Cybersecurity in the Workplace
|
|
- Hilda Clarke
- 6 years ago
- Views:
Transcription
1 Cybersecurity in the Workplace Stephanie K. Rawitt, Esq. Jonathan D. Klein, Esq. ARIZONA CALIFORNIA DELAWARE ILLINOIS MICHIGAN NEVADA NEW JERSEY PENNSYLVANIA WASHINGTON D.C. WEST VIRGINIA IRELAND
2 Fun Fact: The #1 greatest cyber threat to your business is your very own employees. 2
3 Anatomy of an Employee Threat 3
4 The Most Dangerous Employees The Innocent Employee: An employee who makes an honest mistake during the course of his or her employment at your business, but nonetheless makes a mistake that could still have dyer consequences for your business. The Careless Employee: An employee who knows what should be done to protect your business yet does not take action, potentially causing harm. The Malicious Employee: An employee who, despite training and institutional policies in place at your business, knowingly and intentionally takes adverse action to harm your business for an illicit reason. 4
5 Key Security Questions Have you performed a risk assessment of your business? Do you have the appropriate policies/plans in place? Do you have an actionable incident response plan? Have you trained your employees lately on cybersecurity? Have you updated your privacy policy? Do you have a recent terms & conditions on your site? Would you consider your business security aware? If you answered NO to any of these, why is that? 5
6 Security Is a Team Effort Management Information Technology (IT) Staff Human Resources (HR) Staff Employees 6
7 What Does Risk Assessment Mean? Step 1: Identity Information Assets (data, software, hardware, appliances, infrastructure) Step 2: Classify Information Assets Step 3: Identify Security Requirements (statutes/regulations, contracts, common law, business needs) Step 4: Identify Risks 7
8 What Policies Should You Consider? Non-Compete/Non-Solicitation Policies Cybersecurity Employment Policy Employee Social Media Policy Computer-Issued Technology Equipment Policies Employee Privacy Rights Workplace Computer Policy Employee Exit Protocol Cybersecurity Incident Response Plan Privacy Policy/Terms of Use 8
9 Non-Compete/Non-Solicitation Policies Allows you to hire, contract, and otherwise operate your business without fear that business knowledge and advantages will soon be used against business! Provides a degree of protection for your business related to employees; Trade secrets and confidential information are protected; Prevents the following illicit actions by current and former employees: Going to work in a similar role for a competitor; Contacting your customers; and Using confidential information about you/your customers after they leave. 9
10 Cybersecurity Employment Policy Applies to all employees, contractors, volunteers, etc. who has permanent or even temporary access to your business systems and hardware; Emphasizes the importance of cybersecurity (including risks); Should outline effective password management; Describes phishing s and scams employees may experience; Helps employees understand how to protect sensitive information; Highlights security protocols when not using business hardware; Outlines what to do if business hardware is lost or stolen; and Explains to employees to use common sense and take an active role in security. 10
11 Employee Social Media Policy It is important for your business to keep track of what employees are doing, especially on issues that pertain to the workplace! Outlines how your employees should conduct themselves online; Helps safeguard business reputation while encouraging responsible online use; Should be considered a living document as social media changes fast; Defends against legal trouble and security risks; Empowers employees to share your business message to the public; Creates consistency across social media platforms; and Focus on the big picture so as to stay current with social media trends. 11
12 Computer-Based Equipment Policy Applies to any technology provided by your business to an employee; Should set out guidelines for approved use; Should outline security risks and rules related thereto/expectations; Should identify prohibited use (careful not to run afoul of the NLRB); Should remind employees that equipment is that of the business and clarify privacy expectations or lack thereof; Security login procedures/process; Even not a cyber issue, address off the clock policies; and Discipline for violations.
13 Employee Privacy Rights Policy Comprehensive, state-dependent written policies can defeat employee s expectation of privacy when it comes to the use of workplace technology; Reiterates that employees have no expectation of privacy in connection with data stored in or transmitted via computer, , phones, cell phones; Discusses that your business, as the employer, have the right to monitor any work-issued device (e.g., workplace computer, laptop, cell phone); Highlights that your business, as the employer, may monitor sites depending on content/subject-matter of site visited on work technology; and Notes that your business, as the employer, has the ability to, and can, monitor incoming and outgoing phone calls placed on work-issued technology. 13
14 Workplace Computer Policy Considers Internet usage, site management, and website blockage; Policy limits computer use to work-related activities; Applies universally to all employees (unless express permission granted); Discusses employee privacy rights (as noted previously) or lack thereof; Outlines before or after work, lunchtime, and other off-the-clock issues; and Reiterates procedures for employee exist and post-employment issues. 14
15 Employee Exit Protocol Outlines procedures when an employee resigns/is terminated; Should include, but is not limited to, the following: Knowledge transfer meeting; Procedure to collecting workplace items; Outlines transition period and plan; Highlights requirements on last day of employment Contains checklist for ensuring all business information protected; Reviews information for exiting employee; and Discusses preservation of employee electronic data. 15
16 Cybersecurity Incident Response Plan Preparing for WHEN your business may experience a cyber-related breach and/or incident, not IF your business may be breached. Words to Live by: Identify & Protect + Detect, Respond & Recover 16
17 Privacy Policies Essentially a consumer notice on your business website; Provides details about business procedures related to information collection; Drafted by lawyers, made for laypersons visiting your business website; Requires consultation between business/lawyers; NO ONE SIZE FITS ALL must be tailored to your business; Should contain information demonstrating regulatory compliance; Must be published conspicuously on your business website; and Periodic review and updating of privacy policy is the norm. 17
18 Terms of Use/Terms & Conditions Essentially a contract between your business and a visitor to the site; Sets the rules for any person visiting your business website to follow; Contains prohibited activities for any person visiting your business website; Even though may not be required, a smart page to have on your website; Can limit liability, set governing law, even set arbitration v. litigation; Contains notice provisions for copyright infringement, legal action, etc.; Protects your right to the content on your business website; NO ONE SIZE FITS ALL must be tailored to your business; and Periodic review and updating of terms is the norm. 18
19 19 Cybersecurity Insurance Even with appropriate protections and tools in place, your business should still consider cybersecurity insurance as a fail safe to protect your business from cyber risks. Some basics about cybersecurity insurance: Standalone coverage usually; Helps business recover faster from data loss; Transfers some of financial risk of security breach; Investigate current coverage before you apply; and Know the limitations of your coverage (likely will not cover theft of IP). 19
20 Cybersecurity Exercise Consider the following scenario: Your business has a network engineer or IT professional (as the case may be) in his mid-50s who you have decided to fire for cause. Somehow (and unrelated to this exercise), the network engineer or IT professional finds out that he is going to be imminently fired and decides to reset your business servers to their factory settings. What policies should govern the employee s actions? What do you do now?
21 QUESTIONS? Stephanie K. Rawitt Jonathan D. Klein
Risk Management in the workplace: Human Resource s role
Risk Management in the workplace: Human Resource s role Human Resource as Risk Management 1.Risk Areas 2.Risk Analysis Risk Areas Macro 1.Strategic 2.Compliance 3.Operational 4.Financial Risk Areas Macro
More information6 Steps For Avoiding Expensive Trade Secret
Page 1 of 5 Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com 6 Steps For Avoiding Expensive Trade Secret
More informationSocial Media Policies After the NLRB Facebook Firing Case Settles: What are Employers to Do?
Labor & Employment Alert February 2011 Social Media Policies After the NLRB Facebook Firing Case Settles: What are Employers to Do? By Marion B. Johnson and Meredith R. Murphy In American Medical Response
More informationStandard Statement and Purpose
Personnel Security Standard Responsible Office: Technology Services Initial Standard Approved: 10/23/2017 Current Revision Approved: 10/23/2017 Standard Statement and Purpose Security of information relies
More information6 Ways To Protect Your Business From Data Breaches in 2017
6 Ways To Protect Your Business From Data Breaches in 2017 Alaskan-owned company providing Paper Shredding & Hard Drive Destruction Services. We serve all of Southcentral Alaska with professional, secure,
More informationEmployee Defection: Tools and Strategies for Protecting Company Assets
Employee Defection: Tools and Strategies for Protecting Company Assets December 17, 2015 Noel R. Boeke Holland & Knight LLP 100 N. Tampa Street, Suite 4100 Tampa, FL 33602 813-227-6525 noel.boeke@hklaw.com
More informationDRAFT - WORKPLACE VIOLENCE & HARASSMENT POLICY
DRAFT - WORKPLACE VIOLENCE & HARASSMENT POLICY 1. PHILOSOPHY The management of Ontario Camps Association ( OCA ) is committed to providing a work environment in which all individuals (staff and volunteers)
More informationINSIDE. 2 Introduction 12 Conclusion 4 6. How Prepared Are Corporate Law Departments?
INSIDE 1 A Message From Morrison & Foerster s Global Risk & Crisis Management Chair 7 How Prepared Are Corporate Law Departments? 2 Introduction 12 Conclusion 4 6 Risk and Crisis Management: An Emerging
More informationDHT HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS
November 2012 DHT HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics (the Code ) summarizes the values, principles and the business practices which
More informationFACC Social Media Guidelines & Policy
Fulshear Area Chamber of Commerce http://www.fulshearareachamber.com/ Phone: 832. 600.3221 FACC Social Media Guidelines & Policy The Fulshear Area Chamber of Commerce (FACC) Board and staff recognize the
More informationACC L&E Roundtable Rick Albert Krista Cabrera Kamran Mirrafati Archana Acharya
1 ACC L&E Roundtable Rick Albert Krista Cabrera Kamran Mirrafati Archana Acharya Discussion Topics: Combating The Rise Of California Disability Discrimination Lawsuits The National Labor Relations Board
More informationSOCIAL MEDIA AND THE NLRB
SOCIAL MEDIA AND THE NLRB If your company is using social media, it should adopt, implement and enforce a social media policy. The purpose of the social media policy is to set the rules for how a company
More informationBackground Screening Best Practices & EEOC Guidance: A Compliance Tool for Employers
Background Screening Best Practices & EEOC Guidance: A Compliance ADP Background, Drug Testing and Medical Screening Services Background Screening Best Practices & EEOC Guidance: A Compliance 1 Background
More informationBIG LOTS, INC. CODE OF BUSINESS CONDUCT AND ETHICS
September 2003 BIG LOTS, INC. CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business principles to guide all directors, officers and associates
More informationGuidelines and supervision on the use of IT tools of the University College
Guidelines and supervision on the use of IT tools of the University College Introduction The employer has the authority to set up guidelines for the use of IT tools that are available for employees and
More informationManaging Insider Risk through Training & Culture. Sponsored by Experian Data Breach Resolution
Managing Insider Risk through Training & Culture Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report
More informationSocial Media Policy. Reference: HR th December Induction CD/ Sharepoint/ EDRMS HR Site/ Website
Social Media Policy Reference: Document Type: Status of Document: Policy Final Version: 1.2 Date Approved: 16 th December 2014 Approved By: Publication Date: Review Date Policy Owner Applies to: Document
More informationEmployee Clearance Procedure
Employee Clearance Procedure Responsible Offices: Campus Safety and Human Resources Secondary Office: Information Technology, Payroll, Key Shop, Parking Services, Purchasing 1. PURPOSE This policy establishes
More informationSocial Media. Guide for employees
Social Media Guide for employees This guide outlines the standards of behaviour expected from all employees when using social media as part of their job for Royal Mail and also for personal use where it
More informationMid Year 2017 HR Compliance Trends
Mid Year 2017 HR Compliance Trends The Executive's Roadmap to Best-in-Class HR Strategy August 3, 2017 2017 TriNet Group, Inc. All rights reserved. Reproduction or distribution in whole or part without
More informationMobile banking and payments: What are the US rules?
Mobile banking and payments: What are the US rules? www.infosys.com/finacle Universal Banking Solution Systems Integration Consulting Business Process Outsourcing Mobile banking and payments: What are
More informationClickStaff Orientation Training. Presented to: Contingent Workers Presented by: <Supplier ABC> Version Effective Date: June 20, 2012 Version: 8FINAL
ClickStaff Orientation Training Presented to: Contingent Workers g Presented by: Version Effective Date: June 20, 2012 Version: 8FINAL Housekeeping reminders Session will take about 15-20
More informationTriple C Housing, Inc. Compliance Plan
Triple C Housing, Inc. Compliance Plan Adopted by Board of Directors on draft November 13, 2014 Overview Triple C Housing, Inc. is committed to its consumers, employees, contractual providers, vendors,
More informationFederal Compliance Checklists, Checklist: Conducting Employment Investigations
Employment Checklists Federal Compliance Checklists Work Rules and Employee Conduct Checklist: Conducting Employment Investigations Checklist: How to Conduct Employment Investigations Purpose: A prompt,
More informationManaging Employees in an Increasingly Mobile World. December 15, 2016
Managing Employees in an Increasingly Mobile World December 15, 2016 Presenters Bill Flanagan Hogan Lovells Partner, Northern Virginia and Washington, D.C. T 1+ 202 637 3287 bill.flanagan@hoganlovells.com
More informationSocial Media on the Workplace
Considerations regarding the effect of Social Media on the Workplace Scott F. Singley, Esq. Lindsey S. Wiseman, Esq. October 26, 2011 Overview The term Social Media is too broad and fluid to specifically
More informationSOCIAL MEDIA RISKS. Of Healthcare Organizations. October Sponsored by:
SOCIAL MEDIA RISKS Of Healthcare Organizations October 2011 Sponsored by: SOCIAL MEDIA RISKS Of Healthcare Organizations Social media sites such as Facebook, Twitter, YouTube and LinkedIn have become integral
More informationTABLE OF CONTENTS ONLY
TABLE OF CONTENTS ONLY Business Continuity Compensation Report - United States of America Compensation Review May 2017 Benchmarking. Plan Ahead. Be Ahead. Data collected between January March 2017 with
More informationGuidelines for Information Asset Management: Roles and Responsibilities
Guidelines for Information Asset Management: Roles and Responsibilities Document Version: 1.0 Document Classification: Public Published Date: April 2017 P a g e 1 Contents 1. Overview:... 3 2. Audience...
More informationPHILADELPHIA COLLEGE OF OSTEOPATHIC MEDICINE POLICIES AND PROCEDUES. Policy and Procedures Index
Employee and Student Acknowledgement Form General Information Function of Management Information Systems and Telecommunications Policy Number Computing Resources and Access 1.05 Computer Resource Usage
More informationASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS
ASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business practices and procedures. It does not cover every issue that
More informationTRADE SECRET DISPUTES AND EMPLOYMENT RISKS
TRADE SECRET DISPUTES AND EMPLOYMENT RISKS REPRINTED FROM: CORPORATE DISPUTES MAGAZINE OCT-DEC 2014 ISSUE corporate CDdisputes Visit the website to request a free copy of the full e-magazine Published
More information* SAKURA Rules * (Code of Conduct for the Terumo Group)
* SAKURA Rules * (Code of Conduct for the Terumo Group) Terumo Corporation TABLE OF CONTENTS Chapter1. Introduction...2 1.1 Objectives 1.2 Definitions 1.3 Scope of Application of the SAKURA Rules 1.4 Inquiries
More informationNew Technology: Mission Impossible?
New Technology: Mission Impossible? Trainer: Ryan Peasley, MCSA, Consultant 1 Session Mission Understand current technology trends (cloud, mobile, social) Discuss technology challenges our agencies face
More informationSOCIAL MEDIA AND THE WORKPLACE
SOCIAL MEDIA AND THE WORKPLACE Presented By: Ronni M. Travers, SPHR, President Public Sector HR Consultants LLC Office: (518) 399-4512 Email: rtravers@publicsectorhr.org Quick Survey of Attendees 1. Who
More informationPolicy Work Health and Safety (WHS) RCPA Introduction WHS legislation
Policy Subject: Work Health and Safety (WHS) Approval Date: July 2011, December 2014 Review Date: July 2018 Review By: Board of Directors Number: 1/2011 The Royal College of Pathologists of Australasia
More informationManaging Online Reputation in a Digital World
Managing Online Reputation in a Digital World September 2013 CSID.COM TABLE OF CONTENTS OVERVIEW --------------------------------------------------------------------------------------------------------------------------
More informationCorporate Legal Audit Program
Corporate Legal Audit Program Important commercial transactions that lay a foundation for future success share a common characteristic: They have benefitted from advance preparation, scrupulous review,
More informationDRAFT ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security management system implementation guidance
INTERNATIONAL STANDARD ISO/IEC 27003 First edition 2010-02-01 Information technology Security techniques Information security management system implementation guidance Technologies de l'information Techniques
More informationPrivacy and Social Networking in the Workplace
Privacy and Social Networking in the Workplace International Labor Group Moderator: Aaron J. Schindel, New York Presenters: Daniel Ornstein, London Cécile Martin, Paris How can an employer legally monitor
More informationSouthwest Airlines Co. Code of Ethics
Southwest Airlines Co. Code of Ethics Introduction Southwest Airlines Co. is committed to maintaining the highest standards of ethical business practices and legal and regulatory compliance. We place a
More informationHarassment and Hostile Workplace: What HR Directors Need to Know* prepared for
Harassment and Hostile Workplace: What HR Directors Need to Know* prepared for presented by Jonathan A. Segal, Esq. Jonathan_HR_Law * No statements made in this seminar or in the PowerPoint or other materials
More informationInsurance & Investments Simple. Fast. Easy. CODE OF BUSINESS CONDUCT
Insurance & Investments Simple. Fast. Easy. CODE OF BUSINESS CONDUCT TABLE OF CONTENTS MESSAGE FROM THE PRESIDENT....1 VISION, MISSION & VALUES.... 2 PURPOSE.... 3 HOW DOES THE CODE APPLY TO ME?.... 3
More informationCODE OF CONDUCT Version 3 August 2016
CODE OF CONDUCT Version 3 August 2016 Table of Contents 1. INTRODUCTION... 3 2. COMPLIANCE WITH LOCAL LAWS AND REGULATIONS... 3 3. FAIR COMPETITION... 4 4. ANTI BRIBERY AND ANTI CORRUPTION... 4 5. WORKING
More informationIntuit Supplier Code of Conduct
Intuit Supplier Code of Conduct At Intuit we simplify the business of life. We invent solutions to important problems. We innovate. This is what we strive for every day, and we truly value the role our
More informationGeneral Counsel Report
General Counsel Report Facts & Analysis In Partnership with 2017 Consero Group. Reproduction Prohibited. January 2017 Introduction General Counsel Report Today s General Counsel is responsible for overseeing
More informationCalifornia Roadmap: Employment Law Update
California Roadmap: Employment Law Update Friday, February 1, 2013 Orange County Copyright 2013, Littler Mendelson, P.C. Presented by: Bob Conti, Esq. Littler Mendelson, P.C. Orange County Office Shareholder
More informationPersonal Finance Unit 1 Chapter Glencoe/McGraw-Hill
0 Chapter 2 Finances and Career Planning What You ll Learn Section 2.1 Identify the personal issues to consider when choosing and planning your career. Explain how education and training affect career
More informationﺖﻴﻨﻣا ﺖﻳﺮﻳﺪﻣ ﻢﺘﺴﻴﺳ ﻲﺷزﻮﻣآ رﺎﻨﻴﻤﺳ يﺎﻫدراﺪﻧﺎﺘﺳا يﺎﻬﺘﺳﺎﻴﺳ ﻪﻳﺎﭘ ﺮﺑ تﺎﻋﻼﻃا BS7799 & BS15000 لوا ﻲﺷزﻮﻣآ رﺎﻨﻴﻤﺳ
سمينار آموزشي سيستم مديريت امنيت اطلاعات بر پايه سياستهاي استانداردهاي BS7799 & BS15000 سمينار آموزشي اول Part One Information Security Management Systems Dr. Sc. Houman Sadeghi Kaji Spread Spectrum Communication
More informationCode of Business Conduct and Ethics
Code of Business Conduct and Ethics Table of Contents Purpose... 1 Scope... 1 Policy... 2 Responsibilities... 8 Enforcement... 8 Review and Revision... 8 PURPOSE Pursuant to the Sarbanes-Oxley Act of 2002
More informationCODE OF ETHICS AND BUSINESS CONDUCT
CODE OF ETHICS AND BUSINESS CONDUCT 1.0 SCOPE This Code of Ethics and Business Conduct (the Code of Conduct ) is implemented by the Board of Directors (the Board ) of Dominion Diamond Corporation and applies
More informationImmigration Update: Strategies for Effective Corporate Compliance
Immigration Update: Strategies for Effective Corporate Compliance Presented by: Gus M. Shihab, Esq. The Law Firm of Shihab & Associates Co., L.P.A. 65 East State Street, Suite 1550, Columbus, Ohio 43215
More informationGeneral user conditions for supplier s applications and the AUMA supplier portal
Page 1 of 7 General user conditions for supplier s applications and the AUMA supplier portal AUMA Riester GmbH & Co. KG ( AUMA, we, us or our ) is continuously interested in finding national as well as
More informationQUALITY MANAGEMENT SYSTEM POLICIES AND PROCEDURES
Your Company Name QUALITY MANAGEMENT SYSTEM POLICIES AND PROCEDURES Origination Date: XXXX Document Identifier: Date: Document Revision: QMS-00 QMS Policies and Procedures Latest Revision Date Abstract:
More informationANNEX 2 Security Management Plan
ANNEX 2 Page 1 of 24 The following pages define our draft security management plan (a complete and up to date shall be submitted to The Authority within 20 days of contract award as per Schedule 2.4, para
More informationSOCIAL MEDIA - POLICIES AND PROCEDURES
Network of Community Options, Inc. SOCIAL MEDIA - POLICIES AND PROCEDURES Effective Date July 1, 2012 Implementation Date July 1, 2012 Social Media / Electronic Media Introduction NCO, Inc. maintains and
More informationSecurity Monitoring Service Description
Security Monitoring Service Description Contents Section 1: UnderdefenseSOC Security Monitoring Service Overview 3 Section 2: Key Components of the Service 4 Section 3: Onboarding Process 5 Section 4:
More informationCreating a Job Search Program In Your Church, Synagogue Or Community Organization
Creating a Job Search Program In Your Church, Synagogue Or Community Organization Special Supplement to The Unwritten Rules of the Highly Effective Job Search By Orville Pierson Note: This Special Supplement
More informationRELM WIRELESS CORPORATION (the Company ) CODE OF BUSINESS CONDUCT AND ETHICS
RELM WIRELESS CORPORATION (the Company ) CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business practices and procedures. It does not
More informationOilfield Service Co.
Oilfield Service Co. Peak Oilfield Service Company Code of Business Ethics and Compliance From the President Our role in supporting the oil and gas industry is simple: we provide capable, satisfi ed employees
More informationWHITE PAPER. IoT-enabled Banking Services
WHITE PAPER IoT-enabled Banking Services The Internet of Things (IoT) is the next big and imminent thing in financial services. It is a network of connected devices through the Internet, which receive
More informationCode of Conduct STANDARD PRACTICE 150
Code of Conduct STANDARD PRACTICE 150 - - - - - - - - - - PAGE INTENTIONALLY LEFT BLANK - - - - - - - - - - STANDARD PRACTICE 150 Code of Conduct 1. PURPOSE... 3 2. RESPONSIBILITY... 3 3. NO RETALIATION...
More informationGIRL GUIDES AUSTRALIA (GGA) SOCIAL MEDIA POLICY
ACN 070 581 770 GIRL GUIDES AUSTRALIA (GGA) SOCIAL MEDIA POLICY This policy is to be provided to all employees, adult and youth members, and volunteers of GGA, its member State Girl Guide Organisations
More informationPamela H. Salgado. Focus Areas. Overview
Shareholder One Union Square 600 University Street, Suite 3200 98101 main: (206) 623-3300 direct: (206) 381-4928 fax: (206) 447-6965 psalgado@littler.com Focus Areas Discrimination and Harassment Leaves
More informationInformation Governance Policy and Management Framework
Putting Barnsley People First Information Governance Policy and Management Framework Version: 2.0 Approved By: Governing Body Date Approved: February 2014 Name of originator / author: Richard Walker Name
More information1. an Employee's private interests interfere, or even appear to interfere, with the interests of the Company;
I. INTRODUCTION CBRE, ( the Company ) is firmly committed to conducting business with the highest integrity and in compliance with the letter and spirit of the law. Our Standards of Business Conduct requires
More informationLanguage that Helps; Language that Hurts George H. Faulkner, Esq.
Language that Helps; Language that Hurts George H. Faulkner, Esq. Unions strike over an employer discontinuing health care coverage. Unions strike over an employer discontinuing pension contributions.
More informationStatus Update: Developments On Social Media In The Workplace
Status Update: Developments On Social Media In The Workplace League of California Cities City Attorney Track September 19, 2013 Traci I. Park Burke, Williams & Sorensen, LLP www.bwslaw.com Los Angeles
More informationC. MCCMH Hardware and Systems: MCCMH owned or leased equipment, facilities, internet addresses or domain names registered to MCCMH.
protect MCCMH Staff s First Amendment rights to Freedom of Speech, Michigan s Internet Privacy Protection Act (IPPA), and the Michigan Public Employment Relations Act (PERA). B. Confidential Information:
More informationToyota Material Handling UK Code of Conduct
Code of Conduct Toyota Material Handling UK Code of Conduct Page 2. 3. 4. 5. 6. 7-8. 9 10. 11-13. 14. 15. Contents Table of contents and definitions The Toyota mission Our core values How to use the code
More informationRich S. Falcone. Focus Areas. Overview
Shareholder 2050 Main Street Suite 900 Irvine, CA 92614 main: (949) 705-3000 direct: (949) 705-3037 fax: (949) 724-1201 rfalcone@littler.com Focus Areas Litigation and Trials Labor Management Relations
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationISO 28002: RESILIENCE IN THE SUPPLY CHAIN: REQUIREMENTS WITH GUIDANCE FOR USE
Version 1b: September 5, 2009 ISO 28002: RESILIENCE IN THE SUPPLY CHAIN: REQUIREMENTS WITH GUIDANCE FOR USE Draft Version 1b: September 5, 2009 Abstract A comprehensive management systems approach to prevent,
More informationINTERWORLD SRL FREIGHT FORWARDING CO. CODE OF CONDUCT
INTERWORLD SRL FREIGHT FORWARDING CO. CODE OF CONDUCT INTERWORLD SRL INTERNAL CODE OF CONDUCT INDEX A. Letter From Simone Rovida, Managing Director Page 3 B. International Code of Conduct Page 4. MANAGING
More informationLEGAL ISSUES IN SOCIAL MEDIA FOR CHARITIES
Philanthropy Forum 2016 Community Foundation of Greater Peterborough November 15, 2016 LEGAL ISSUES IN SOCIAL MEDIA FOR CHARITIES By Terrance S. Carter, B.A., LL.B., TEP, Trade-mark Agent tcarter@carters.ca
More informationVolunteer Handbook
Volunteer Handbook 2014-2015 Rev 5/14 Table of Contents Letter of Welcome 3 Our Mission 4 Purpose of Volunteer Program 5 Our Services 6 Background Checks & Confidentiality 7 General Guidelines 8 Anti-Harassment
More information2017 Cost of Data Breach Study
2017 Cost of Data Breach Study Australia Benchmark research sponsored by IBM Security Independently conducted by Ponemon Institute LLC June 2017 Ponemon Institute Research Report Part 1. Introduction 2017
More informationSTATEMENT OF BUSINESS ETHICS
STATEMENT OF BUSINESS ETHICS CONTENTS Foreword 1 About us 2 Our Code of Conduct 3 Our values 3 Guiding principles 4 - Safety 4 - Value for money 4 - Open, fair and honest 4 Essential Energy procurement
More informationS.D.F ELECTRICAL PTY LTD ABN EMPLOYEE POLICY BOOKLET
S.D.F ELECTRICAL PTY LTD EMPLOYEE POLICY BOOKLET 2017 S.D.F ELECTRICAL PTY LTD BLANK PAGE S.D.F Electrical Pty Ltd BUSINESS OBJECTIVES KEY POLICIES ASSOCIATED PROCEDURES Working Live Establishing Employee
More informationCODE OF BUSINESS CONDUCT AND ETHICS. FRONTIER AIRLINES, INC. Adopted May 27, 2004
1. Introduction CODE OF BUSINESS CONDUCT AND ETHICS FRONTIER AIRLINES, INC. Adopted May 27, 2004 The Board of Directors adopted this Code of Business Conduct ( Code ) to establish basic legal and ethical
More informationUser Manual. I-9 Management
User Manual I-9 Management Revised April 21, 2009 This document is the user manual for a client implementing the TALX I-9 management service and is confidential to TALX Corporation. This document or any
More informationMAVI S PEOPLE AND ITS PRINCIPLES
1 MAVI S PEOPLE AND ITS PRINCIPLES Contents 1. OUR UNDERSTANDING OF ETHICS 2. OUR MISSION, VISION AND VALUES 3. WE COMPLY WITH THE RULES 4. WE ARE AWARE OF OUR RESPONSIBILITIES 5. WE SOLVE PROBLEMS 6.
More informationOther legal considerations for your website content can include: Using proper company logos and listing trademarks and registered trademarks
CONTENT: in media production, publishing, and art, content is information and experiences that provides value for an end-user or audience. Content As an e-commerce entrepreneur, you need to arm yourself
More informationSocial Media and the New Workplace: Are Your Brand and Reputation Protected? Wednesday, March 8, 2017
Social Media and the New Workplace: Are Your Brand and Reputation Protected? Wednesday, March 8, 2017 Moderator Brian Wasyliw Sherrard Kuzz Toronto, Ontario bwasyliw@sherrardkuzz.com (416) 603-6237 Audio
More informationThe NLRB and the Non-Union Employer
The NLRB and the Non-Union Employer Baker, Donelson, Bearman, Caldwell & Berkowitz, PC Ben Bodzy Direct: 615.726.5640 E-mail: bbodzy@bakerdonelson.com Russell W. Gray Direct: 423.209.4218 E-mail: rgray@bakerdonelson.com
More informationHusch Blackwell s ediscovery Solutions Team
Husch Blackwell s ediscovery Solutions Team Chair, Tessa Jacob, Senior Counsel 816.983.8233 tessa.jacob@huschblackwell.com As chair of Husch Blackwell s ediscovery group, Tessa is responsible for establishing
More informationNOTE TO PERSONNEL FILE
NOTE TO PERSONNEL FILE The authority to establish job-related behavior and performance standards derives from the Nevada Revised Statutes Chapter 284 and the Nevada Administrative Code, specifically the
More information2017 Cost of Data Breach Study
2017 Cost of Data Breach Study United States Benchmark research sponsored by IBM Security Independently conducted by Ponemon Institute LLC June 2017 Ponemon Institute Research Report 2017 Cost of Data
More informationHR Compliance Updates for 2017 The Executive's Roadmap to Best-in-Class HR Strategy
HR Compliance Updates for 2017 The Executive's Roadmap to Best-in-Class HR Strategy 2017 TriNet Group, Inc. All rights reserved. Reproduction or distribution in whole or part without express written permission
More informationLiving Our Purpose and Core Values CODE. Code of Business Ethics and Conduct for Vendors
Living Our Purpose and Core Values CODE Code of Business Ethics and Conduct for Vendors December 2016 HCSC Vendor Code of Business Ethics and Conduct Since 1936, Health Care Service Corporation, a Mutual
More informationSUITABLE FOR FNSBKG401. Financial Services Training
Financial Services Training Unit of Competency FNSBKG401A FNSBKG401ADevelop and implement policies and procedures relevant to bookkeeping activities Unit Descriptor This unit describes the performance
More informationBRANDING POLICY MARCH 2012
BRANDING POLICY MARCH 2012 TABLE OF CONTENTS 1. Introduction 2. Purpose 3. Scope 4. Objectives 5. Definitions 6. Trademarks 7. Principles 8. Policy 9. Review of policy 10. Acquisition of the identity 1
More informationProcurement Assistance Software & Support, LLC. The USA Buyers eprocurement Marketplace
Procurement Assistance Software & Support, LLC Toll Free Customer Support (866) 526 0160 838 East High Street, #254 Lexington, Ky 40502 Phone (859) 335 5306 The USA Buyers eprocurement Marketplace PARTICIPATING
More informationBCD SEMICONDUCTOR MANUFACTURING LIMITED CODE OF CONDUCT AND ETHICS. (As adopted on, 2010)
BCD SEMICONDUCTOR MANUFACTURING LIMITED CODE OF CONDUCT AND ETHICS (As adopted on, 2010) TABLE OF CONTENTS Page I. Introduction... 1 II. Standards of Conduct... 1 III. Compliance with Laws, Rules and Regulations...
More informationCARNIVAL CORPORATION & PLC
CARNIVAL CORPORATION & PLC Business Partner Code of Conduct and Ethics A Letter from our CEO Building and maintaining trust in our business relationships and pursuing the highest standards of ethical behavior
More information1. OWNERSHIP AND USE OF SITE MATERIAL
Terms of Use Welcome to the Steelscape, LLC ("Steelscape") web site (the "Site"). Please review these Terms of Use. By accessing or using the Site, you agree to follow and to be legally bound by these
More informationCODE OF CONDUCT FOR DOING BUSINESS WITH LINKEDIN
CODE OF CONDUCT FOR DOING BUSINESS WITH LINKEDIN TABLE OF CONTENTS INTRODUCTION 1 Expectations LINKEDIN VALUES 2 MAINTAINING BUSINESS INTEGRITY 3 Anti-Corruption Competition Laws PROMOTING TRANSPARENCY
More informationPolicy Outsourcing and Cloud-Based File Sharing
Policy Outsourcing and Cloud-Based File Sharing Version 3.3 Table of Contents Outsourcing and Cloud-Based File Sharing Policy... 2 Outsourcing Cloud-Based File Sharing Management Standard... 2 Overview...
More informationThe Bank of Elk River: Digital Wallet Terms and Conditions
The Bank of Elk River: Digital Wallet Terms and Conditions These Terms of Use ("Terms") govern your use of any eligible debit card issued by The Bank of Elk River (a "Payment Card") when you add, attempt
More information