Cybersecurity in the Workplace

Size: px
Start display at page:

Download "Cybersecurity in the Workplace"

Transcription

1 Cybersecurity in the Workplace Stephanie K. Rawitt, Esq. Jonathan D. Klein, Esq. ARIZONA CALIFORNIA DELAWARE ILLINOIS MICHIGAN NEVADA NEW JERSEY PENNSYLVANIA WASHINGTON D.C. WEST VIRGINIA IRELAND

2 Fun Fact: The #1 greatest cyber threat to your business is your very own employees. 2

3 Anatomy of an Employee Threat 3

4 The Most Dangerous Employees The Innocent Employee: An employee who makes an honest mistake during the course of his or her employment at your business, but nonetheless makes a mistake that could still have dyer consequences for your business. The Careless Employee: An employee who knows what should be done to protect your business yet does not take action, potentially causing harm. The Malicious Employee: An employee who, despite training and institutional policies in place at your business, knowingly and intentionally takes adverse action to harm your business for an illicit reason. 4

5 Key Security Questions Have you performed a risk assessment of your business? Do you have the appropriate policies/plans in place? Do you have an actionable incident response plan? Have you trained your employees lately on cybersecurity? Have you updated your privacy policy? Do you have a recent terms & conditions on your site? Would you consider your business security aware? If you answered NO to any of these, why is that? 5

6 Security Is a Team Effort Management Information Technology (IT) Staff Human Resources (HR) Staff Employees 6

7 What Does Risk Assessment Mean? Step 1: Identity Information Assets (data, software, hardware, appliances, infrastructure) Step 2: Classify Information Assets Step 3: Identify Security Requirements (statutes/regulations, contracts, common law, business needs) Step 4: Identify Risks 7

8 What Policies Should You Consider? Non-Compete/Non-Solicitation Policies Cybersecurity Employment Policy Employee Social Media Policy Computer-Issued Technology Equipment Policies Employee Privacy Rights Workplace Computer Policy Employee Exit Protocol Cybersecurity Incident Response Plan Privacy Policy/Terms of Use 8

9 Non-Compete/Non-Solicitation Policies Allows you to hire, contract, and otherwise operate your business without fear that business knowledge and advantages will soon be used against business! Provides a degree of protection for your business related to employees; Trade secrets and confidential information are protected; Prevents the following illicit actions by current and former employees: Going to work in a similar role for a competitor; Contacting your customers; and Using confidential information about you/your customers after they leave. 9

10 Cybersecurity Employment Policy Applies to all employees, contractors, volunteers, etc. who has permanent or even temporary access to your business systems and hardware; Emphasizes the importance of cybersecurity (including risks); Should outline effective password management; Describes phishing s and scams employees may experience; Helps employees understand how to protect sensitive information; Highlights security protocols when not using business hardware; Outlines what to do if business hardware is lost or stolen; and Explains to employees to use common sense and take an active role in security. 10

11 Employee Social Media Policy It is important for your business to keep track of what employees are doing, especially on issues that pertain to the workplace! Outlines how your employees should conduct themselves online; Helps safeguard business reputation while encouraging responsible online use; Should be considered a living document as social media changes fast; Defends against legal trouble and security risks; Empowers employees to share your business message to the public; Creates consistency across social media platforms; and Focus on the big picture so as to stay current with social media trends. 11

12 Computer-Based Equipment Policy Applies to any technology provided by your business to an employee; Should set out guidelines for approved use; Should outline security risks and rules related thereto/expectations; Should identify prohibited use (careful not to run afoul of the NLRB); Should remind employees that equipment is that of the business and clarify privacy expectations or lack thereof; Security login procedures/process; Even not a cyber issue, address off the clock policies; and Discipline for violations.

13 Employee Privacy Rights Policy Comprehensive, state-dependent written policies can defeat employee s expectation of privacy when it comes to the use of workplace technology; Reiterates that employees have no expectation of privacy in connection with data stored in or transmitted via computer, , phones, cell phones; Discusses that your business, as the employer, have the right to monitor any work-issued device (e.g., workplace computer, laptop, cell phone); Highlights that your business, as the employer, may monitor sites depending on content/subject-matter of site visited on work technology; and Notes that your business, as the employer, has the ability to, and can, monitor incoming and outgoing phone calls placed on work-issued technology. 13

14 Workplace Computer Policy Considers Internet usage, site management, and website blockage; Policy limits computer use to work-related activities; Applies universally to all employees (unless express permission granted); Discusses employee privacy rights (as noted previously) or lack thereof; Outlines before or after work, lunchtime, and other off-the-clock issues; and Reiterates procedures for employee exist and post-employment issues. 14

15 Employee Exit Protocol Outlines procedures when an employee resigns/is terminated; Should include, but is not limited to, the following: Knowledge transfer meeting; Procedure to collecting workplace items; Outlines transition period and plan; Highlights requirements on last day of employment Contains checklist for ensuring all business information protected; Reviews information for exiting employee; and Discusses preservation of employee electronic data. 15

16 Cybersecurity Incident Response Plan Preparing for WHEN your business may experience a cyber-related breach and/or incident, not IF your business may be breached. Words to Live by: Identify & Protect + Detect, Respond & Recover 16

17 Privacy Policies Essentially a consumer notice on your business website; Provides details about business procedures related to information collection; Drafted by lawyers, made for laypersons visiting your business website; Requires consultation between business/lawyers; NO ONE SIZE FITS ALL must be tailored to your business; Should contain information demonstrating regulatory compliance; Must be published conspicuously on your business website; and Periodic review and updating of privacy policy is the norm. 17

18 Terms of Use/Terms & Conditions Essentially a contract between your business and a visitor to the site; Sets the rules for any person visiting your business website to follow; Contains prohibited activities for any person visiting your business website; Even though may not be required, a smart page to have on your website; Can limit liability, set governing law, even set arbitration v. litigation; Contains notice provisions for copyright infringement, legal action, etc.; Protects your right to the content on your business website; NO ONE SIZE FITS ALL must be tailored to your business; and Periodic review and updating of terms is the norm. 18

19 19 Cybersecurity Insurance Even with appropriate protections and tools in place, your business should still consider cybersecurity insurance as a fail safe to protect your business from cyber risks. Some basics about cybersecurity insurance: Standalone coverage usually; Helps business recover faster from data loss; Transfers some of financial risk of security breach; Investigate current coverage before you apply; and Know the limitations of your coverage (likely will not cover theft of IP). 19

20 Cybersecurity Exercise Consider the following scenario: Your business has a network engineer or IT professional (as the case may be) in his mid-50s who you have decided to fire for cause. Somehow (and unrelated to this exercise), the network engineer or IT professional finds out that he is going to be imminently fired and decides to reset your business servers to their factory settings. What policies should govern the employee s actions? What do you do now?

21 QUESTIONS? Stephanie K. Rawitt Jonathan D. Klein

Risk Management in the workplace: Human Resource s role

Risk Management in the workplace: Human Resource s role Risk Management in the workplace: Human Resource s role Human Resource as Risk Management 1.Risk Areas 2.Risk Analysis Risk Areas Macro 1.Strategic 2.Compliance 3.Operational 4.Financial Risk Areas Macro

More information

6 Steps For Avoiding Expensive Trade Secret

6 Steps For Avoiding Expensive Trade Secret Page 1 of 5 Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com 6 Steps For Avoiding Expensive Trade Secret

More information

Social Media Policies After the NLRB Facebook Firing Case Settles: What are Employers to Do?

Social Media Policies After the NLRB Facebook Firing Case Settles: What are Employers to Do? Labor & Employment Alert February 2011 Social Media Policies After the NLRB Facebook Firing Case Settles: What are Employers to Do? By Marion B. Johnson and Meredith R. Murphy In American Medical Response

More information

Standard Statement and Purpose

Standard Statement and Purpose Personnel Security Standard Responsible Office: Technology Services Initial Standard Approved: 10/23/2017 Current Revision Approved: 10/23/2017 Standard Statement and Purpose Security of information relies

More information

6 Ways To Protect Your Business From Data Breaches in 2017

6 Ways To Protect Your Business From Data Breaches in 2017 6 Ways To Protect Your Business From Data Breaches in 2017 Alaskan-owned company providing Paper Shredding & Hard Drive Destruction Services. We serve all of Southcentral Alaska with professional, secure,

More information

Employee Defection: Tools and Strategies for Protecting Company Assets

Employee Defection: Tools and Strategies for Protecting Company Assets Employee Defection: Tools and Strategies for Protecting Company Assets December 17, 2015 Noel R. Boeke Holland & Knight LLP 100 N. Tampa Street, Suite 4100 Tampa, FL 33602 813-227-6525 noel.boeke@hklaw.com

More information

DRAFT - WORKPLACE VIOLENCE & HARASSMENT POLICY

DRAFT - WORKPLACE VIOLENCE & HARASSMENT POLICY DRAFT - WORKPLACE VIOLENCE & HARASSMENT POLICY 1. PHILOSOPHY The management of Ontario Camps Association ( OCA ) is committed to providing a work environment in which all individuals (staff and volunteers)

More information

INSIDE. 2 Introduction 12 Conclusion 4 6. How Prepared Are Corporate Law Departments?

INSIDE. 2 Introduction 12 Conclusion 4 6. How Prepared Are Corporate Law Departments? INSIDE 1 A Message From Morrison & Foerster s Global Risk & Crisis Management Chair 7 How Prepared Are Corporate Law Departments? 2 Introduction 12 Conclusion 4 6 Risk and Crisis Management: An Emerging

More information

DHT HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS

DHT HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS November 2012 DHT HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics (the Code ) summarizes the values, principles and the business practices which

More information

FACC Social Media Guidelines & Policy

FACC Social Media Guidelines & Policy Fulshear Area Chamber of Commerce http://www.fulshearareachamber.com/ Phone: 832. 600.3221 FACC Social Media Guidelines & Policy The Fulshear Area Chamber of Commerce (FACC) Board and staff recognize the

More information

ACC L&E Roundtable Rick Albert Krista Cabrera Kamran Mirrafati Archana Acharya

ACC L&E Roundtable Rick Albert Krista Cabrera Kamran Mirrafati Archana Acharya 1 ACC L&E Roundtable Rick Albert Krista Cabrera Kamran Mirrafati Archana Acharya Discussion Topics: Combating The Rise Of California Disability Discrimination Lawsuits The National Labor Relations Board

More information

SOCIAL MEDIA AND THE NLRB

SOCIAL MEDIA AND THE NLRB SOCIAL MEDIA AND THE NLRB If your company is using social media, it should adopt, implement and enforce a social media policy. The purpose of the social media policy is to set the rules for how a company

More information

Background Screening Best Practices & EEOC Guidance: A Compliance Tool for Employers

Background Screening Best Practices & EEOC Guidance: A Compliance Tool for Employers Background Screening Best Practices & EEOC Guidance: A Compliance ADP Background, Drug Testing and Medical Screening Services Background Screening Best Practices & EEOC Guidance: A Compliance 1 Background

More information

BIG LOTS, INC. CODE OF BUSINESS CONDUCT AND ETHICS

BIG LOTS, INC. CODE OF BUSINESS CONDUCT AND ETHICS September 2003 BIG LOTS, INC. CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business principles to guide all directors, officers and associates

More information

Guidelines and supervision on the use of IT tools of the University College

Guidelines and supervision on the use of IT tools of the University College Guidelines and supervision on the use of IT tools of the University College Introduction The employer has the authority to set up guidelines for the use of IT tools that are available for employees and

More information

Managing Insider Risk through Training & Culture. Sponsored by Experian Data Breach Resolution

Managing Insider Risk through Training & Culture. Sponsored by Experian Data Breach Resolution Managing Insider Risk through Training & Culture Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report

More information

Social Media Policy. Reference: HR th December Induction CD/ Sharepoint/ EDRMS HR Site/ Website

Social Media Policy. Reference: HR th December Induction CD/ Sharepoint/ EDRMS HR Site/ Website Social Media Policy Reference: Document Type: Status of Document: Policy Final Version: 1.2 Date Approved: 16 th December 2014 Approved By: Publication Date: Review Date Policy Owner Applies to: Document

More information

Employee Clearance Procedure

Employee Clearance Procedure Employee Clearance Procedure Responsible Offices: Campus Safety and Human Resources Secondary Office: Information Technology, Payroll, Key Shop, Parking Services, Purchasing 1. PURPOSE This policy establishes

More information

Social Media. Guide for employees

Social Media. Guide for employees Social Media Guide for employees This guide outlines the standards of behaviour expected from all employees when using social media as part of their job for Royal Mail and also for personal use where it

More information

Mid Year 2017 HR Compliance Trends

Mid Year 2017 HR Compliance Trends Mid Year 2017 HR Compliance Trends The Executive's Roadmap to Best-in-Class HR Strategy August 3, 2017 2017 TriNet Group, Inc. All rights reserved. Reproduction or distribution in whole or part without

More information

Mobile banking and payments: What are the US rules?

Mobile banking and payments: What are the US rules? Mobile banking and payments: What are the US rules? www.infosys.com/finacle Universal Banking Solution Systems Integration Consulting Business Process Outsourcing Mobile banking and payments: What are

More information

ClickStaff Orientation Training. Presented to: Contingent Workers Presented by: <Supplier ABC> Version Effective Date: June 20, 2012 Version: 8FINAL

ClickStaff Orientation Training. Presented to: Contingent Workers Presented by: <Supplier ABC> Version Effective Date: June 20, 2012 Version: 8FINAL ClickStaff Orientation Training Presented to: Contingent Workers g Presented by: Version Effective Date: June 20, 2012 Version: 8FINAL Housekeeping reminders Session will take about 15-20

More information

Triple C Housing, Inc. Compliance Plan

Triple C Housing, Inc. Compliance Plan Triple C Housing, Inc. Compliance Plan Adopted by Board of Directors on draft November 13, 2014 Overview Triple C Housing, Inc. is committed to its consumers, employees, contractual providers, vendors,

More information

Federal Compliance Checklists, Checklist: Conducting Employment Investigations

Federal Compliance Checklists, Checklist: Conducting Employment Investigations Employment Checklists Federal Compliance Checklists Work Rules and Employee Conduct Checklist: Conducting Employment Investigations Checklist: How to Conduct Employment Investigations Purpose: A prompt,

More information

Managing Employees in an Increasingly Mobile World. December 15, 2016

Managing Employees in an Increasingly Mobile World. December 15, 2016 Managing Employees in an Increasingly Mobile World December 15, 2016 Presenters Bill Flanagan Hogan Lovells Partner, Northern Virginia and Washington, D.C. T 1+ 202 637 3287 bill.flanagan@hoganlovells.com

More information

Social Media on the Workplace

Social Media on the Workplace Considerations regarding the effect of Social Media on the Workplace Scott F. Singley, Esq. Lindsey S. Wiseman, Esq. October 26, 2011 Overview The term Social Media is too broad and fluid to specifically

More information

SOCIAL MEDIA RISKS. Of Healthcare Organizations. October Sponsored by:

SOCIAL MEDIA RISKS. Of Healthcare Organizations. October Sponsored by: SOCIAL MEDIA RISKS Of Healthcare Organizations October 2011 Sponsored by: SOCIAL MEDIA RISKS Of Healthcare Organizations Social media sites such as Facebook, Twitter, YouTube and LinkedIn have become integral

More information

TABLE OF CONTENTS ONLY

TABLE OF CONTENTS ONLY TABLE OF CONTENTS ONLY Business Continuity Compensation Report - United States of America Compensation Review May 2017 Benchmarking. Plan Ahead. Be Ahead. Data collected between January March 2017 with

More information

Guidelines for Information Asset Management: Roles and Responsibilities

Guidelines for Information Asset Management: Roles and Responsibilities Guidelines for Information Asset Management: Roles and Responsibilities Document Version: 1.0 Document Classification: Public Published Date: April 2017 P a g e 1 Contents 1. Overview:... 3 2. Audience...

More information

PHILADELPHIA COLLEGE OF OSTEOPATHIC MEDICINE POLICIES AND PROCEDUES. Policy and Procedures Index

PHILADELPHIA COLLEGE OF OSTEOPATHIC MEDICINE POLICIES AND PROCEDUES. Policy and Procedures Index Employee and Student Acknowledgement Form General Information Function of Management Information Systems and Telecommunications Policy Number Computing Resources and Access 1.05 Computer Resource Usage

More information

ASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS

ASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS ASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business practices and procedures. It does not cover every issue that

More information

TRADE SECRET DISPUTES AND EMPLOYMENT RISKS

TRADE SECRET DISPUTES AND EMPLOYMENT RISKS TRADE SECRET DISPUTES AND EMPLOYMENT RISKS REPRINTED FROM: CORPORATE DISPUTES MAGAZINE OCT-DEC 2014 ISSUE corporate CDdisputes Visit the website to request a free copy of the full e-magazine Published

More information

* SAKURA Rules * (Code of Conduct for the Terumo Group)

* SAKURA Rules * (Code of Conduct for the Terumo Group) * SAKURA Rules * (Code of Conduct for the Terumo Group) Terumo Corporation TABLE OF CONTENTS Chapter1. Introduction...2 1.1 Objectives 1.2 Definitions 1.3 Scope of Application of the SAKURA Rules 1.4 Inquiries

More information

New Technology: Mission Impossible?

New Technology: Mission Impossible? New Technology: Mission Impossible? Trainer: Ryan Peasley, MCSA, Consultant 1 Session Mission Understand current technology trends (cloud, mobile, social) Discuss technology challenges our agencies face

More information

SOCIAL MEDIA AND THE WORKPLACE

SOCIAL MEDIA AND THE WORKPLACE SOCIAL MEDIA AND THE WORKPLACE Presented By: Ronni M. Travers, SPHR, President Public Sector HR Consultants LLC Office: (518) 399-4512 Email: rtravers@publicsectorhr.org Quick Survey of Attendees 1. Who

More information

Policy Work Health and Safety (WHS) RCPA Introduction WHS legislation

Policy Work Health and Safety (WHS) RCPA Introduction WHS legislation Policy Subject: Work Health and Safety (WHS) Approval Date: July 2011, December 2014 Review Date: July 2018 Review By: Board of Directors Number: 1/2011 The Royal College of Pathologists of Australasia

More information

Managing Online Reputation in a Digital World

Managing Online Reputation in a Digital World Managing Online Reputation in a Digital World September 2013 CSID.COM TABLE OF CONTENTS OVERVIEW --------------------------------------------------------------------------------------------------------------------------

More information

Corporate Legal Audit Program

Corporate Legal Audit Program Corporate Legal Audit Program Important commercial transactions that lay a foundation for future success share a common characteristic: They have benefitted from advance preparation, scrupulous review,

More information

DRAFT ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security management system implementation guidance

DRAFT ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security management system implementation guidance INTERNATIONAL STANDARD ISO/IEC 27003 First edition 2010-02-01 Information technology Security techniques Information security management system implementation guidance Technologies de l'information Techniques

More information

Privacy and Social Networking in the Workplace

Privacy and Social Networking in the Workplace Privacy and Social Networking in the Workplace International Labor Group Moderator: Aaron J. Schindel, New York Presenters: Daniel Ornstein, London Cécile Martin, Paris How can an employer legally monitor

More information

Southwest Airlines Co. Code of Ethics

Southwest Airlines Co. Code of Ethics Southwest Airlines Co. Code of Ethics Introduction Southwest Airlines Co. is committed to maintaining the highest standards of ethical business practices and legal and regulatory compliance. We place a

More information

Harassment and Hostile Workplace: What HR Directors Need to Know* prepared for

Harassment and Hostile Workplace: What HR Directors Need to Know* prepared for Harassment and Hostile Workplace: What HR Directors Need to Know* prepared for presented by Jonathan A. Segal, Esq. Jonathan_HR_Law * No statements made in this seminar or in the PowerPoint or other materials

More information

Insurance & Investments Simple. Fast. Easy. CODE OF BUSINESS CONDUCT

Insurance & Investments Simple. Fast. Easy. CODE OF BUSINESS CONDUCT Insurance & Investments Simple. Fast. Easy. CODE OF BUSINESS CONDUCT TABLE OF CONTENTS MESSAGE FROM THE PRESIDENT....1 VISION, MISSION & VALUES.... 2 PURPOSE.... 3 HOW DOES THE CODE APPLY TO ME?.... 3

More information

CODE OF CONDUCT Version 3 August 2016

CODE OF CONDUCT Version 3 August 2016 CODE OF CONDUCT Version 3 August 2016 Table of Contents 1. INTRODUCTION... 3 2. COMPLIANCE WITH LOCAL LAWS AND REGULATIONS... 3 3. FAIR COMPETITION... 4 4. ANTI BRIBERY AND ANTI CORRUPTION... 4 5. WORKING

More information

Intuit Supplier Code of Conduct

Intuit Supplier Code of Conduct Intuit Supplier Code of Conduct At Intuit we simplify the business of life. We invent solutions to important problems. We innovate. This is what we strive for every day, and we truly value the role our

More information

General Counsel Report

General Counsel Report General Counsel Report Facts & Analysis In Partnership with 2017 Consero Group. Reproduction Prohibited. January 2017 Introduction General Counsel Report Today s General Counsel is responsible for overseeing

More information

California Roadmap: Employment Law Update

California Roadmap: Employment Law Update California Roadmap: Employment Law Update Friday, February 1, 2013 Orange County Copyright 2013, Littler Mendelson, P.C. Presented by: Bob Conti, Esq. Littler Mendelson, P.C. Orange County Office Shareholder

More information

Personal Finance Unit 1 Chapter Glencoe/McGraw-Hill

Personal Finance Unit 1 Chapter Glencoe/McGraw-Hill 0 Chapter 2 Finances and Career Planning What You ll Learn Section 2.1 Identify the personal issues to consider when choosing and planning your career. Explain how education and training affect career

More information

ﺖﻴﻨﻣا ﺖﻳﺮﻳﺪﻣ ﻢﺘﺴﻴﺳ ﻲﺷزﻮﻣآ رﺎﻨﻴﻤﺳ يﺎﻫدراﺪﻧﺎﺘﺳا يﺎﻬﺘﺳﺎﻴﺳ ﻪﻳﺎﭘ ﺮﺑ تﺎﻋﻼﻃا BS7799 & BS15000 لوا ﻲﺷزﻮﻣآ رﺎﻨﻴﻤﺳ

ﺖﻴﻨﻣا ﺖﻳﺮﻳﺪﻣ ﻢﺘﺴﻴﺳ ﻲﺷزﻮﻣآ رﺎﻨﻴﻤﺳ يﺎﻫدراﺪﻧﺎﺘﺳا يﺎﻬﺘﺳﺎﻴﺳ ﻪﻳﺎﭘ ﺮﺑ تﺎﻋﻼﻃا BS7799 & BS15000 لوا ﻲﺷزﻮﻣآ رﺎﻨﻴﻤﺳ سمينار آموزشي سيستم مديريت امنيت اطلاعات بر پايه سياستهاي استانداردهاي BS7799 & BS15000 سمينار آموزشي اول Part One Information Security Management Systems Dr. Sc. Houman Sadeghi Kaji Spread Spectrum Communication

More information

Code of Business Conduct and Ethics

Code of Business Conduct and Ethics Code of Business Conduct and Ethics Table of Contents Purpose... 1 Scope... 1 Policy... 2 Responsibilities... 8 Enforcement... 8 Review and Revision... 8 PURPOSE Pursuant to the Sarbanes-Oxley Act of 2002

More information

CODE OF ETHICS AND BUSINESS CONDUCT

CODE OF ETHICS AND BUSINESS CONDUCT CODE OF ETHICS AND BUSINESS CONDUCT 1.0 SCOPE This Code of Ethics and Business Conduct (the Code of Conduct ) is implemented by the Board of Directors (the Board ) of Dominion Diamond Corporation and applies

More information

Immigration Update: Strategies for Effective Corporate Compliance

Immigration Update: Strategies for Effective Corporate Compliance Immigration Update: Strategies for Effective Corporate Compliance Presented by: Gus M. Shihab, Esq. The Law Firm of Shihab & Associates Co., L.P.A. 65 East State Street, Suite 1550, Columbus, Ohio 43215

More information

General user conditions for supplier s applications and the AUMA supplier portal

General user conditions for supplier s applications and the AUMA supplier portal Page 1 of 7 General user conditions for supplier s applications and the AUMA supplier portal AUMA Riester GmbH & Co. KG ( AUMA, we, us or our ) is continuously interested in finding national as well as

More information

QUALITY MANAGEMENT SYSTEM POLICIES AND PROCEDURES

QUALITY MANAGEMENT SYSTEM POLICIES AND PROCEDURES Your Company Name QUALITY MANAGEMENT SYSTEM POLICIES AND PROCEDURES Origination Date: XXXX Document Identifier: Date: Document Revision: QMS-00 QMS Policies and Procedures Latest Revision Date Abstract:

More information

ANNEX 2 Security Management Plan

ANNEX 2 Security Management Plan ANNEX 2 Page 1 of 24 The following pages define our draft security management plan (a complete and up to date shall be submitted to The Authority within 20 days of contract award as per Schedule 2.4, para

More information

SOCIAL MEDIA - POLICIES AND PROCEDURES

SOCIAL MEDIA - POLICIES AND PROCEDURES Network of Community Options, Inc. SOCIAL MEDIA - POLICIES AND PROCEDURES Effective Date July 1, 2012 Implementation Date July 1, 2012 Social Media / Electronic Media Introduction NCO, Inc. maintains and

More information

Security Monitoring Service Description

Security Monitoring Service Description Security Monitoring Service Description Contents Section 1: UnderdefenseSOC Security Monitoring Service Overview 3 Section 2: Key Components of the Service 4 Section 3: Onboarding Process 5 Section 4:

More information

Creating a Job Search Program In Your Church, Synagogue Or Community Organization

Creating a Job Search Program In Your Church, Synagogue Or Community Organization Creating a Job Search Program In Your Church, Synagogue Or Community Organization Special Supplement to The Unwritten Rules of the Highly Effective Job Search By Orville Pierson Note: This Special Supplement

More information

RELM WIRELESS CORPORATION (the Company ) CODE OF BUSINESS CONDUCT AND ETHICS

RELM WIRELESS CORPORATION (the Company ) CODE OF BUSINESS CONDUCT AND ETHICS RELM WIRELESS CORPORATION (the Company ) CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business practices and procedures. It does not

More information

Oilfield Service Co.

Oilfield Service Co. Oilfield Service Co. Peak Oilfield Service Company Code of Business Ethics and Compliance From the President Our role in supporting the oil and gas industry is simple: we provide capable, satisfi ed employees

More information

WHITE PAPER. IoT-enabled Banking Services

WHITE PAPER. IoT-enabled Banking Services WHITE PAPER IoT-enabled Banking Services The Internet of Things (IoT) is the next big and imminent thing in financial services. It is a network of connected devices through the Internet, which receive

More information

Code of Conduct STANDARD PRACTICE 150

Code of Conduct STANDARD PRACTICE 150 Code of Conduct STANDARD PRACTICE 150 - - - - - - - - - - PAGE INTENTIONALLY LEFT BLANK - - - - - - - - - - STANDARD PRACTICE 150 Code of Conduct 1. PURPOSE... 3 2. RESPONSIBILITY... 3 3. NO RETALIATION...

More information

GIRL GUIDES AUSTRALIA (GGA) SOCIAL MEDIA POLICY

GIRL GUIDES AUSTRALIA (GGA) SOCIAL MEDIA POLICY ACN 070 581 770 GIRL GUIDES AUSTRALIA (GGA) SOCIAL MEDIA POLICY This policy is to be provided to all employees, adult and youth members, and volunteers of GGA, its member State Girl Guide Organisations

More information

Pamela H. Salgado. Focus Areas. Overview

Pamela H. Salgado. Focus Areas. Overview Shareholder One Union Square 600 University Street, Suite 3200 98101 main: (206) 623-3300 direct: (206) 381-4928 fax: (206) 447-6965 psalgado@littler.com Focus Areas Discrimination and Harassment Leaves

More information

Information Governance Policy and Management Framework

Information Governance Policy and Management Framework Putting Barnsley People First Information Governance Policy and Management Framework Version: 2.0 Approved By: Governing Body Date Approved: February 2014 Name of originator / author: Richard Walker Name

More information

1. an Employee's private interests interfere, or even appear to interfere, with the interests of the Company;

1. an Employee's private interests interfere, or even appear to interfere, with the interests of the Company; I. INTRODUCTION CBRE, ( the Company ) is firmly committed to conducting business with the highest integrity and in compliance with the letter and spirit of the law. Our Standards of Business Conduct requires

More information

Language that Helps; Language that Hurts George H. Faulkner, Esq.

Language that Helps; Language that Hurts George H. Faulkner, Esq. Language that Helps; Language that Hurts George H. Faulkner, Esq. Unions strike over an employer discontinuing health care coverage. Unions strike over an employer discontinuing pension contributions.

More information

Status Update: Developments On Social Media In The Workplace

Status Update: Developments On Social Media In The Workplace Status Update: Developments On Social Media In The Workplace League of California Cities City Attorney Track September 19, 2013 Traci I. Park Burke, Williams & Sorensen, LLP www.bwslaw.com Los Angeles

More information

C. MCCMH Hardware and Systems: MCCMH owned or leased equipment, facilities, internet addresses or domain names registered to MCCMH.

C. MCCMH Hardware and Systems: MCCMH owned or leased equipment, facilities, internet addresses or domain names registered to MCCMH. protect MCCMH Staff s First Amendment rights to Freedom of Speech, Michigan s Internet Privacy Protection Act (IPPA), and the Michigan Public Employment Relations Act (PERA). B. Confidential Information:

More information

Toyota Material Handling UK Code of Conduct

Toyota Material Handling UK Code of Conduct Code of Conduct Toyota Material Handling UK Code of Conduct Page 2. 3. 4. 5. 6. 7-8. 9 10. 11-13. 14. 15. Contents Table of contents and definitions The Toyota mission Our core values How to use the code

More information

Rich S. Falcone. Focus Areas. Overview

Rich S. Falcone. Focus Areas. Overview Shareholder 2050 Main Street Suite 900 Irvine, CA 92614 main: (949) 705-3000 direct: (949) 705-3037 fax: (949) 724-1201 rfalcone@littler.com Focus Areas Litigation and Trials Labor Management Relations

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

ISO 28002: RESILIENCE IN THE SUPPLY CHAIN: REQUIREMENTS WITH GUIDANCE FOR USE

ISO 28002: RESILIENCE IN THE SUPPLY CHAIN: REQUIREMENTS WITH GUIDANCE FOR USE Version 1b: September 5, 2009 ISO 28002: RESILIENCE IN THE SUPPLY CHAIN: REQUIREMENTS WITH GUIDANCE FOR USE Draft Version 1b: September 5, 2009 Abstract A comprehensive management systems approach to prevent,

More information

INTERWORLD SRL FREIGHT FORWARDING CO. CODE OF CONDUCT

INTERWORLD SRL FREIGHT FORWARDING CO. CODE OF CONDUCT INTERWORLD SRL FREIGHT FORWARDING CO. CODE OF CONDUCT INTERWORLD SRL INTERNAL CODE OF CONDUCT INDEX A. Letter From Simone Rovida, Managing Director Page 3 B. International Code of Conduct Page 4. MANAGING

More information

LEGAL ISSUES IN SOCIAL MEDIA FOR CHARITIES

LEGAL ISSUES IN SOCIAL MEDIA FOR CHARITIES Philanthropy Forum 2016 Community Foundation of Greater Peterborough November 15, 2016 LEGAL ISSUES IN SOCIAL MEDIA FOR CHARITIES By Terrance S. Carter, B.A., LL.B., TEP, Trade-mark Agent tcarter@carters.ca

More information

Volunteer Handbook

Volunteer Handbook Volunteer Handbook 2014-2015 Rev 5/14 Table of Contents Letter of Welcome 3 Our Mission 4 Purpose of Volunteer Program 5 Our Services 6 Background Checks & Confidentiality 7 General Guidelines 8 Anti-Harassment

More information

2017 Cost of Data Breach Study

2017 Cost of Data Breach Study 2017 Cost of Data Breach Study Australia Benchmark research sponsored by IBM Security Independently conducted by Ponemon Institute LLC June 2017 Ponemon Institute Research Report Part 1. Introduction 2017

More information

STATEMENT OF BUSINESS ETHICS

STATEMENT OF BUSINESS ETHICS STATEMENT OF BUSINESS ETHICS CONTENTS Foreword 1 About us 2 Our Code of Conduct 3 Our values 3 Guiding principles 4 - Safety 4 - Value for money 4 - Open, fair and honest 4 Essential Energy procurement

More information

S.D.F ELECTRICAL PTY LTD ABN EMPLOYEE POLICY BOOKLET

S.D.F ELECTRICAL PTY LTD ABN EMPLOYEE POLICY BOOKLET S.D.F ELECTRICAL PTY LTD EMPLOYEE POLICY BOOKLET 2017 S.D.F ELECTRICAL PTY LTD BLANK PAGE S.D.F Electrical Pty Ltd BUSINESS OBJECTIVES KEY POLICIES ASSOCIATED PROCEDURES Working Live Establishing Employee

More information

CODE OF BUSINESS CONDUCT AND ETHICS. FRONTIER AIRLINES, INC. Adopted May 27, 2004

CODE OF BUSINESS CONDUCT AND ETHICS. FRONTIER AIRLINES, INC. Adopted May 27, 2004 1. Introduction CODE OF BUSINESS CONDUCT AND ETHICS FRONTIER AIRLINES, INC. Adopted May 27, 2004 The Board of Directors adopted this Code of Business Conduct ( Code ) to establish basic legal and ethical

More information

User Manual. I-9 Management

User Manual. I-9 Management User Manual I-9 Management Revised April 21, 2009 This document is the user manual for a client implementing the TALX I-9 management service and is confidential to TALX Corporation. This document or any

More information

MAVI S PEOPLE AND ITS PRINCIPLES

MAVI S PEOPLE AND ITS PRINCIPLES 1 MAVI S PEOPLE AND ITS PRINCIPLES Contents 1. OUR UNDERSTANDING OF ETHICS 2. OUR MISSION, VISION AND VALUES 3. WE COMPLY WITH THE RULES 4. WE ARE AWARE OF OUR RESPONSIBILITIES 5. WE SOLVE PROBLEMS 6.

More information

Other legal considerations for your website content can include: Using proper company logos and listing trademarks and registered trademarks

Other legal considerations for your website content can include: Using proper company logos and listing trademarks and registered trademarks CONTENT: in media production, publishing, and art, content is information and experiences that provides value for an end-user or audience. Content As an e-commerce entrepreneur, you need to arm yourself

More information

Social Media and the New Workplace: Are Your Brand and Reputation Protected? Wednesday, March 8, 2017

Social Media and the New Workplace: Are Your Brand and Reputation Protected? Wednesday, March 8, 2017 Social Media and the New Workplace: Are Your Brand and Reputation Protected? Wednesday, March 8, 2017 Moderator Brian Wasyliw Sherrard Kuzz Toronto, Ontario bwasyliw@sherrardkuzz.com (416) 603-6237 Audio

More information

The NLRB and the Non-Union Employer

The NLRB and the Non-Union Employer The NLRB and the Non-Union Employer Baker, Donelson, Bearman, Caldwell & Berkowitz, PC Ben Bodzy Direct: 615.726.5640 E-mail: bbodzy@bakerdonelson.com Russell W. Gray Direct: 423.209.4218 E-mail: rgray@bakerdonelson.com

More information

Husch Blackwell s ediscovery Solutions Team

Husch Blackwell s ediscovery Solutions Team Husch Blackwell s ediscovery Solutions Team Chair, Tessa Jacob, Senior Counsel 816.983.8233 tessa.jacob@huschblackwell.com As chair of Husch Blackwell s ediscovery group, Tessa is responsible for establishing

More information

NOTE TO PERSONNEL FILE

NOTE TO PERSONNEL FILE NOTE TO PERSONNEL FILE The authority to establish job-related behavior and performance standards derives from the Nevada Revised Statutes Chapter 284 and the Nevada Administrative Code, specifically the

More information

2017 Cost of Data Breach Study

2017 Cost of Data Breach Study 2017 Cost of Data Breach Study United States Benchmark research sponsored by IBM Security Independently conducted by Ponemon Institute LLC June 2017 Ponemon Institute Research Report 2017 Cost of Data

More information

HR Compliance Updates for 2017 The Executive's Roadmap to Best-in-Class HR Strategy

HR Compliance Updates for 2017 The Executive's Roadmap to Best-in-Class HR Strategy HR Compliance Updates for 2017 The Executive's Roadmap to Best-in-Class HR Strategy 2017 TriNet Group, Inc. All rights reserved. Reproduction or distribution in whole or part without express written permission

More information

Living Our Purpose and Core Values CODE. Code of Business Ethics and Conduct for Vendors

Living Our Purpose and Core Values CODE. Code of Business Ethics and Conduct for Vendors Living Our Purpose and Core Values CODE Code of Business Ethics and Conduct for Vendors December 2016 HCSC Vendor Code of Business Ethics and Conduct Since 1936, Health Care Service Corporation, a Mutual

More information

SUITABLE FOR FNSBKG401. Financial Services Training

SUITABLE FOR FNSBKG401. Financial Services Training Financial Services Training Unit of Competency FNSBKG401A FNSBKG401ADevelop and implement policies and procedures relevant to bookkeeping activities Unit Descriptor This unit describes the performance

More information

BRANDING POLICY MARCH 2012

BRANDING POLICY MARCH 2012 BRANDING POLICY MARCH 2012 TABLE OF CONTENTS 1. Introduction 2. Purpose 3. Scope 4. Objectives 5. Definitions 6. Trademarks 7. Principles 8. Policy 9. Review of policy 10. Acquisition of the identity 1

More information

Procurement Assistance Software & Support, LLC. The USA Buyers eprocurement Marketplace

Procurement Assistance Software & Support, LLC. The USA Buyers eprocurement Marketplace Procurement Assistance Software & Support, LLC Toll Free Customer Support (866) 526 0160 838 East High Street, #254 Lexington, Ky 40502 Phone (859) 335 5306 The USA Buyers eprocurement Marketplace PARTICIPATING

More information

BCD SEMICONDUCTOR MANUFACTURING LIMITED CODE OF CONDUCT AND ETHICS. (As adopted on, 2010)

BCD SEMICONDUCTOR MANUFACTURING LIMITED CODE OF CONDUCT AND ETHICS. (As adopted on, 2010) BCD SEMICONDUCTOR MANUFACTURING LIMITED CODE OF CONDUCT AND ETHICS (As adopted on, 2010) TABLE OF CONTENTS Page I. Introduction... 1 II. Standards of Conduct... 1 III. Compliance with Laws, Rules and Regulations...

More information

CARNIVAL CORPORATION & PLC

CARNIVAL CORPORATION & PLC CARNIVAL CORPORATION & PLC Business Partner Code of Conduct and Ethics A Letter from our CEO Building and maintaining trust in our business relationships and pursuing the highest standards of ethical behavior

More information

1. OWNERSHIP AND USE OF SITE MATERIAL

1. OWNERSHIP AND USE OF SITE MATERIAL Terms of Use Welcome to the Steelscape, LLC ("Steelscape") web site (the "Site"). Please review these Terms of Use. By accessing or using the Site, you agree to follow and to be legally bound by these

More information

CODE OF CONDUCT FOR DOING BUSINESS WITH LINKEDIN

CODE OF CONDUCT FOR DOING BUSINESS WITH LINKEDIN CODE OF CONDUCT FOR DOING BUSINESS WITH LINKEDIN TABLE OF CONTENTS INTRODUCTION 1 Expectations LINKEDIN VALUES 2 MAINTAINING BUSINESS INTEGRITY 3 Anti-Corruption Competition Laws PROMOTING TRANSPARENCY

More information

Policy Outsourcing and Cloud-Based File Sharing

Policy Outsourcing and Cloud-Based File Sharing Policy Outsourcing and Cloud-Based File Sharing Version 3.3 Table of Contents Outsourcing and Cloud-Based File Sharing Policy... 2 Outsourcing Cloud-Based File Sharing Management Standard... 2 Overview...

More information

The Bank of Elk River: Digital Wallet Terms and Conditions

The Bank of Elk River: Digital Wallet Terms and Conditions The Bank of Elk River: Digital Wallet Terms and Conditions These Terms of Use ("Terms") govern your use of any eligible debit card issued by The Bank of Elk River (a "Payment Card") when you add, attempt

More information