Contact Us
Categories
- FTC
- Emotional Support Animals
- Service Animals
- Employee Agreement
- Remote Work
- Federal Trade Commission
- LGBTQ
- Minors
- United States Department of Justice ("DOJ")
- Work from Home
- Arbitration
- Workplace health
- Trade Secrets
- Corporate
- Center for Disease Control
- Americans with Disabilities Act ("ADA")
- FFCRA
- Opioid Epidemic
- Occupational Safety and Health Administration (“OSHA”)
- COVID-19
- Families First Coronavirus Response Act
- H.R.6201
- Health Care Law
- IRS
- Paid Sick Leave
- Temporary Leave
- Treasury
- Coronavirus
- Worker Misclassification
- Labor Law
- Overtime
- Kentucky Unemployment Insurance Commission
- Sexual Harassment
- FMLA Retaliation
- Overtime Rule
- Employer Wellness Programs
- Genetic Information Nondiscrimination Act ("GINA")
- Kentucky minimum wage
- Minimum wage
- Employee Benefits
- Employment Discrimination Laws
- Employment Non-Discrimination Act ("ENDA")
- ERISA
- Human Resource Department
- Independent Contractors
- OSHA
- Overtime Pay
- Paid Time Off ("PTO")
- Sick Employees
- Wage and Hour
- ADA Amendments Act of 2008 (“ADAAA”)
- Adverse Employment Action
- Americans with Disabilities Act
- Civil Rights
- Compliance
- Copyright
- Department of Labor ("DOL")
- EEOC
- Employee Handbook
- Employee Misconduct
- Employment Law
- Fair Labor Standards Act (FLSA)
- Family and Medical Leave Act (“FMLA”)
- Intellectual Property
- Kentucky Civil Rights Act (“KCRA”)
- National Labor Relations Act (NLRA)
- National Labor Relations Board (NLRB)
- Pregnancy Discrimination Act
- Social Media
- Social Media Policies
- Title VII of the 1964 Civil Rights Act
- U.S. Department of Labor
- U.S. Equal Employment Opportunity Commission (“EEOC”)
- Uncategorized
- Union
- Volunteer
- Work for Hire
- Young v. UPS
- Amazon
- Bring Your Own Device
- BYOD
- Department of Health and Human Services
- Federal contractors
- Kentucky Labor Cabinet’s Occupational Safety and Health Program (KOSH)
- Portal-to-Portal Act of 1947
- Security Checks
- Security Screening
- U.S. Supreme Court
- Cloud
- Creech v. Brown
- EEOC v. Hill Country Farms
- Equal Employment Opportunity Commission v. Kaplan Higher Education Corp.
- Lane v. Franks
- Micro-unit
- Non-exempt employees
- Specialty Healthcare & Rehabilitation Center of Mobile
- "Ban-the-box"
- Bullying
- Citizens United v. Federal Election Commission
- Compensatory time off
- Conestoga Woods Specialties v. Sebelius
- Consumer Credit Protection Act (“CCPA”)
- Crystalline Silica
- Davis-Bacon and Related Acts
- Drug-Free Workplaces
- Earnings
- Illness and Injury Reports
- Job applications
- Kentucky Department of Workers’ Claims
- Kentucky Wage and Hour Act
- McNamara O’Hara Service Contract Act
- Mine Safety and Health Administration ("MSHA")
- NFL Bullying Scandal
- Northwestern
- Payroll
- Permissible Exposure Level ("PEL")
- Sebelius v. Hobby Lobby Stores
- Senate Bill 157
- Shazor v. Prof’l Transit Mgmt.
- Violence
- Wage garnishment
- Web Content Accessibility Guidelines
- Whistleblower
- WorkSmart Kentucky
- 2013)
- At-will employment
- Berrier v. Bizer
- Chapter 11 Bankruptcy
- Chenzira v. Cincinnati Children’s Hospital Medical Center
- COBRA
- Companionship services
- Defamation
- Defense of Marriage Act (“DOMA”)
- EEOC v. Fabricut
- EEOC v. The Founders Pavilion
- Ehling v. Monmouth-Ocean Hospital Service Corp.
- Employee of the Month Programs
- Endorsements
- Federal Stored Communications Act (“SCA”)
- Freedom of Speech
- Giant Food LLC
- Government employees
- Government shutdown
- Health-Contingent Wellness Programs
- HIPAA
- Home Health Care Workers
- Jury duty
- KYSHRM 2013
- Madry v. Gibraltar National Corporation
- Mandatory vaccination policies
- Maternity Leave
- Medical Exams
- Megivern v. Glacier Hills Incorporated
- Motivating Factor
- Obesity
- Online Defamation
- Participatory Wellness Programs
- Pennington v. Wagner’s Pharmacy
- Pension Plans
- Private employers
- Reference checks
- SHRM
- Small Business Administration (SBA)
- Social Media Ownership
- Supervisor
- Tangible employment actions
- Title VII retaliation cases
- Troyer v. T.John.E Productions
- Unfair Labor Practice
- United States v. Windsor
- University of Texas Southwestern Medical Center v. Nassar
- Vance v. Ball State University
- Contraceptive Mandate
- Employee Arrests
- Employee Forms
- Employee Hazards
- Employee photographs
- Employee Training
- Employer Group Health Plans
- Employer Mandate
- Employment Practices Liability Insurance
- Federal Workplace Agencies
- FICA
- Form I-9
- Gatto v. United Airlines and allied Aviation Services
- House Labor and Industry Committee
- Kentucky’s Whistleblower Act
- KRS 391.170
- Litigation
- Municipal Liability
- Online Account Protection
- Patient Protection and Affordable Care Act
- Play or Pay
- Posting Requirements
- Public Sector Liability
- Record Retention
- Religious Employer
- Right to Work Bill
- Sequester
- Severance Pay
- Supplemental Unemployment Compensation Benefits
- Tax Refund
- Telecommuting
- U.S. Citizenship and Immigration Services
- United States v. Quality Stores
- White v. Baptist Memorial Health Care Corp.
- Wilson v. City of Central City
- Crisis Management
- Federal Department of Labor
- Job Description
- Job Requirement
- Kentucky Labor Cabinet
- Labor and Pensions ("HELP")
- PhoneDog v. Kravitz
- Social Networking Online Protection Act (SNOP)
- Social Privacy Laws
- Strategic Enforcement Plan (SEP)
- Workplace Politics
- Business Insurance
- Class Action Waivers
- Communications Decency Act
- Criminal Background Checks
- Employee Contracts
- Employee Performance Reviews
- Employee Personnel Files
- Federal Arbitration Act (FAA)
- Hiring and Firing
- Hosanna-Tabor Opinion
- Informal Discussion Letter (“EEOC Letter”)
- Insurance Coverage
- Internet & Media Law
- Internet Defamation
- National Labor Relations Act
- Non-Compete Agreement
- Retaliation by Association
- Salary Threshold
- Unemployment Benefits
- Uniformed Services Employment and Reemployment Rights Act
- USERRA
- Workplace Discrimination, Harassment and Retaliation
Twitter: Little Statements with Big Consequences for Companies, cont.
Earlier this week, I gave some advice on how to protect your business’s Twitter account. The hijacking of a Twitter account can have an incredibly negative impact on your business. If you missed it, review the advice I offered in my earlier post and consider these additional steps.
Watch out for strange emails
Twitter will never ask you to provide your password via email, a direct message, or @reply. Twitter will never ask you to download something or sign-in to a non-Twitter website. So, if you get an email or message prompting you to do any of these things, don’t. If you receive a suspicious email, delete it (preferably without opening) and immediately visit https://Twitter.com to change your password. Emails like this are “phishing” for personal, online information that they can use to hack into your accounts. If the folks at Twitter believe your account has been phished or hacked, they may reset your password to prevent access. In this event, they will email you a link to where you can reset the password on your own. The password reset link is always available on the Twitter website, so you can visit it directly.
In addition to watching out for strange emails, be sure to use caution when sending your own. It is good practice to verbally communicate the log-in information with those who have user-access. If your name and password are in an email, the email may be sent to the wrong person internally or may be accessed externally via hackers.
Keep your computer up-to-date
Company browsers and operating systems should always be updated with the most current versions. All computers should have some kind of program which protects against viruses, spyware, and adware. By keeping your software in good overall health, you make the chance of a Twitter hack less likely.
Be on the lookout for two-factor authentication
There are online accounts (Facebook, for example) which require or offer users the option of two-factor authentication. With the slew of recent Twitter hackings, Twitter will no doubt soon be offering two-factor authentication to increase its security. This two-factor authentication should be used by all businesses, if not also for personal accounts. Two-factor authentication is a process in which a user is sent a randomly generated code to enter along with their user name and password when logging in. This code can be sent via text message to users’ mobile phones. Thus, even if a hijacker discovers your password, access will be denied without the random code. Think of it as another lock on your company’s social media door.
_______________
If an errant tweet does make it onto your company’s Twitter feed, swift action is necessary. You should have a social media crisis plan in place so that the problem can be handled immediately and effectively. The plan may involve steps such as changing passwords, sending an email to clients and customers explaining your account has been compromised, or tweeting out an apology to followers.
A 140-character message can do a lot of damage to your business. Take preventive steps to curb the likelihood of this happening. Just like every company should have a lock on the front door, every social media account should be bolted with security to keep out evil-doers.
Services may be performed by others.
This article does not constitute legal advice.