Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
A growing number of employees are blogging (posting comments, photographs, and even audio streams, to an online diary or journal), both at work and at home. The proliferation of workplace-related blogging has created an additional legal minefield to be navigated by the growing number of employers whose workforce has access to computers, the Internet and related electronic information. This article provides an overview of some of the more significant legal and business issues facing employers whose employees engage in workplace-related blogging, and offers recommendations for such employers to consider in an effort to minimize the potential for legal liability associated with such blogging.
Potential Problems for Employers
Employers may face a number of adverse consequences as a result of their employees' blogging. The most obvious of these problems is decreased productivity from current employees who blog on company time when they should be working. Arguably more significant, however, are the following potential problems resulting from employee blogging:
While these potential problems may not necessarily be new issues for employers to address, the nature of Internet blogs greatly exacerbates these dangers. The traditional mechanism by which employees communicated was much more proscribed – ie, around the dinner table or over the proverbial water cooler. Even an e-mail message (which may produce an analogous problem for employers) normally requires the sender to input an addressee into the message, or affirmatively strike commands such as “reply to sender,” “forward,” or “reply to all” before the electronic message is able to be viewed by a third party. In the case of blogging, however, the messages are typically available for public viewing. More-over, blogs are searchable by potential and/or current employers long after they are posted, and may be found with relative ease via readily available search engines.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?