We get work®
Written Information Security Programs, commonly referred to as WISPs, are critical plans to have in place – not only to efficiently and effectively respond to ransomware attacks and data breaches when they occur – but to maintain compliant privacy practices for your organization. Chapters 00:00 Introduction to WISPs and Their Importance 02:41 Understanding the Components of a WISP 05:25 Administrative Safeguards in WISPs 08:01 Physical Safeguards in WISPs 10:46 Technical Safeguards in WISPs 13:53 Legal Implications of Having a WISP 16:45 The Process of Developing a WISP 19:26...
info_outlineWe get work®
To say mergers and acquisitions present significant risk is an understatement; however, additional vulnerabilities are being exposed as bad actors threaten to exploit privacy and data security leaks during the transition. Chapters 00:00 Navigating Cybersecurity Risks in Mergers and Acquisitions 02:52 Understanding Data Privacy and Security Concerns 05:37 Assessing Data Retention and Legacy Systems 08:53 Identifying Dormant Liabilities and Hidden Risks 11:40 Integrating Acquired Companies and Vendor Risks 14:40 Website Compliance and Data Privacy Practices
info_outlineWe get work®
Remote work has given employers and employees pathbreaking flexibility, but it has also raised a host of data and employee privacy concerns.
info_outlineWe get work®
Evolving technology is changing the face of workplace law at a pace previously not contemplated, including in the area of leaves and accommodation.
info_outlineWe get work®
Welcome to a special edition of We get work®, recorded live from Workplace Horizons 2025 in New York City, Jackson Lewis's annual Labor and Employment Law Conference. Over 500 representatives from 260 companies gathered together to share valuable insights and best practices on workplace law issues impacting their business today. Here's your personal invitation to get the insights from the conference, delivered directly to you.
info_outlineWe get work®
The widespread adoption of AI tools has the potential to increase efficiency in the workplace but can also create potential pitfalls if proper planning and processes are not in place. On this episode of We get Privacy for work, we discuss how leveraging the seemingly innocuous AI note taker function can present unintended consequences if unlimited access or unprofessional commentary are not kept in check.
info_outlineWe get work®
Welcome to a special edition of We get work®, recorded live from Workplace Horizons 2025 in New York City, Jackson Lewis's annual Labor and Employment Law Conference. Over 500 representatives from 260 companies gathered together to share valuable insights and best practices on workplace law issues impacting their business today. Here's your personal invitation to get the insights from the conference, delivered directly to you.
info_outlineWe get work®
Welcome to a special edition of We get work®, recorded live from Workplace Horizons 2025 in New York City, Jackson Lewis's annual Labor and Employment Law Conference. Over 500 representatives from 260 companies gathered together to share valuable insights and best practices on workplace law issues impacting their business today. Here's your personal invitation to get the insights from the conference, delivered directly to you.
info_outlineWe get work®
Welcome to a special edition of We get work®, recorded live from Workplace Horizons 2025 in New York City, Jackson Lewis's annual Labor and Employment Law Conference. Over 500 representatives from 260 companies gathered together to share valuable insights and best practices on workplace law issues impacting their business today. Here's your personal invitation to get the insights from the conference, delivered directly to you.
info_outlineWe get work®
Welcome to a special edition of We get work®, recorded live from Workplace Horizons 2025 in New York City, Jackson Lewis's annual Labor and Employment Law Conference. Over 500 representatives from 260 companies gathered together to share valuable insights and best practices on workplace law issues impacting their business today. Here's your personal invitation to get the insights from the conference, delivered directly to you.
info_outlineWritten Information Security Programs, commonly referred to as WISPs, are critical plans to have in place – not only to efficiently and effectively respond to ransomware attacks and data breaches when they occur – but to maintain compliant privacy practices for your organization.
Chapters
00:00 Introduction to WISPs and Their Importance
02:41 Understanding the Components of a WISP
05:25 Administrative Safeguards in WISPs
08:01 Physical Safeguards in WISPs
10:46 Technical Safeguards in WISPs
13:53 Legal Implications of Having a WISP
16:45 The Process of Developing a WISP
19:26 Sharing WISP Information with Employees