We get work®
Knowing what data your organization is collecting and from whom is critical to effectively respond to cybersecurity data breaches and prepare for future incidents. Chapters 00:00 Introduction to Data Privacy and Cybersecurity 01:54 Understanding Data Mapping 06:07 The Importance of Data Minimization 10:06 Legal Obligations and Compliance 14:02 Data Mapping Process and Best Practices
info_outlineWe get work®
Welcome to a special edition of We get work®, recorded live from Workplace Horizons 2025 in New York City, Jackson Lewis's annual Labor and Employment Law Conference. Over 500 representatives from 260 companies gathered together to share valuable insights and best practices on workplace law issues impacting their business today. Here's your personal invitation to get the insights from the conference, delivered directly to you.
info_outlineWe get work®
Welcome to a special edition of We get work®, recorded live from Workplace Horizons 2025 in New York City, Jackson Lewis's annual Labor and Employment Law Conference. Over 500 representatives from 260 companies gathered together to share valuable insights and best practices on workplace law issues impacting their business today. Here's your personal invitation to get the insights from the conference, delivered directly to you.
info_outlineWe get work®
Welcome to a special edition of We get work®, recorded live from Workplace Horizons 2025 in New York City, Jackson Lewis's annual Labor and Employment Law Conference. Over 500 representatives from 260 companies gathered together to share valuable insights and best practices on workplace law issues impacting their business today. Here's your personal invitation to get the insights from the conference, delivered directly to you.
info_outlineWe get work®
Welcome to a special edition of We get work®, recorded live from Workplace Horizons 2025 in New York City, Jackson Lewis's annual Labor and Employment Law Conference. Over 500 representatives from 260 companies gathered together to share valuable insights and best practices on workplace law issues impacting their business today. Here's your personal invitation to get the insights from the conference, delivered directly to you.
info_outlineWe get work®
Welcome to this special edition of We get work®. Over 500 representatives from 260 companies gathered together to share valuable insights and best practices on workplace law issues impacting their business today. Here's your personal invitation to get those insights delivered directly to you live from Workplace Horizons 2025 in New York City, Jackson Lewis's annual Labor and Employment Law Conference.
info_outlineWe get work®
Welcome to this special edition of We get work®. Over 500 representatives from 260 companies gathered together to share valuable insights and best practices on workplace law issues impacting their business today. Here's your personal invitation to get those insights delivered directly to you live from Workplace Horizons 2025 in New York City, Jackson Lewis's annual Labor and Employment Law Conference.
info_outlineWe get work®
Many federal and state laws require companies to have reasonable cybersecurity safeguards in the event of a data breach, but do not specify what protections are actually required. Chapters 00:00 Introduction to Cybersecurity Safeguards 02:24 Understanding Reasonable Safeguards 04:46 Conducting Data Security Risk Assessments 11:01 Navigating Legal Frameworks and Compliance 17:48 Implementing Effective Employee Training
info_outlineWe get work®
Accommodation requests are evolving, and life sciences employers are witnessing a surge in diverse and creative requests. Chapters 00:00 The Rise of Accommodation Requests in Life Sciences 05:44 Navigating the Interactive Process 12:10 Challenges in Fast-Paced Startups 16:57 Establishing Effective Accommodation Processes
info_outlineWe get work®
As states increasingly introduce legislative requirements for how companies respond to cybersecurity threats, it is more important now than ever for organizations to have a plan in place to address data breaches if and when they occur. Chapters 00:00 Introduction to We get Privacy for work 01:39 Understanding Incident Response Plans 03:05 Key Components of an Incident Response Plan 08:45 The Importance of Preparedness and Practice 12:00 Creating Usable and Effective Plans 16:11 Actionable Steps During an Incident 19:03 Reviewing and Updating the Incident Response Plan
info_outlineEmployers thought work from home would be a short term fix to a temporary challenge. As a new wave of COVID-19 cases continue to mount nationally and globally, it is time for employers to reconnect with remote employees, reengage and reset the expectations.
This episode of We get work™ discusses lessons learned from employers on best practices in managing a remote workforce to optimize productivity and foster employee engagement.