This article discusses three trending topics that were discussed at the 2015 FOLEY Tech Summit by a few IoT experts.
Employees are the front line of your information security defense. While technological protections are essential (for example, antivirus software, firewalls, spam filters, etc.), none are as effective as a vigilant end user. These are checklists of measures of which every user should be aware.
Understand the big risk: how OFCCP, EEOC and private plaintiff’s counsel use big employer data. Learn how to inventory and assess what data is kept by your company and third-party vendors: Are your company and vendors requesting and/or keeping more than they should? Are your company and vendors running statistical analyses they should not without proper protection? Learn to comprehend what the statistical analyses show – where are your hot spots? Discuss how to protect your company now against potential systemic discrimination claims.
In-house counsel today exist in a vortex of competing and ever-changing legal requirements, regulatory schemes, technological developments, and budgetary constraints. This article tells you how to integrate technology into your legal department to simplify the task of thriving among these diverse and often contradictory forces, how to examine your internal processes, and how to implement technology to solve existing problems.