Contact Us
Categories
- FTC
- Emotional Support Animals
- Service Animals
- Employee Agreement
- Remote Work
- Federal Trade Commission
- LGBTQ
- Minors
- United States Department of Justice ("DOJ")
- Arbitration
- Work from Home
- Workplace health
- Intellectual Property
- Trade Secrets
- Corporate
- Center for Disease Control
- Americans with Disabilities Act ("ADA")
- FFCRA
- Opioid Epidemic
- Occupational Safety and Health Administration (“OSHA”)
- COVID-19
- Families First Coronavirus Response Act
- H.R.6201
- Health Care Law
- IRS
- Paid Sick Leave
- Temporary Leave
- Treasury
- Coronavirus
- Worker Misclassification
- Labor Law
- Overtime
- Kentucky Unemployment Insurance Commission
- Sexual Harassment
- FMLA Retaliation
- Overtime Rule
- Employer Wellness Programs
- Genetic Information Nondiscrimination Act ("GINA")
- Kentucky minimum wage
- Minimum wage
- Wage and Hour
- Employee Benefits
- Employment Discrimination Laws
- Employment Non-Discrimination Act ("ENDA")
- ERISA
- Human Resource Department
- Independent Contractors
- Kentucky Civil Rights Act (“KCRA”)
- OSHA
- Overtime Pay
- Paid Time Off ("PTO")
- Sick Employees
- ADA Amendments Act of 2008 (“ADAAA”)
- Adverse Employment Action
- Americans with Disabilities Act
- Bring Your Own Device
- BYOD
- Civil Rights
- Compliance
- Department of Labor ("DOL")
- EEOC
- Employee Handbook
- Employee Misconduct
- Employment Law
- Fair Labor Standards Act (FLSA)
- Family and Medical Leave Act (“FMLA”)
- National Labor Relations Act (NLRA)
- National Labor Relations Board (NLRB)
- Pregnancy Discrimination Act
- Social Media
- Social Media Policies
- Title VII of the 1964 Civil Rights Act
- U.S. Department of Labor
- U.S. Equal Employment Opportunity Commission (“EEOC”)
- Uncategorized
- Union
- Volunteer
- Young v. UPS
- Amazon
- Department of Health and Human Services
- Federal contractors
- Kentucky Labor Cabinet’s Occupational Safety and Health Program (KOSH)
- Micro-unit
- Portal-to-Portal Act of 1947
- Security Checks
- Security Screening
- Specialty Healthcare & Rehabilitation Center of Mobile
- U.S. Supreme Court
- Cloud
- Creech v. Brown
- EEOC v. Hill Country Farms
- Equal Employment Opportunity Commission v. Kaplan Higher Education Corp.
- Lane v. Franks
- Mine Safety and Health Administration ("MSHA")
- Non-exempt employees
- Northwestern
- Shazor v. Prof’l Transit Mgmt.
- Web Content Accessibility Guidelines
- Whistleblower
- "Ban-the-box"
- 2013)
- At-will employment
- Berrier v. Bizer
- Bullying
- Chapter 11 Bankruptcy
- Chenzira v. Cincinnati Children’s Hospital Medical Center
- Citizens United v. Federal Election Commission
- Companionship services
- Compensatory time off
- Conestoga Woods Specialties v. Sebelius
- Consumer Credit Protection Act (“CCPA”)
- Crystalline Silica
- Davis-Bacon and Related Acts
- Drug-Free Workplaces
- Earnings
- EEOC v. Fabricut
- EEOC v. The Founders Pavilion
- Ehling v. Monmouth-Ocean Hospital Service Corp.
- Federal Stored Communications Act (“SCA”)
- Giant Food LLC
- Government employees
- Government shutdown
- Home Health Care Workers
- Illness and Injury Reports
- Job applications
- Jury duty
- Kentucky Department of Workers’ Claims
- Kentucky Wage and Hour Act
- KYSHRM 2013
- Mandatory vaccination policies
- Maternity Leave
- McNamara O’Hara Service Contract Act
- Medical Exams
- NFL Bullying Scandal
- Payroll
- Permissible Exposure Level ("PEL")
- Private employers
- Sebelius v. Hobby Lobby Stores
- Senate Bill 157
- SHRM
- Small Business Administration (SBA)
- Violence
- Wage garnishment
- WorkSmart Kentucky
- COBRA
- Contraceptive Mandate
- Defamation
- Defense of Marriage Act (“DOMA”)
- Employee Forms
- Employee Hazards
- Employee of the Month Programs
- Employee photographs
- Employee Training
- Employer Group Health Plans
- Employer Mandate
- Employment Practices Liability Insurance
- Endorsements
- Federal Workplace Agencies
- FICA
- Form I-9
- Freedom of Speech
- Gatto v. United Airlines and allied Aviation Services
- Health-Contingent Wellness Programs
- HIPAA
- House Labor and Industry Committee
- KRS 391.170
- Litigation
- Madry v. Gibraltar National Corporation
- Megivern v. Glacier Hills Incorporated
- Motivating Factor
- Obesity
- Online Account Protection
- Online Defamation
- Participatory Wellness Programs
- Patient Protection and Affordable Care Act
- Pennington v. Wagner’s Pharmacy
- Pension Plans
- Play or Pay
- Record Retention
- Reference checks
- Religious Employer
- Right to Work Bill
- Sequester
- Severance Pay
- Social Media Ownership
- Supervisor
- Supplemental Unemployment Compensation Benefits
- Tangible employment actions
- Tax Refund
- Telecommuting
- Title VII retaliation cases
- Troyer v. T.John.E Productions
- U.S. Citizenship and Immigration Services
- Unfair Labor Practice
- United States v. Quality Stores
- United States v. Windsor
- University of Texas Southwestern Medical Center v. Nassar
- Vance v. Ball State University
- Crisis Management
- Employee Arrests
- Job Description
- Job Requirement
- Kentucky’s Whistleblower Act
- Labor and Pensions ("HELP")
- Municipal Liability
- PhoneDog v. Kravitz
- Posting Requirements
- Public Sector Liability
- Social Networking Online Protection Act (SNOP)
- Social Privacy Laws
- Strategic Enforcement Plan (SEP)
- White v. Baptist Memorial Health Care Corp.
- Wilson v. City of Central City
- Workplace Politics
- Class Action Waivers
- Criminal Background Checks
- Employee Performance Reviews
- Employee Personnel Files
- Federal Arbitration Act (FAA)
- Federal Department of Labor
- Hiring and Firing
- Hosanna-Tabor Opinion
- Informal Discussion Letter (“EEOC Letter”)
- Kentucky Labor Cabinet
- National Labor Relations Act
- Retaliation by Association
- Salary Threshold
- Unemployment Benefits
- Workplace Discrimination, Harassment and Retaliation
- Business Insurance
- Communications Decency Act
- Employee Contracts
- Insurance Coverage
- Internet & Media Law
- Internet Defamation
- Non-Compete Agreement
- Uniformed Services Employment and Reemployment Rights Act
- USERRA
Twitter: Little Statements with Big Consequences for Companies, cont.
Earlier this week, I gave some advice on how to protect your business’s Twitter account. The hijacking of a Twitter account can have an incredibly negative impact on your business. If you missed it, review the advice I offered in my earlier post and consider these additional steps.
Watch out for strange emails
Twitter will never ask you to provide your password via email, a direct message, or @reply. Twitter will never ask you to download something or sign-in to a non-Twitter website. So, if you get an email or message prompting you to do any of these things, don’t. If you receive a suspicious email, delete it (preferably without opening) and immediately visit https://Twitter.com to change your password. Emails like this are “phishing” for personal, online information that they can use to hack into your accounts. If the folks at Twitter believe your account has been phished or hacked, they may reset your password to prevent access. In this event, they will email you a link to where you can reset the password on your own. The password reset link is always available on the Twitter website, so you can visit it directly.
In addition to watching out for strange emails, be sure to use caution when sending your own. It is good practice to verbally communicate the log-in information with those who have user-access. If your name and password are in an email, the email may be sent to the wrong person internally or may be accessed externally via hackers.
Keep your computer up-to-date
Company browsers and operating systems should always be updated with the most current versions. All computers should have some kind of program which protects against viruses, spyware, and adware. By keeping your software in good overall health, you make the chance of a Twitter hack less likely.
Be on the lookout for two-factor authentication
There are online accounts (Facebook, for example) which require or offer users the option of two-factor authentication. With the slew of recent Twitter hackings, Twitter will no doubt soon be offering two-factor authentication to increase its security. This two-factor authentication should be used by all businesses, if not also for personal accounts. Two-factor authentication is a process in which a user is sent a randomly generated code to enter along with their user name and password when logging in. This code can be sent via text message to users’ mobile phones. Thus, even if a hijacker discovers your password, access will be denied without the random code. Think of it as another lock on your company’s social media door.
_______________
If an errant tweet does make it onto your company’s Twitter feed, swift action is necessary. You should have a social media crisis plan in place so that the problem can be handled immediately and effectively. The plan may involve steps such as changing passwords, sending an email to clients and customers explaining your account has been compromised, or tweeting out an apology to followers.
A 140-character message can do a lot of damage to your business. Take preventive steps to curb the likelihood of this happening. Just like every company should have a lock on the front door, every social media account should be bolted with security to keep out evil-doers.
Services may be performed by others.
This article does not constitute legal advice.