protection

Los Angeles Publishes “Model Contract” Under Freelance Workers Protections Ordinance

On August 7, 2024, the City of Los Angeles unveiled its “Model Contract” under the Freelance Workers Protections Ordinance (FWPO). This ordinance, which took effect on July 1, 2023, was designed to bolster protections for freelance workers in Los Angeles.

Ensure Compliance with California Labor Code Section 2775 et seq.




protection

Arizona Cities Expand Discrimination Protections

Arizona recently expanded provisions of the Arizona Civil Rights Act (ACRA) to cover pregnancy and pregnancy-related conditions. Additionally, following a national trend in response to perceived state and federal inaction, cities in Arizona on their own passed new ordinances that expands protected categories and coverage.

ACRA Expansion




protection

Executive Compensation and the Wall Street Reform and Consumer Protection Act

On July 21, 2010, President Obama signed into law the Dodd-Frank Wall Street Reform and Consumer Protection Act (H.R. 4173) (the "Act"), which is intended "to promote the financial stability of the United States by improving accountability and transparency in the financial system" and "to protect the American taxpayer by ending bailouts, to protect consumers from abusive financial services practices, and for other purposes." While the Act is directed at the financial system, it incorporates broad executive compensation provisions that apply beyond the financial services industry.




protection

Federal Bill Proposes Victim Protection for Foreign Workers

The current administration and multiple members of Congress seek to grant protections to H-2B non-agricultural temporary workers who are employed in the United States to fill temporary labor shortages in the U.S. market. Multiple bills have been introduced in both the Senate and House of Representatives calling for protection against exploitation and abuse, including for employer violations of wage and hour laws and retaliation.




protection

DHS Announces Special Immigration Protection for Workers Who Help in Labor and Employment Agency Investigations

The Department of Homeland Security (DHS) has recently announced a streamlined process for foreign workers to request deferred action. Deferred action is a type of prosecutorial discretion to defer removal action (deportation) for a noncitizen for a certain time period.  The new process will apply where these workers are participating in or otherwise involved an investigation or enforcement action by a federal, state, or local labor and employment agency.    




protection

Call-to-Action: Immigration Protections for Migrant Families in the U.S.

In this pro bono podcast, Littler’s Lavanga Wijekoon speaks with Ellen Miller of the National Immigrant Justice Center, Jodi Ziesemer of the New York Legal Assistance Group and Laura Lunn of the Rocky Mountain Immigrant Advocacy Network about the work being done across the country to help immigrants and their families who are in desperate need of immigration protections.
   




protection

New Executive Action to Provide Protections for Certain Noncitizen Spouses

The Department of Homeland Security (DHS) announced that the agency will establish a new process to consider, on a case-by-case basis, requests from eligible noncitizen spouses of U.S. citizens for parole-in-place status.  Parole-in-place allows noncitizens who entered the United States without the authorization of an immigration officer to remain in the United States for a certain period.  If paroled, eligible noncitizen spouses will be able to apply for permanent residence without having to leave the United States to be processed for an Immigrant Visa at a U.S.




protection

Illinois Passes State Law Offering Protection to Employees from Unfair Enforcement of Employment Verification Practices

On August 9, 2024, Illinois Governor JB Pritzker signed Senate Bill 0508 (“SB0508”) into law. This new law provides additional employment protections for individuals flagged by an employment eligibility verification system, including federal E-Verify, as having identification discrepancies. The new rights and protections created by SB0508 will take effect on January 1, 2025. This evaluation does not address whether the state law directly restricts or curtails the use of E Verify.




protection

Littler World Cup Matchups Part 5: Whistleblower Protections

Welcome back to our World Cup series, where we compare various aspects of labor and employment law in some of the participating countries.1  We kicked off Parts One and Two of this series with vacation and sick leave entitlements.




protection

Whistleblowing Directive: internal whistleblowing channels in companies and whistleblower protection

Jesús Lahera offers a detailed analysis of Spain’s Whistleblowing Directive and its impact on employers and employees.

Observatorio de RRHH

View




protection

5th Circuit Finds Religious Freedoms Supersede LGBTQ+ Protections

Alyesha Dotson weighs in on the 5th U.S. Circuit Court of Appeals’ ruling that private businesses with religious convictions don’t have to follow antidiscrimination laws that protect LGBTQ+.

SHRM Online

View (Subscription required.)




protection

Protection for Criminal Antitrust Whistleblowers Signed into Law

Largely overshadowed by the rise in COVID-19 deaths and the January 6, 2021, siege on the Capitol, the Criminal Antitrust Anti-Retaliation Act of 2019 (“the Act”) became law on December 23, 2020. See 15 U.S.C. § 7a-3. The Act, which Senator Chuck Grassley sponsored, prohibits employers from retaliating against individuals who report criminal antitrust violations to their employer or the federal government, or who participate in a federal governmental criminal antitrust investigation or proceeding.  

Background




protection

The Anti-Money Laundering Act Expands Whistleblower Protections

The recently enacted Anti-Money Laundering Act significantly increases the potential value of awards for whistleblowers under the Bank Secrecy Act. The challenge for a financial services employer is to establish that discipline against an employee in a compliance role is supported by evidence that the decision was based on the employee's incompetence or other inappropriate behavior, and that any whistleblowing activity he or she engaged in was not a consideration. Philip M. Berkowitz explores the issues in this edition of his Employment Issues column.

 




protection

Texas Expands Protections for Employees Asserting Sexual-Harassment Claims

Michael Royal and Alyssa Peterson discuss two new laws that will bring changes for employers in Texas by expanding protections for employees who assert claims of sexual harassment under the Texas Labor Code.

SHRM Online

View (Subscription required.)




protection

Minding the Pay Gap: What Employers Need to Know as Pay Equity Protections Widen

The pay gap – or paying women and other historically marginalized groups less for the same or substantially similar work – has long been in the media spotlight. But as employees, boards, consumers, and the public are increasingly expecting more from organizations surrounding diversity, equity, and inclusion, the stakes for employers regarding pay equity continue to rise. Politicians have also taken note.




protection

Atlanta Amends Anti-Discrimination Ordinance to Include Protections for Gender Expression and Criminal Histories

The City Council of Atlanta, Georgia recently passed an ordinance that amends its existing anti-discrimination law to include protection on the basis of “criminal history status” as well as “gender expression.”  The ordinance is effective immediately.

With regard to gender expression, the law simply amends existing law to include “gender expression” as an additional protected characteristic.




protection

Atlanta Amends Anti-Discrimination Ordinance to Include Protections for Gender Expression and Criminal Histories

Rachel P. Kaercher, Wendy Buckingham and William J. Simmons examine a new ordinance passed by the Atlanta City Council that amends its existing anti-discrimination law to include protections on the basis of criminal history status and gender expression.

SHRM Online

View (Subscription required.)




protection

Write It Down: California’s Freelance Worker Protection Act Imposes New Requirements for Engaging Independent Contractors

Following other states and cities across the nation, California Governor Gavin Newsom signed Senate Bill 988, the Freelance Worker Protection Act (FWPA), into law on September 28, 2024. This new law aims to provide greater protections to freelance workers (e.g., “independent contractors”).




protection

Pencils, Paper, and Now NLRA Legal Protections – New General Counsel Memorandum Provides College Student Athletes with a Very Significant New “School Supply”

On September 29, 2021, National Labor Relations Board (NLRB) General Counsel (GC) Jennifer A. Abruzzo released a nine-page memorandum taking the unequivocal position that “certain Players at Academic Institutions” are employees under Section 2(3) of the National Labor Relations Act (NLRA).  Refusing to call such players “student athletes,” Abruzzo asserts in the memorandum (GC 21-08) that:




protection

Title IX At 50: Expanding Protections for Students and Employees

In celebration of the 50th anniversary of Title IX of the Education Amendments of 1972 (Title IX), on June 23, 2022, the U.S.




protection

Data Protection for Multinational Employers: Frameworks, Artificial Intelligence and More




protection

What Employers Need to Know About the UK Worker Protection Act




protection

Write it down: California's Freelance Worker Protection Act imposes new requirements for engaging independent contractors

Joy C. Rosenquist, Rick Reyes and Blair C. Senesi examine California’s new Freelance Worker Protection Act (FWPA), which aims to provide greater protections to freelance workers.

Wolters Kluwer

View (Subscription required)




protection

New Year, New Data Protection Laws: What Employers Should Know

  • Fourteen states have adopted comprehensive data protection laws, most of which will take effect within the next two years.
  • Of these laws, only the California Privacy Rights Act applies to HR data.
  • Nevertheless, employment counsel and HR professionals will be involved in assisting their organizations to comply with the broad range of responsibilities these laws impose.
  • States are also proposing and enacting smaller laws applicable to HR data.




protection

Brazil Data Protection Law – Litigation in the Context of Employment

  • Employers operating in Brazil will likely see an uptick in litigation involving claims filed under the country’s Data Protection Law (LGPD).
  • The Brazilian National Data Protection Agency, the entity charged with enforcing the LGPD, recently issued new guidance on this law.

The Brazilian Data Protection Law (LGPD) in effect since 2020 is starting to show its effects in the litigation landscape.




protection

Developing a Global Data Protection Framework for Artificial Intelligence in the Workplace

  • Despite the broad range of artificial intelligence technologies and the flurry of new laws regulating them, virtually all laws regulating how these technologies process data follow the same basic framework.
  • This means employers can follow a relatively straightforward checklist around the world to work through the major data protection issues.
  • This Insight walks through the checklist and identifies significant variations between regions and countries.




protection

A Comprehensive Global Guide for AI Data Protection in the Workplace

Zoe Argento, Kwabena Appenteng, Alyssa Daniels, Philip Gordon, Rajko Herrmann, Soowon Hong, Renata Neeser, Naomi Seddon, Christina Stogov and Grace Yang share a comprehensive guide for how employers can ensure data protection as they implement artificial intelligence.

Corporate Compliance Insights

View




protection

ETSI releases World First Protection Profile for Quantum Key Distribution

Sophia Antipolis, 27 April 2023

ETSI has just released a Protection Profile (PP) for the security evaluation of quantum key distribution (QKD) modules, ETSI GS QKD 016. This Protection Profile is a first and anticipates the need for quantum safe cryptography. The ETSI specification will help manufacturers to submit pairs of QKD modules for evaluation under a security certification process.

Read More...




protection

ETSI Protection Profile for securing smartphones gains world-first certification from French Cybersecurity Agency

Sophia Antipolis, 12 January 2024

In a significant step highlighting the critical importance of security for mobile device users, the French National Cybersecurity Agency (ANSSI) has certified ETSI's Consumer Mobile Device Protection Profile under the Common Criteria global certification framework. This represents the first certification by a national administration of a comprehensive suite of specifications for assessing the security of smartphones.

Read More...




protection

Do social protection programs reduce conflict risk? Evidence from a large-scale safety net program in rural Ethiopia

PSNP is largest public works program in Africa • Started in 2005 in four main highland regions • Approximately 8 million participants • We examine the effect of PSNP on both high-intensity and low-intensity conflict • Using Govt. of Ethiopia administrative PSNP records and geocoded data on conflict events (Armed Conflict Location & Event Data […] Source: IFPRI Ethiopia: Ethiopia Strategy Support Program




protection

Maintaining Data Protection Controls

Many data protection regulations, such as PCI DSS and HIPAA, levy heavy fines for data breaches of sensitive information. Effective data protection controls are necessary to avoid breaches of regulatory, statutory, or contractual obligations related to sensitive data.

Organizations that handle sensitive data, such as healthcare and credit card information, are required to audit data protection controls on an annual basis. Leveraging Tenable reports enables organizations to protect data in accordance with business risk posture for Confidentiality, Integrity and Availability (CIA).

The National Institute of Standards (NIST) Special Publication 800-53 provides comprehensive guidance for a secure infrastructure, including guidance on data protection and encryption. The information provided in Tenable dashboards and reports enables Risk Managers and Chief Privacy Officers to demonstrate to third parties and regulatory bodies that sensitive data is protected in accordance with Data Loss Prevention requirements.

The NIST Cybersecurity Framework (CSF) is a control framework, which has high level controls that align with
ISO 27001, NIST SP 800-53, and others. The Cybersecurity Framework’s prioritized, flexible, and cost-effective approach helps to promote the protection and resilience of critical infrastructure and other sectors important to the economy and national security. Many regulating bodies accept evidence documentation of compliance with the NIST CSF as assurance that the organization has effective controls in place to meet their security requirements. The HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework is an example of a regulation aligning with NIST.

The report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report is located in the Tenable.sc Feed under the category Threat Detection & Vulnerability Assessments.

The report requirements are:

Tenable.sc 5.9.0
Nessus 10.2.0

Leveraging Tenable reports enables operations teams to verify that appropriate protections are in place for data at rest, data in transit, and removable media. Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives.

Chapters

Executive Summary: This chapter provides a summary view on the state of protections controls relating to Certificates, Encryption, and Confidentiality and Protected Information.

Data Protection Details – This chapter provides details on the state of protection controls in the environment for Certificates, Encryption, and Confidentiality and Protected Information, which are described below.

  • Certificates – This section displays findings for hosts with expired certificates, certificates that are expiring soon, untrusted certificates and self-signed certificates.  Expired certificates and other certificate problems cause a denial of service, man-in-the-middle, and trust-related concerns for organizations.  
  • SSL/TLS Vulnerability Summary – This section provides an overview of systems and vulnerabilities related to SSL/TLS.  The SSL/TLS Vulnerabilities by Type element displays a count of systems and vulnerabilities related to SSLv2 and SSLv3 in the first two rows. From the third row down, information is provided on all the systems running any version of TLSv1 and higher.
  • Encryption – This section provides an overview of systems and vulnerabilities related to SSL/TLS and Encryption/Cryptographic Compliance. Information presented in this section highlights issues such as weak hashing algorithms and keys as well as the use of insecure encryption ciphers. Many of these issues are the result of misconfigurations or use of outdated encryption methods. This detailed information also highlights vulnerabilities that can be exploited by attackers. Tenable recommends that security teams review the data to determine the risk to the organization.
  • Confidentiality of Protected Information – This section provides an overview of systems and vulnerabilities related to Security Requirement 3.13.16 in the NIST Special Publication 800-171. Revision 2 provides guidance to protect the confidentiality of Controlled Unclassified Information (CUI) at rest and maps to Security Control SC-28 of NIST Special Publication 800-53.  
  • File Content Audit Results – The following section displays File Content Audit Results. The first two rows of the File Contents Audit Results Compliance Checks provide the total count of Passed checks, Failed checks, and checks requiring a manual review. The first row, ‘Check Count’, provides a count of the current checks per check status. The second row, ‘Check Ratio’, provides a ratio view of check status. The three columns together total 100%. The last two rows provide a system count analysis. The third row, ‘System Count’, provides the number of systems with at least one audit check in the applicable state. The last row, ‘System Ratio’, provides a percentage of systems with at least one audit check in the applicable state.




protection

New research Chair for investor rights—the first of its kind—to investigate better protections for Canadians

Toronto, ON — Professor Anita Anand, a corporate law and governance expert, is the new J. R. Kimber Chair in Investor Protection and Corporate Governance at the University of Toronto Faculty of Law—the first research chair for investor rights in North America—thanks to a generous gift from well-known philanthropist, the Hon. Hal Jackman, LLB 1956, […]





protection

Twelve ultimate mistakes when selecting circuit protection for low-voltage equipment

To be honest, a circuit breaker is fairly simple device. However, the process of specifying circuit protection is often complicated and unclear, leading many engineers to either include insufficient or excessive protection in their equipment designs. Insufficiently protected circuits expose... Read more

The post Twelve ultimate mistakes when selecting circuit protection for low-voltage equipment appeared first on EEP - Electrical Engineering Portal.




protection

Design issues in HV busbar protection systems (substation topology and DC power supply)

This technical article discusses criteria and requirements for designing protection systems for busbars in HV/EHV networks. One of the most critical requirements is reliable busbar relay protection to assure power system integrity during fault conditions. This requirement is further emphasized because... Read more

The post Design issues in HV busbar protection systems (substation topology and DC power supply) appeared first on EEP - Electrical Engineering Portal.




protection

Mastering stability test of power transformer: Differential and Restricted Earth Fault (REF) protection

This technical article discusses the essentials of transformer differential protection and restricted earth fault protection schemes, contrasting the two and elaborating on why the latter is necessary. Furthermore, it reveals the outcomes of stability tests performed on a 502 MVA... Read more

The post Mastering stability test of power transformer: Differential and Restricted Earth Fault (REF) protection appeared first on EEP - Electrical Engineering Portal.




protection

IP Protection Degree (IEC 60529) Explained

The protection of enclosures against ingress of dirt or against the ingress of water is defined in IEC529 (BSEN60529:1991). Conversely, an enclosure which protects equipment against ingress of particles will also protect a person from potential hazards within that enclosure,... Read more

The post IP Protection Degree (IEC 60529) Explained appeared first on EEP - Electrical Engineering Portal.




protection

Protection Relay – ANSI Standards

In the design of electrical power systems, the ANSI Standard Device Numbers denote what features a protective device supports (such as a relay or circuit breaker). These types of devices protect electrical systems and components from damage when an unwanted... Read more

The post Protection Relay – ANSI Standards appeared first on EEP - Electrical Engineering Portal.




protection

The true art of control, monitoring and protection provided by Substation Automation Systems

The Substation Automation Systems, often known as SASs, are responsible for a tremendous variety of tasks. These include some extremely important actions, such as clearing faults in a timely manner in order to maintain the physical condition of power system... Read more

The post The true art of control, monitoring and protection provided by Substation Automation Systems appeared first on EEP - Electrical Engineering Portal.




protection

Four special connections of current transformers in relay protection applications

As you should already know, current transformers are used for metering and relay protection purposes. When we are talking about current transformers used for metering, their performance is of interest during normal loading conditions. Metering transformers may have very significant... Read more

The post Four special connections of current transformers in relay protection applications appeared first on EEP - Electrical Engineering Portal.




protection

How to handle overvoltages before any damage is done? Surge protection in a nutshell.

Prevention is better than cure, we all know this, and this is true not only for people, but also for the health of your electrical and electronic components and equipment. Smart and cost-effective strategies demand an investment in surge protection.... Read more

The post How to handle overvoltages before any damage is done? Surge protection in a nutshell. appeared first on EEP - Electrical Engineering Portal.




protection

Switchgear interlocking system and arc protection that you MUST consider in the design

There are at least two safety requirements that medium-voltage switchgear MUST fulfil: an interlocking system and an arc protection system. Yes, these two systems are crucial in terms of safety because they protect not only the operator and other substation... Read more

The post Switchgear interlocking system and arc protection that you MUST consider in the design appeared first on EEP - Electrical Engineering Portal.




protection

Mastering Distance Protection and Calculations Part 1: Advice and Serious Warnings

In 2004, I embarked on an intensive nine-month training program in protection and instrumentation. This experience laid the foundation for my deep understanding of substation protection systems, combining both theoretical knowledge and practical application. The first protection scheme we delved... Read more

The post Mastering Distance Protection and Calculations Part 1: Advice and Serious Warnings appeared first on EEP - Electrical Engineering Portal.




protection

Mastering Distance Protection and Calculations Part 2: Never Mess Up Protection Accuracy

The first part of this article series delved into the fundamentals of overcurrent protection, exploring the intricacies of relay coordination, the impact of source impedance, and the application of distance protection. These foundational concepts laid the groundwork for understanding how... Read more

The post Mastering Distance Protection and Calculations Part 2: Never Mess Up Protection Accuracy appeared first on EEP - Electrical Engineering Portal.




protection

Failures, Testing and Protections Associated with Field Winding of a Generator

Generator field winding is an integral part of the generator set which is responsible for generating the magnetic field that induces the stator emf when the rotor rotates. Regulation of current in this winding with the help of an AVR... Read more

The post Failures, Testing and Protections Associated with Field Winding of a Generator appeared first on EEP - Electrical Engineering Portal.




protection

Weather and Sun Protection Gear Announced

Personal protection against effects of hot weather and sun exposure.




protection

Advanced PPE Techniques and Protection for Restorers

Use these techniques to minimize risk at jobsites and prevent the bringing home of hazardous materials.




protection

How To Lay Hard Surface Floor Protection

This week for our weekly How-To’s powered by KnowHow, we learn how to lay hard-surface floor protection.




protection

Enhancing consumer & investor protection from ICO scams

The rise of new technologies is changing the way companies raise funds. Along with increased popularity of crowdfunding in recent years, a new form of funding has emerged – that is, the use of Initial Coin Offerings, or ICOs. In 2017, companies in the United States raised over $4 billion through ICOs; in 2018, more than $21 billion has been raised. ICOs generate many challenges for securities regulators, and also give rise to other issues including corporate governance, data protection, anti-money laundering and insolvency. Assistant Professor Aurelio Gurrea-Martínez from the SMU School of Law has conducted legal research on financial regulation. In this podcast, he shares his recent comparative and interdisciplinary study which addresses the issue of ICOs and makes recommendations to regulators and policy makers in a way that aims to promote innovation and firms’ access to finance without harming investor protection, market integrity and the stability of the financial system.




protection

Artificial Intelligence & data protection in Singapore

Data has emerged as the most important driver for modern economic development. New industries have arisen from the use of data with personal information as the core asset, while many traditional models of business are ‘disrupted’ or drastically transformed. Artificial Intelligence (A.I.) has also become an integral tool for the management and processing of data, including personal data, as it provides greater accuracy and capability. How should the use of A.I. in data management be regulated and should it be treated any differently under the data protection regime? What role can A.I. play in regulating the use of personal data and as a cybersecurity tool? Is creating a form of propertisation of personal data and ‘data ownership’ useful? These are just some of the lingering questions that regulators and organisations are currently grappling with. Central to the issue is how A.I. can best serve and safeguard humanity’s interests. Warren Chik is Associate Professor of Law at SMU School of Law, and concurrently Deputy Director at SMU’s Centre for AI and Data Governance. In this podcast, he shares his recent research into Artificial Intelligence and Data Protection in Singapore, which takes a deeper look into consumers’ trust, organisational security and government regulation.