Tips For Businesses To Improve Their Cyber Security
Cyber criminals have a large number of ways of gaining access to a company’s computer systems. What they do when they gain access to that system can also vary widely.
Posted by Charlie E. Bernier
Texas Fights Against FLSA Overtime Rule
A United States District Court Judge in Texas issued a nationwide temporary injunction against the Department of Labor’s new rule implementing a higher minimum salary for overtime exempt ... READ MORE
Posted by Daniel R. Slezak Jr.
Food Safety Rule: Compliance Concerns for Food Producers
More than a year ago now, the Food and Drug Administration released its final rule on Produce Safety (formally known as “Standards for the Growing, Harvesting, Packing and Holding of ... READ MORE
Posted by ecbmadmin
Small Motor Carriers: How to Stay Competitive in FMSA Compliance
The Food and Drug Administration’s new rule on Sanitary Transportation of Human and Animal Food starts to take effect in mere months for those carriers that do not qualify as small ... READ MORE
Posted by ecbmadmin
Ignoring Your Cybersecurity Risks Won't Make Them Go Away
Hardly a day goes by in the current news cycle without some new cyber-security story breaking. The end of 2016 included a disclosure of 500 million hacked Yahoo! email accounts, concerns ... READ MORE
Posted by ecbmadmin
Will Your Policy Cover Risks From Indemnification Clauses?
Indemnification clauses in commercial contracts can present a number of potential issues. When the parties to the contract do not properly think through or write out indemnification ... READ MORE
Posted by ecbmadmin
How OSHA's Rule Update Will REquire A Policy Manual Update
In May 2016, the Occupational Safety and Health Administration (OSHA) published a new regulation that significantly changed the reporting of workplace injuries by requiring certain ... READ MORE
Posted by ecbmadmin
Negotiate Contracts To Maximize Arbitration's Benefits
Business contracts often involve painstaking negotiations over contract clauses related to performance and price. Given the care and time spent on these major clauses, it can be relatively ... READ MORE
Posted by ecbmadmin
When The Weak Link Is People Clicking Bad Links
Lots of people these days are talking about cybersecurity. To many people, this conjures images of hackers delving deep into computer code to unearth and exploit systematic weaknesses. The ... READ MORE
Posted by ecbmadmin