Vote Trump 2016 !

Vote Trump 2016 !
Trump 2016
Showing posts with label #SocialMediaLaw. Show all posts
Showing posts with label #SocialMediaLaw. Show all posts

Thursday, July 07, 2016

Hiring and wage & hour laws in #Illinois #Law #Labor

Jackson Lewis PC

Jody Kahn Mason
USA July 7 2016
Use the Lexology Navigator tool to compare the answers in this article with those from 20+ other jurisdictions.
Hiring
Advertising
What are the requirements relating to advertising open positions?

There are no specific requirements under Illinois law. 
Background checks
What can employers do with regard to background checks and inquiries?
(a) Criminal records and arrests

The Job Opportunities for Qualified Applicants Act (“Ban the Box Act”) prohibits most Illinois employers from considering or inquiring into a job applicant’s criminal record or history until after the individual has been determined qualified for the position and notified of an impending interview or, if the applicant will not be interviewed, until after a conditional offer of employment is made. The act does not preclude an employer from notifying applicants in writing of specific offenses that will disqualify an applicant from employment in a particular position due to federal or state law or the employer’s policy. Additionally, Illinois employers are prohibited from discriminating against applicants or employees on the basis of their arrest records.
(b) Medical history

The Genetic Information Privacy Act prohibits employers from seeking or using genetic information for personnel-related reasons. It is similar to the federal Genetic Information Non-discrimination Act, except that the Genetic Information Privacy Act covers employers with at least one employee. Additionally, the AIDS Confidentiality Act provides that no person may order an HIV test without first obtaining the documented informed consent of the subject of the test or the subject’s legally authorized representative.
(c) Drug screening

Illinois has no statute relating to drug testing. However, the Illinois Human Rights Act explicitly states that it is not illegal for employers to require drug tests of employees who have or are in a drug rehabilitation program.
(d) Credit checks

The Illinois Credit Privacy Act prohibits covered employers from inquiring about an applicant or employee’s credit history or obtaining a copy of his or her credit report. However, employers may inquire about an employee or applicant’s credit history for a position in which credit history is a “bona fide occupational qualification,” as defined in the act.
(e) Immigration status

Although there are no explicit protections under Illinois law based on immigration status, the Illinois Human Rights Act, Cook County Human Rights Ordinance and Chicago Human Rights Ordinance all prohibit discrimination on the basis of national origin.
(f) Social media

The Illinois Right to Privacy in the Workplace Act allows employers to access employees’ professional social media accounts. However, the act generally prohibits employers from requesting that any employee or prospective employee provide a password or other account information to enable the employer to gain access to an employee’s personal social networking accounts.
Wage and hour
Pay
What are the main sources of wage and hour laws in your state?

The Illinois Minimum Wage Law, the Equal Pay Act, the Prevailing Wage Act, and the Chicago Minimum Wage Law are the primary wage and hour laws in Illinois.
What is the minimum hourly wage?

The minimum wage in Illinois is $8.25 per hour. Effective as of July 1 2016, the minimum wage in the City of Chicago is $10.50 per hour. The Chicago minimum wage will increase to $11 per hour effective from July 1 2017, and will continue to rise each year thereafter.
What are the rules applicable to final pay and deductions from wages?

Final payment of wages must occur at the time of separation, if possible, but no later than the next regularly scheduled payday. Further, expenses incurred related to services performed for the employer should be included in the final compensation paid to a separated employee.
Hours and overtime
What are the requirements for meal and rest breaks?

Employees who work for seven and a half continuous hours or longer must be “permit[ted] at least a 20-minute meal break beginning no later than 5 hours after the start of work.” This requirement applies to virtually all employees, including exempt employees; the only exceptions are for employees who monitor persons with developmental disabilities and employees whose meal periods are fixed by a collective bargaining agreement. No other rest or meal breaks are required under Illinois law.
What are the maximum hour rules?

The Illinois One Day Rest in Seven Act requires employers to give employees at least 24 consecutive hours of rest in every calendar week. A calendar week is defined as seven consecutive 24-hour periods starting at 12:01 a.m. Sunday morning and ending at midnight the following Saturday. There are various exceptions to this rule, including for exempt employees and for employees required to work under emergency conditions.
How should overtime be calculated?

Overtime is calculated as one and one half times the employee’s regular rate of pay for any hours worked in excess of 40 in a working week.
What exemptions are there from overtime?

Illinois recognizes the executive, administrative and professional exemptions to its overtime law. However, the requirements to meet the exemptions under Illinois law are more onerous than the requirements to meet the exemptions under the federal Fair Labor Standards Act.
Record keeping
What payroll and payment records must be maintained?

Under the Equal Pay Act, employers must preserve records documenting the name, address, and wages paid to each employee for a period of not less than five years, or longer if the employer is the subject of an investigation by the Department of Labor. Additionally, regardless of an employee’s status as an exempt administrative employee, executive or professional, every employer must keep for at least three years accurate records of:
  • the name and address of each employee;
  • the hours worked each day in each working week by each employee;
  • the rate of pay;
  • the amount paid each pay period to each employee; and
  • all deductions made from wages or final compensation. 
An employer that provides paid vacation to its employees must maintain records for no less than three years of the number of vacation days earned for each year and the dates on which such vacation days were taken and paid.
Click here to view the full article.

#Illinois Residents on #Google Challenge To 'Faceprint' #Law !

by  @wendyndavis, Yesterday, 4:49 PM

Illinois residents who are suing Google for allegedly violating a state privacy law regarding "faceprints" are urging a judge to reject the company's argument that the state measure is unconstitutional.
"This argument is without merit," counsel for Lindabeth Rivera and Joseph Weiss say in court papers. They add that Google's compliance with the Illinois Biometric Information Privacy Act "poses no risk of burdening interstate commerce whatsoever."
The Illinois residents' papers, filed late last week, come in response to Google's contention that requiring online photo services to follow a state privacy law regarding "faceprints" would be unconstitutional.
The legal dispute dates to March, when Rivera alleged in a potential class-action that Google Photos unlawfully stores faceprints of "millions" of other state residents. Weiss later filed a similar lawsuit, which was consolidated with Rivera's.
They accuse Google of violating the Illinois Biometric Information Privacy Act, which requires companies to obtain written releases from people before collecting certain biometric data, including scans of face geometry. That measure, passed in 2008, also requires companies that gather biometric data to notify people about the practice, and to publish a schedule for destroying the information.
Rivera said in her complaint that she doesn't have a Google Photos account, but that photos of her were uploaded to the service after they were taken by someone else. Google "analyzed these photos by automatically locating and scanning plaintiff’s face, and by extracting geometric data relating to the contours of her face and the distances between her eyes, nose, and ears -- data which Google then used to create a unique template of Plaintiff’s face," she alleges.
Weiss says he has a Google Photos account and uploaded 21 photos of himself. He says Google used data from those photos to create a faceprint of him.
Google recently asked U.S. District Court Judge Edmond Chang to dismiss the case for several reasons, including that it has no way of knowing whether a photo depicts an Illinois resident. Therefore, Google argues, applying the Illinois law to photos would effectively regulate activity that doesn't have a connection to the state. The company argues that this result is unconstitutional, because only Congress can regulate interstate commerce.
"If BIPA is interpreted to apply to Google Photos, it would have the 'practical effect' of regulating conduct occurring entirely outside of Illinois," Google argued in court papers filed earlier this year. "It would also subject Google to inconsistent regulations and usurp the ability of other states to make their own policy choices regarding digital photos."
But Rivera and Weiss counter that Google should use IP addresses and "geo-tracking data" to refrain from collecting biometric data from photos uploaded from Illinois. "Google can determine whether a particular photograph is subject to the regulations of BIPA -- that is, whether a photograph is uploaded from within Illinois -- by analyzing whether an Illinois-based IP address is associated with the device uploading the photograph," they argue.
Chang has scheduled a hearing in the matter for August 2.
Recommend (1)PrintRSS
All content published by MediaPost is determined by our editors 100% in the interest of our readers ... independent of advertising, sponsorships or other considerations.
More

Friday, June 10, 2016

Will Egypt's #Cybercrime law overstep boundaries? #Social #Media

A man works on a computer at an internet cafe in Cairo, Dec. 20, 2008. (photo by REUTERS/Amr Dalsh)O — In what observers, human rights activists and politicians consider a setback for freedoms in Egypt and a prelude to a historic turning point toward stifling dissent and cracking down on the young opposition, the Egyptian parliament began work on a new cybercrime law on May 10.
Summary⎙ Print As the Egyptian government nears adoption of a new cybercrime law, human rights organizations and observers decried the move, considering it the latest government tool to crack down on dissent.
Author Khalid Hassan
TranslatorMohammad Khalil
The move came after the Suggestions and Complaints Committee accepted parliament member Tamer Shahawy’s motion calling for action against “chaos” and individual "violations" on the internet. Some Egyptians had gone online to express their strong opposition to government moves including the Egyptian government’s decision to cede to Saudi Arabia the islands of Tiran and Sanafir. Shahawy considered the internet outcry a threat to national security.
A military man, Maj. Gen. Shahawy was nicknamed “the intelligence falcon” by his supporters for the 20 years he spent in the Egyptian military intelligence service before being elected to parliament.
On May 10, Shahawy announced that a number of government officials were present during the meeting to discuss the new bill, including representatives from the Defense and Interior Ministries. The bill was then reviewed by the defense and national security and communications committees before being put to a parliament vote.
In a petition submitted to parliament, Shahawy noted that the law aims to protect national security, saying, “As a legislature, and given the constant threats to Egypt’s national security in all its national, regional and international bodies, and since in recent years, such threats have relied on modern technology and the digital space, it is now our duty to take strict and deterring measures to counter these threats in order to protect our oblivious citizens through legislation that ensures the Egyptian state’s safety.”
The new law mandates a life sentence — 25 years — for anyone who creates or uses a website with the purpose of establishing a terrorist entity; promoting its ideology; exchanging its messages and assignments; or funding, owning, wiring and providing money, arms, ammunition or explosives to the benefit of such entities.
The law also calls for three years’ imprisonment and a fine of 2 million Egyptian pounds (about $225,000) for any service provider that fails to comply with the criminal court decision to block certain websites or links. If such a failure results in the death of a person or the destabilization of national security, the perpetrator shall be sentenced to life or death with a fine not exceeding 20 million Egyptian pounds ($2.25 million).
It calls for but does not define the safeguarding of society in the event of a violation or threat to the public order, obstruction or hindrance of the efforts of the authorities or damage to national unity and social stability.
Under the law, the armed forces, Interior Ministry and the General Intelligence Directorate shall be granted the power to suspend the services of any unregistered network user.
Shahawy’s proposition was strongly criticized by several human rights organizations, which considered the bill a new instrument by which the government is trying to crack down on dissenters expressing their views on social media outlets after these websites fueled the January 25 Revolution and facilitated its success. For instance, the Democratic Currentalliance fears that the law aims to restrict freedoms.
On May 15, law professor and head of the Cairo Center for Political and Legal Studies Ahmed Mahran told the press that the cybercrime law contains many of the same clauses found in the counterterrorism law. Such clauses will lead to further restrictions on rights and freedoms, especially the freedom of expression. “As per the new bill, users of social media could be jailed for any post the government deems dissent. As a result, any post could be considered a threat to national security,” he argued.
Gamal Eid, human rights lawyer and head of the Arabic Network for Human Rights Information, told Al-Monitor, “Five years after the January 25 Revolution, the Egyptian government has yet to learn the lesson and understand the Egyptian people’s mentality, especially the youths who feared neither imprisonment nor the oppressive regime before the great revolution that impressed the whole world. These youths tried to force the state to change its oppressive policy and implement new mechanisms that uphold democracy through the rule of law. However, the current government seems to have failed to learn the lesson and continued its crackdowns.”
“Unfortunately, the same police state is still in power. The man behind the new bill — Maj. Gen. Tamer Shahawy — has a military background and therefore cannot grasp the dialogue mentality, as he is used to issuing and executing orders. It is impossible for such a man to accept that the era of totalitarianism is over and that he can no longer silence the Egyptian people."
Eid scoffed at the clause mandating imprisonment for anyone who threatens national security through inciting violence and spreading hatred, arguing that its wording is too loose, giving the regime the power to arrest dissenters for whatever they consider national security considerations.
In Egypt, social media outlets such as Facebook and Twitter have not only served as platforms for expression, but also helped further campaigns and rallied support for urgent social causes, while local and traditional media outlets have come up short.
On May 11, public pressure over social media was able to force former Justice Minister Mahfouz Saber to resign. A Facebook campaign called for his resignation after he made a controversial statement about how the son of a garbage collector cannot become a judge, because a judge has to grow up in a respectable environment.
On May 13, parliament member Sharif Ismail dismissed Justice Minister Ahmed el-Zend against the backdrop of social media outrage following derogatory remarks about the Prophet Muhammad. Zend had said, “If the Prophet Muhammad broke the law, I would imprison him.”
In response, pro-government TV host Ahmed Moussa criticized such use of social media during his program on Sada el-Balad,


Read more: http://www.al-monitor.com/pulse/originals/2016/06/egypt-enacts-cyber-crime-law-preserve-national-security.html#ixzz4BCQkL2ZW



Monday, June 06, 2016

Is #Social #Media Worth the Investment? #LegalTech #Law

Five legal technology marketing experts explore the ways to truly make the most out of your social media strategy

Legaltech News
    | 0 Comments
Wonder if it’s worth it to invest dollars and resources in social media marketing? Here’s what five marketing experts recommend….

Sue Lyon-Boggs, content creator at Sue Boggs, Writer
If a law firm wants a decent return on the investment of its most valuable asset—non-billable time—from social media, it must dedicate resources and develop a considered marketing plan. Infrequent posts and broadcasting, and out-of-date profiles can have a negative effect on efforts to develop business. But a consistent, high-quality, personable and relatable approach to social media can grow a professional network and build a sense of community between lawyers and their clients.
Think about your best (or ideal) clients. What are their daily challenges and concerns? Post for their benefit so they know you get them. Remember that two-way communication is the key to credibility, and those who are perceived to be beaming out messages without giving the audience a chance to interact are perceived as amateurs. These are the lawyers who quickly lose their audience. Done well, however, social media is a means for firms and lawyers to demonstrate knowledge, integrity and a grasp of how consumers of legal services now locate and choose outside counsel.

Christy Burke, president, Burke & Company
Social media offers a low-cost way to communicate with thousands of people. Unless you choose a pay-to-play option, your primary investment will be the time spent (sweat equity) and creativity involved in feeding your social networks. At the very least, your company needs a presence on LinkedIn and Twitter. Here are some easy ways you can get started with each:
LinkedIn: 1) Encourage your employees to keep their profiles updated and increase their connections, endorsements and LinkedIn Groups memberships/participation; 2) post press mentions and articles published about your company.

Twitter: 1) Tweet at least once a week, even if you’re just retweeting someone else; 2) follow those who are following you; 3) when tweeting, use proper nouns and Twitter handles when possible, use hashtags (e.g., #ediscovery) and, when attending events, use the event’s hashtag in all your tweets during the event (e.g., #ltny16). Mentioning names of people, places, companies and events will help you attract readers/followers with similar interests.

Megan Miller, senior consultant, Edge Legal Marketing
Is social media worth it? Yes! LinkedIn, Facebook and Twitter see the highest use among legal professionals, but it’s important to consider other sites as well.
Go where your community is. You don’t need a presence on every social site; rather, find the influencers and active clients in your space, and build your presence where they are active.
Keep an eye on the future. Study the social site’s current model and roadmap. Are they going in a direction that will make sense for you one or two years from now?  Many companies use Twitter to handle customer support questions. Twitter is text-oriented, and is currently considering lifting the 140-character cap on tweets, which would change the user experience significantly. On the other hand, if your style is highly visual and your audience tends toward a younger demographic, Instagram may be a better fit. 
Consider advertising. The larger sites are interested in ad revenue. However, by encouraging paid ads they tend to reduce the organic impact of free business posts.
Measure. Once per quarter, revisit your social media strategy, activity and results. You may learn facts that will help you hone your message, build your following, and increase engagement.

Ashley Lyublinsky, account executive, Plat4orm PR
Website: www.plat4orm.com
Social media may not work for every organization. Many B2B companies have had a difficult time monetizing social media, unless:
  1. They have a specific business development strategy
  2. They have a specific marketing strategy that requires a wide range of marketing channels (email, advertising, webinars, Twitter/Facebook)
  3. They are trying to be part of a larger conversation or trend
Even if you meet one or more of these criteria, keep in mind that social media activity does not necessarily generate revenue on its own. But that’s not to say it can’t be valuable. 
If social media IS one of the marketing tactics you deploy, you should remember that it is only as good as the effort that goes into it. Posting on a regular basis (once a day) and keeping your activity on all social media platforms synced are good priorities, and can help minimize time spent if you are interested in a smaller investment.
In the B2B space, LinkedIn is the most valuable social media resource out there. The key with LinkedIn is to make sure that your profile is always current, that you are connecting with the right people and that you are posting topics directly relevant to the groups that you are involved in.


Read more: http://www.legaltechnews.com/id=1202758379994/Ask-The-Marketer-Is-Social-Media-Really-Worth-the-Investment#ixzz4Ank0G5hh

Thursday, April 07, 2016

#Cybersecurity Standards Tackle #IT @Tech

Cybersecurity Standards Tackle IoT, Evolving Cyberthreats

Underwriters Laboratories launched a Cybersecurity Assurance Program aimed at providing guidance to vendors in creating safe products, and confidence in technology users.
, Legaltech News
    | 0 Comments
The digital devices, programs and processes law firms and legal departments use in their daily operations are ones upon which they have bestowed — many times passively — a level of trust and confidence. The security of a connected device, after all, is the first and sometimes only line of defense against breaches and cyberattacks anywhere in the network.
But how does one know that their technology is in fact the secure firewall it claims to be?
Seeking to allay this concern, the global safety organization Underwriters Laboratories announced its Cybersecurity Assurance Program (UL CAP), which according to a company statement, is for vendors “looking for trusted support in assessing security risks while they continue to focus on product innovation.”  
The program looks at vulnerabilities in a vendor’s software, reviews their security controls and aims to minimize exploitation, as well as identify and mitigate any known malware infiltration.
“UL worked with agencies, including IEEE, DHS, NIST and Idaho National Labs, in the development of the Cybersecurity Assurance Program. UL also incorporated industry representation in a pilot program before launch,” Anura Fernando, UL’s Primary Designated Engineer, told Legatech News.  The company “has participated in numerous major security conferences including RSA and ICS West.”
UL CAP program involves the cooperation of vendors and certifiers in examining the resilience of products and processes to modern day cyberthreats.
“The process will involve close collaboration between UL test engineers and the customers, and UL plans to exercise its usual flexibilities in performing tests both in the lab and at development or installation sites as needed,” Fernando said.
The program is based off of recent the UL 2900 cybersecurity standards for network-connectable products and systems. The standards, which the company defines as the “testable cybersecurity criteria,” were made to adapt to new technologies and security needs as the cyber landscape evolves, and accounts for interconnectedness and complexity of today’s devices.
“Having a consistent set of requirements that span across the many layers of the IoT ecosystem, provides a means by which different participants across the supply chain can coordinate their security strategies,’ Fernando said.
Asked how the standards differentiate from other similar cybersecurity benchmarks in the industry, Fernando noted, “The UL 2900 series of standards provides a set of testable requirements with established conformance criteria to establish a baseline of cybersecurity hygiene.”
By meeting the UL 2900 criteria, vendors who participate in the UL CAP program will have their system or product certified "UL 2900 compliant." But the certification can also extend to a process or design, or the development and maintenance of products or systems.
Given fast-changing cybersecurity needs, the company will also periodically update the standards. “UL’s certification lasts 12 months, and companies are urged to seek regular recertification. UL will be consistently updating and adjusting the testing requirements to incorporate the latest threats. Every two to three years, the specifications will be completely revamped,” Fernando said. 


Read more: http://www.legaltechnews.com/id=1202754277796/Cybersecurity-Standards-Tackle-IoT-Evolving-Cyberthreats#ixzz459z2pK2z