By Alaap Shah and Marshall Jackson
Data is going digital, devices are going mobile, and technology is revolutionizing how companies operate. It seems to be business as usual, as your hospitality company continues to collect, use and transmit large amounts of sensitive data to operate the business. You have even taken measures to help guard against the “typical” risks such as lost laptops, thumb drives and other electronic devices. However, unbeknownst to you, hackers sit in front of their computers looking for ways into your network so that they may surreptitiously peruse ...
By: Alaap Shah and Marshall Jackson
Data is going digital, devices are going mobile, and technology is revolutionizing how companies operate. It seems to be business as usual, as your hospitality company continues to collect, use and transmit large amounts of sensitive data to operate the business. You have even taken measures to help guard against the “typical” risks such as lost laptops, thumb drives and other electronic devices. However, unbeknownst to you, hackers sit in front of their computers looking for ways into your network so that they may surreptitiously peruse ...
Blog Editors
Recent Updates
- Video: “Stay or Pay” Agreements, Developing Immigration News, EEOC Power Shift - Employment Law This Week
- New York’s Trapped at Work Act, in Effect for Now, but New Bill Aims to Amend Terms and Extend Effective Date
- Video: How Jonathan Brenner Delivers Creative Legal Solutions for California Employers
- Video: FMLA and FLSA Compliance in 2026—New DOL Opinion Letters and Emerging Risks - Employment Law This Week
- Federal Shutdowns and Workplace Law: Navigating Legal Uncertainty