Workplace Data Breach Challenges: Navigating Notification Requirements, Employee Monitoring and BYOD Programs

Structuring Policies to Prevent and Respond to Leaks of Sensitive, Regulated or Proprietary Data

Recording of a 90-minute CLE webinar with Q&A

Conducted on Wednesday, July 30, 2014

Recorded event now available

or call 1-800-926-7926
Course Materials

This CLE course will equip employment counsel with the practical techniques to confront potential liability and risks due to workplace data breaches. Hear from experienced panelists as they discuss recent notification requirements, employee monitoring challenges, and best practices for structuring policies aimed at preventing and mitigating liability.


Employment counsel must assist clients with preventing and responding to data breaches caused by or impacting employees. Data breaches can cause substantial damage to the interests of the company, employees and third parties to include penalties, fines and class action litigation.    

BYOD programs add to the complexity of data breach risks and liability. A vast majority of employees use mobile devices to access regulated data with minimal levels of security. Counsel must provide employer clients with guidance on monitoring employee activity within acceptable legal standards while protecting sensitive data.

Employers must be in compliance with the law and regulations to prevent breach of employee and customer/client data and with regulations that kick in once a breach occurs. A substantial number of states have specific notification requirements.

Listen as our distinguished panel discusses the legal requirements and best practices to control access to sensitive employee and customer/client data, effectively manage BYOD programs, and respond in the event of a breach. The panel will also review legal remedies available to an employer when an employee is the source of a breach.



  1. Control of access to employee and customer/client data
    1. Allowable employee monitoring
  2. Employer liability and risk exposures
    1. BYOD programs
    2. Breach of employee data
  3. Steps to take in avoiding and responding to a breach


The panel will review these and other key questions:

  • What policies and procedures are critical for employers to minimize the opportunities for a data breach?
  • How can employers legally monitor employees to prevent dissemination of protected and regulated data?
  • What remedies should an employer pursue against an employee suspected of breaching protected and regulated data?
  • Under what circumstances will the employer be exposed to liability for a data breach?
  • What are the legal requirements and best practices for an employer once a breach occurs?


V. John Ella
V. John Ella

Jackson Lewis

Mr. Ella practices in all aspects of employment law and advises clients in the areas of employment contracts,...  |  Read More

Kidwell, Brent
Brent E. Kidwell

Jenner & Block

Mr. Kidwell is the Firm’s Chief Knowledge Counsel. He helps clients proactively prepare for electronic discovery...  |  Read More

Lazzarotti, Joseph
Joseph J. Lazzarotti

Jackson Lewis

Mr. Lazzarotti’s practice focuses on the matrix of laws governing the privacy, security and management of data,...  |  Read More

Access Anytime, Anywhere

Strafford will process CLE credit for one person on each recording. All formats include course handouts.

To find out which recorded format will provide the best CLE option, select your state:

CLE On-Demand Audio