use cases.

Read More...




ring

ETSI releases first comprehensive global standard for securing smart phones

ETSI releases first comprehensive global standard for securing smart phones

Sophia Antipolis, 24 November 2021

Today our smartphones and tablets are fundamental for citizens and hold a wide range of user data and apps. At the same time, security attacks have increased with malicious applications and network eavesdropping. To define security and assurance requirements for smart phones and tablets, mitigate potential risks and protect users, ETSI has released a world class standard called Consumer Mobile Device Protection Profile, ETSI TS 103 732. The specification identifies key security and privacy risks for user data and provides appropriate protection.

Read More...




ring

ETSI Top 10 Webinars in 2021 - Starring: DECT2020, Ultra-Wide Band radio technology, IPv6, MEC

ETSI Top 10 Webinars in 2021 - Starring: DECT2020, Ultra-Wide Band radio technology, IPv6, MEC.

Sophia Antipolis, 8 December 2021

As 2021 comes to an end, we have selected for you our most popular webinars of the year. If you missed them, listen to the recorded presentations and their Q&A sessions, deep dive into the non-cellular 5G radio DECT2020-NR, IPv6, Multi-access Edge Computing, Open Source MANO and much more.

Read More...




ring

ETSI organizes the first TeraFlowSDN Hackfest during Network X in Amsterdam

ETSI organizes the first TeraFlowSDN Hackfest during Network X in Amsterdam

Sophia Antipolis, 21 October 2022

ETSI organized the first TeraFlowSDN Hackfest during the Network X event in Amsterdam, Netherlands, on 20 October. With the support of the European Commission (EC) and the European Free Trade Association (EFTA) the Hackfest brought together 25 developers eager to get a first hands-one experience with the software developed by TeraFlowSDN, the open source group created by ETSI in May this year.

Read More...




ring

ETSI Top 10 Webinars in 2022 Starring: Cybersecurity, AI, IPv6, MEC, Open Source MANO and more

Sophia Antipolis, 20 December 2022

As 2022 comes to an end, we have selected for you our most popular webinars of the year. If you missed them, listen to the recorded presentations and their Q&A sessions, deep dive into the Cyber resilience Act and AI Act, IPv6, Multi-access Edge Computing, Open Source MANO and much more.

Read More...




ring

ETSI leading Securing AI into the future: new Chair elected

Sophia Antipolis, 22 February 2023

During the 17th meeting of ETSI’s Securing AI Industry Specification Group, Scott Cadzow from Cadzow Communications, was elected as the new Chair.

His vision is to confirm ISG SAI as the European Union’s and Standards Development Organizations’ centre of excellence in the topic of securing Artificial Intelligence and Machine Learning.

AI is, or is likely to become, endemic. All reasonably complex software will eventually include AI elements and he is convinced that ETSI is well placed to become thought leader on the role of AI and, particularly, the role of standards for AI, addressing the challenges to standardization of the forthcoming AI Act.

Read More...





ring

ETSI releases three Reports on Securing Artificial Intelligence for a secure, transparent and explicable AI system

Sophia Antipolis, 11 July 2023

ETSI is pleased to announce three new Reports developed by its Securing AI group (ISG SAI). They address explicability and transparency of AI processing and provide an AI computing platform security framework. The last Report is a multi-partner Proofs of Concepts framework.

Read More...




ring

ETSI’s Securing AI group becomes a Technical Committee to help ETSI to answer the EU AI Act

Sophia Antipolis, 17 October 2023

As the second term of the Industry Specification Group Securing AI (ISG SAI) is scheduled to conclude in Q4 2023, and in line with ETSI's commitment to AI and SAI, the group has suggested the closure of ISG SAI, with its activity transferred to  a new ETSI Technical Committee, TC SAI.

Read More...




ring

ETSI's Committee on Securing AI Decides on New Work

Sophia Antipolis, 7 December 2023 

In order to have the capability to directly contribute to standardization requests, which may include, but not limited to, the future AI Act, Cybersecurity Resilience Act and NIS2, it was decided to transfer the SAI Industry Specification Group into a Technical Committee.

Read More...




ring

ETSI Protection Profile for securing smartphones gains world-first certification from French Cybersecurity Agency

Sophia Antipolis, 12 January 2024

In a significant step highlighting the critical importance of security for mobile device users, the French National Cybersecurity Agency (ANSSI) has certified ETSI's Consumer Mobile Device Protection Profile under the Common Criteria global certification framework. This represents the first certification by a national administration of a comprehensive suite of specifications for assessing the security of smartphones.

Read More...




ring

TeraFlowSDN Release 3 Provides a Cloud-based Network Automation Platform Featuring New Optical SDN Controller and Expanded Support for Disaggregated Networks

Sophia Antipolis, 30 April 2024

The ETSI TeraFlowSDN community is proud to announce the third release of TeraFlowSDN, an innovative and robust SDN orchestrator and controller, delivering a fully featured Network Automation Platform. In this latest release, TeraFlowSDN enhances its capabilities with the integration of an Optical SDN controller, expanding device support to include gNMI and OpenConfig protocols. It also features enriched network integrations for end-to-end orchestration like IP over DWDM, L3VPN, MEC, and network topology exposure. The management of network topologies is improved with the addition of a new BGP-LS speaker able to discover the topologies, and a new Forecaster component is introduced, providing predictive insights for network management. These additions substantially augment the versatility and management capabilities of the TeraFlowSDN platform.

Read More...




ring

Preparing for a secure future: industry and business share plans for quantum era at 10th ETSI/IQC Quantum-Safe Cryptography Conference

Sophia Antipolis, 24 May 2024

Speakers at the 10th ETSI/IQC Quantum Safe Cryptography Conference have called on organizations to prepare their cybersecurity infrastructures to address the challenges of a post-quantum world.

Organized by ETSI and the Institute for Quantum Computing, this year’s conference was hosted from 14-16 May by the Centre for Quantum Technologies (CQT), National University of Singapore (NUS), in partnership with the Infocomm Media Development Authority (IMDA) and the Cyber Security Agency (CSA) of Singapore. The event attracted an impressive 235 onsite delegates from 27 countries, reflecting fast-growing interest worldwide in the critical importance of quantum-safe cryptography in today’s cybersecurity strategies.

Read More...




ring

ETSI Announces 1st Release of SDG OpenCAPIF Delivering a Robust, Secure, and Efficient 3GPP API Management Platform

Sophia Antipolis, 9 July 2024

ETSI is excited to announce OpenCAPIF Release 1 is now available in the ETSI Labs.

OpenCAPIF develops a Common API Framework as defined by 3GPP and this new version introduces several improvements and new features to deliver a more robust, secure, and efficient API Management Platform. These advancements are developed in tight collaboration and incorporating feedback from a growing Research Ecosystem including SNS projects such as 6G-SANDBOX, FIDAL, IMAGINEB5G, SAFE6G, ORIGAMI, ENVELOPE and SUNRISE6G.

Read More...




ring

MAA of Brome-Missisquoi Holiday Season Gathering

Starts: Sat, 30 Nov 2024 20:00:00 -0500
11/30/2024 05:00:00PM
Location: Lac-Brome (Knowlton), Canada




ring

Empowering Women: Inclusion in India's Government Planning (Short Version)




ring

Empowering Women: Inclusion in India's Government Planning (Odia Subtitles)




ring

Securing Financial Data in the Cloud: How Tenable Can Help

Preventing data loss, complying with regulations, automating workflows and managing access are four key challenges facing financial institutions. Learn how Tenable can help.

Imagine a bustling bank, made not of bricks and mortar, but of a swirling mass of data in the cloud. Account numbers, transaction histories and personally identifiable information (PII) zip across servers, powering the financial world. Holding all this sensitive data requires tremendous care. Therefore, securing this sensitive information is paramount.

This is where Tenable Cloud Security steps in, offering a data security shield specifically designed for the unique needs of financial institutions.

The challenge: A data deluge demands vigilance

Financial institutions generate massive volumes of data daily. While the public cloud offers unparalleled capacity to store such data, along with agility and scalability, the cloud also expands the attack surface. Legacy cybersecurity solutions are often unable to manage — let alone secure — the sheer volume of data and the variety of ways it is accessed, leaving organizations exposed to malicious actors. At the same time, financial institutions must keep up with new and evolving compliance standards and regulations set forth by governing bodies. Financial institutions need a security platform that helps them protect their data and maintain compliance.

Tenable Cloud Security’s advantage: Seeing beyond the walls

Tenable Cloud Security actively scrutinizes every corner of the cloud data vault, continuously and automatically.

"Without [Tenable Cloud Security], we would've been virtually blind to risks and threats impacting our sensitive data. [Tenable Cloud Security] allows us to preempt any issues and meet the requirements we're receiving from our business partners, with minimal effort.

— VP Security at a leading Fintech platform

Here's how Tenable empowers financial institutions:

  • Protecting sensitive data: Tenable doesn't just guard the door; it knows what's inside and how to best protect it. It identifies and labels all data, like financial records and social security numbers, understanding its sensitivity and prioritizing its protection.
  • Continuous monitoring: Imagine guards constantly scanning every inch of the vault. Tenable does the same digitally, using advanced technology to constantly search for suspicious activity and potential breaches. Any unusual movement of the data, either exfiltration or copying to a different and inaccessible location, triggers an alarm, allowing for immediate intervention.
  • Policy enforcement: Just like a vault needs clear access protocols, so does your data. Tenable automates setting and enforcing cybersecurity policies across the entire cloud, ensuring everyone plays by the book and no unauthorized hands touch the valuables.
  • Following mandated regulations: Financial institutions juggle a complex set of regulations and industry standards like the Payment Card Industry Data Security Standard (PCI-DSS). Tenable simplifies compliance with a host of international regulations by providing timely reports and audit trails.

Beyond traditional security: More than just a lock

Modern technology stacks for data storage require a modern cybersecurity stack. Traditional security solutions are unable to address the unique risks associated with storing data in cloud technologies. Financial organizations that leverage Tenable’s data security platform are able to meet existing and future challenges, including:

  • Preventing data loss: Early detection and prevention of unauthorized data access can help organizations minimize financial losses and reputational damage, keeping valuable assets safe from even the most cunning thieves.
  • Complying with regulations: Automated reports and adherence to the most stringent regulations and industry standards ensure compliance, saving time and resources.
  • Automating workflows: Tenable automates tasks and provides deeper insights into how data behaves, enabling organizations to free up their valuable resources for other endeavors and make their security teams more efficient.
  • Managing access: Just like knowing who has access to the vault is crucial. Tenable tracks who and what has access to data, ensuring only authorized parties can handle the data.

The future of financial security is data-centric

Tenable Cloud Security's data-centric approach positions it as a valuable partner, not just for guarding the perimeter but for understanding the inner workings of the vault and the most sensitive data within it. By leveraging Tenable’s capabilities, financial institutions can confidently embrace the cloud while ensuring the highest level of security for their most valuable assets — their data.

To learn more about how you can secure your data




ring

Attack on Titan. 4, Humanity pushes back! / Hajime Isayama ; [translator, Sheldon Drzka ; lettering, Steve Wands].

"Humanity pushes back! The Survey Corps develops a risky gambit— have Eren in Titan form attempt to repair Wall Rose, reclaiming human territory from the monsters for the first time in a century. But Titan-Eren's self-control is far from perfect, and when he goes on a rampage, not even Armin can stop him! With the survival of humanity on his massive shoulders, will Eren be able to return to his senses, or will he lose himself forever?"-- Page [4] of cover.




ring

One-punch man. Volume 6 / story by ONE ; art by Yusuke Murata ; translation, John Werry ; touch-up art and lettering, James Gaubatz.

"Nothing about Saitama passes the eyeball test when it comes to superheroes, from his lifeless expression to his bald head to his unimpressive physique. However, this average-looking guy has a not-so-average problem— he just can't seem to find an opponent strong enough to take on! An emergency summons gathers Class S heroes at headquarters … and Saitama tags along. There, they learn that the great seer Shibabawa left the following prophecy: "The Earth is in danger!" What in the world is going to happen?!" -- Description provided by publisher.




ring

One-punch man. Volume 7 / story by ONE ; art by Yusuke Murata ; translation, John Werry ; touch-up art and lettering, James Gaubatz.

Nothing about Saitama passes the eyeball test when it comes to superheroes, from his lifeless expression to his bald head to his unimpressive physique. However, this average-looking guy has a not-so-average problem-he just can't seem to find an opponent strong enough to take on! When aliens invade Earth, a group of Class-S heroes finally finds a way to fight back and go on the offensive. Inside the enemy mother ship, Saitama fights Boros. Faced with the alien's frightful power, he decides to get serious! What is the Earth's fate?!




ring

One-punch man. 10 / story by ONE ; art by Yusuke Murata ; translation, John Werry ; touch-up art & lettering, James Gaubatz.

"Hero hunter Gato intensifies his onslaught, so of course Saitama decides now is the perfect time to join a combat tournament. Meanwhile, Class-S hero Metal Bat takes an assignment guarding a Hero Association executive and his son, and before long trouble appears!" -- Description provided by publisher.




ring

Asadora! Volume 1 / Naoki Urasawa ; translation & adaptation, John Werry ; touch-up art & lettering, Steve Dutro.

"A deadly typhoon, a mysterious creature and a girl who won't quit. In 2020, a large creature rampages through Tokyo, destroying everything in its path. In 1959, Asa Asada, a spunky young girl from a huge family in Nagoya, is kidnapped for ransom— and not a soul notices. When a typhoon hits Nagoya, Asa and her kidnapper must work together to survive. But there's more to her kidnapper and this storm than meets the eye. When Asa's mother goes into labor yet again, Asa runs off to find a doctor. But no one bats an eye when she doesn't return— not even as a storm approaches Nagoya. Forgotten yet again, Asa runs into a burglar and tries to stop him on her own, a decision that leads to an unlikely alliance." -- Provided by publisher.




ring

Asadora! Volume 2 / by Naoki Urasawa / N Wood Studio ; translation & adaptation, John Werry ; touch-up art & lettering, Steve Dutro.

"Asa and Kasuga see the tail of a giant creature rise from the water. In a jungle, explorers discover massive claw marks in a tree trunk. And years later in 1964, a mysterious military man appears asking all the wrong questions." -- Provided by publisher.




ring

The rose of Versailles. Volume 4 / Ryoko Ikeda ; translation: Jocelyne Allen ; lettering and touch up: Jeannie Lee.

"France spirals towards a civil war, as nobles continue to ignore the people of France. Noblewoman Oscar Fraṅois de Jarjayes is forced to reconsider her life as a soldier and a woman, her loyalties and her love. Marie Antoinette and the royal family seek escape, while Robespierre and the National Assembly take up arms and demand democracy." -- Provided by publisher.




ring

SpotOn London 2014 – Fringe Events

To accompany this year’s SpotOn London conference, at the Wellcome Trust on Friday, 14 November




ring

Nutrition and economic development: Exploring Egypt's exceptionalism and the role of food subsidies [in Chinese]