Skip to main content

Home/ Hospitality Technology/ Group items tagged law

Rss Feed Group items tagged

kbroo026

What hotels need to know about biometric privacy laws - Document - Gale OneFile: Hospit... - 0 views

  • In order to avoid liability, employers should become familiar with biometric privacy acts, consumer privacy acts and data breach notification requirements.
  • Currently, three states have enacted biometric privacy laws: Illinois, Texas and Washington.
  • Illinois Biometric Information Privacy Act.
  • ...6 more annotations...
  • BIPA restricts the ability of a privacy entity to "collect, capture, purchase, receive through trade, or otherwise obtain a person's or a customer's biometric identifier or biometric information."
  • The Illinois legislature stated that heightened protection for biometric information is justified by the fact that once this type of information has been compromised, it obviously can't be changed (without some serious cosmetic surgery, anyway).
  • Employers also need to be aware of local laws and regulations.
  • Portland
  • bans the use of facial recognition technology by private entities in places of public accommodation, which include hotels and restaurants.
  • With the patchwork of laws and enforcement procedures, the enactment of a uniform federal law would be beneficial.
  •  
    Several states have implemented some form of biometric privacy laws, with the gold standard coming from Illinois. Illinois' BIPA allows for private enforcement, stiff fines, and paying of attorney fees. BIPA prohibits collection, capture, purchasing or receiving a customer's biometric identifier/information. Safeguarding this data is perhaps more important than any other because it cannot be easily changed, if at all. Current lack of federal law and a patchwork of local regulations means that businesses and employees must be knowledgeable of rules and rights that affect them.
tredunbar

Securing the Big Game: Emerging Technologies for Event Security - Police Chief Magazine - 0 views

  • Interconnectivity
  • there is still much work to be done to ensure seamless interconnectivity, communication, and data sharing among systems and technologies
  • high-tech solutions like advanced video surveillance with video from multiple sources—venues, traffic cameras, and more—that will be fed directly into first responder vehicles and a fully integrated security operations center to provide situational awareness
  • ...20 more annotations...
  • Large security operations centers must also all be integrated and interconnected
  • Every new technology and device used to secure an event adds to the growing list of devices deployed to secure the event, which must be able to communicate with each other and with security operations centers
  • Communication
  • Both public-private partnership models can help deter crime
  • When law enforcement is able to tie systems in together and make sure officers can communicate with each other, this leads to faster response times, improved communication, and better overall safety and security
  • forging public-private technology partnerships for sharing video and other information is an excellent way to improve security for these events
  • There are a lot of different entities that must work together. As such, cost becomes a factor, as do installed legacy systems, as well as the argument that one size can’t possibly fit all
  • Mobile technology has in many ways alleviated some of these concerns
  • Video Surveillance
  • A primary technology that is used to deliver security for high-profile events is video surveillance
  • Despite the possible deterrence factor, the main goal of video systems is to provide situational awareness
  • A smart camera or sensor deployed in a particular location can provide early warning that something may be about to happen in that area
  • Identifying and Securing the Perimeter
  • Smart traffic technology with capabilities such as incident detection could alert law enforcement to further investigate a particular area of interest or to work with transportation teams to more quickly respond and clear the way faster to avoid increasing congestion and related incidents
  • Surveillance cameras are now equipped with technologies that allow them to be those eyes and ears for law enforcement
  • When it comes to actually planning out and selecting the technologies to be deployed, another positive trend is more cooperation because city-wide systems are coming into play
  • Having the technology for law enforcement to support big public venue events is challenging, but, in many ways, public and private entities are now working collectively to get the most out of the resources they each have available
  • Computer analytics solutions have evolved to a point where these technologies are readily available and relatively easy to deploy
  • The day is coming when smart city technology will be more reality than concept
  • deploying the right mix of advanced technology and best practices for cooperation and public-private partnerships between various stakeholders, law enforcement can help ensure that the trend of safety and security at high-profile sporting events
  •  
    This article focus on using smart city technology to assist law enforcement with securing big city sporting events. The article highlights the need for seamless interconnectivity with local law enforcement technologies in order to streamline response time. Communication and video surveillance are all enhanced by the use of emergent security technology that allows for officers to work with other agencies and the community to keep large events safe.
anonymous

Americans not ready for Canada's anti-spam law: report | Canadian Lawyer Legal Feeds - 0 views

  • CASL
  • will contain some of the toughest anti-spam provisions in the world, banning senders from delivering unsolicited commercial electronic messages without receiving express or implied consent from the recipient.
  • It applies to all messages sent from, or received in, Canada, which means American firms marketing in Canada fall under its jurisdiction.
  • ...3 more annotations...
  • 60 per cent of American marketing executives were completely unaware of the new law.
  • Individuals who breach the law can face penalties of up to $1 million, while corporations are liable for as much as $10 million.
  • “They’re saying, ‘never mind, we’ll stick to sending post cards in the mail, and do telemarketing instead
  •  
    This article is about the new new anti-spam laws that will be enforced in 2013 by the Canadian government. What was pretty interesting was the fact that 60 percent of American marketing companies were unaware of the new law. Funny thing is that most of those who were aware decided that they would simply resort to other forms of spam like telemarketing and postal mail.
frank rodriguez

A Green Way to Dump Low-Tech Electronics - NYTimes.com - 0 views

  • “It’s pretty well known that if it gets into the landfill, it gets into the groundwater,” he said. “Its chemicals pollute.”
  • Mr. Reilly decided to take advantage of a new wave of laws in Maine and elsewhere that require television and computer manufacturers to recycle their products free of charge
  • Since 2004, 18 states and New York City have approved laws that make manufacturers responsible for recycling electronics, and similar statutes were introduced in 13 other states this year
  • ...1 more annotation...
  • The Environmental Protection Agency estimates 99.1 million televisions sit unused in closets and basements across the country
  •  
    Hey all, here is something interesting I found. It is an article that talks about E-waste and how it is being dealt with in the United States. Over the course of the last decade, many people have come to the realization that electronics, such as televisions and computers could be potentially harmful if not disposed of in the right way. States like Maine have implemented laws, where it is mandatory for people to recycle their products. The laws are intended to prevent a torrent of toxic waste and outdated electronic equipment. The article states, throughout the entire nation an average of 99.1 million televisions sit in people's closets and are unused. Places like Washington State have responded well to the problem. Over the course of a few years, Washington has dumped almost 15 million pounds of E-Waste. Other States Like New York and New Jersey, have banned throwing televisions in regular trash. It is mandatory to take them to a recycling station.
  •  
    It's time to be green! LET'S RECYCLE!
  •  
    Frank, I completely agree with your stance on recycling. It really is time for people to take responsibility and care about our planet. With the rapid rate at which technology is being updated, electronic waste will just continue to grow. I am glad that laws are being formed to cope with this tremendous issue. I agree with this statement from the article: '"We think it is unreasonable that an individual industry be designated as trash collector," Mr. Fannon said.' I agree with Fannon's view that local governments should help with recycling electronic waste. I agree because something definitely needs to be done, but the responsibility should not be placed on one group.
Minghui Zheng

Advantages & Disadvantages of Human Resource Information System | Chron.com - 1 views

  • When the decision to build a human resources information systems department is made, examine the options carefully and be aware of technology and human resources trends for a small business. Small businesses have unique needs based on company goals for growth, or a plan to remain small with access to technology without the hefty costs. The term "human resources information systems" (HRIS) often is used interchangeably with human resources management system (HRMS) and human resources information technology (HRIT). Any of these terms is used to describe the computer and information technology a company utilizes to automate human resources functions and employment actions.
  • A very popular use of HRIS is employee self-service. Many employers are utilizing their HRIS to supplement the human resources department staff by enabling employees for find answers to common questions they would have asked a human resources representative.
  •  
    This article summarized the advantages and disadvantages of using human resource information system. An HRIS is used for employment actions such as applicant tracking, performance management, attendance, compensation and benefits management, work force analyses, and scheduling. A very popular use of HRIS is employee self-service. There are a lot of advantages of HRIS, such as it is monitored by qualified specialists who know technology and HR functional and tactical processes can manage compliance with federal and state laws, streamline processes for recruitment and selection, and produce analyses, data and reports for internal and external use. What's more, it is easy to use for qualification computer technology specialists, accuracy of information and the ability to perform HR audits using any combination of parameters. It saves a lot of time. The disadvantages included that HRIS may involve human error during information input, costly technology to update the system and malfunctions or insufficient applications to support the human resources needs. There should be a qualified specialist with human resources functional area knowledge to manage this system. The cost to hire an HRIS specialist may be far above the average salary for a computer technology specialist.
  • ...3 more comments...
  •  
    The article highlighted describes some advantages and disadvantages of a Human Reources Information System for small business, that would include restaurants. The decision maker would have to take in consideration what type of information the system will need to handle in order to select the system to be used. This systems can do applicant tracking, perfomance management, attendance, compensatio, benefitios, paid time off and etc. A type of disadvantage for small businesses would be to be able to get support from somebody to manage the system. This could have high costs involved.
  •  
    This article discusses Human Resource Information Systems and the benefits and disadvantages to investing in such a program. Some of the advantages that the article addresses are: "manage compliance with federal and state laws, streamline processes for recruitment and selection, and produce analyses, data and reports for internal and external use." The technology allows employees and managers to "locate answers and information quickly without the need to consult an HR representative every time." I feel that this advantage outweighs any of the disadvantages that there may be. The benefits of a business/hotel running more smoothly are infinitely rewarding to profits and many other aspects of convenience. Some of the disadvantages that the article addresses are insufficient applications to support the human resource department, as well as it being costly.
  •  
    This article describes Human Resource Information systems and the benefits and disadvantages to investing in this type of technology. The article states that the advantages to investing are: "being able to manage compliance with federal and state laws, streamline processes for recruitment and selection, and produce analyses, data and reports for internal and external use." Most importantly though, the article states, "The employee and manager self-service features are excellent ways to free up the time of your human resources staff members for project work and other duties. Employees and managers can locate answers and information quickly without the need to consult an HR representative every time." This, to me, outweighs any disadvantage that may come from investing in HRIS technology because the convenience that this technology provides could really benefit profits for a business. HRIS is about coordinating communication among different departments. Businesses should really invest in this technology, even though it is costly, because ultimately it will increase profits by getting things done faster and more efficiently, as well as preventing problems from happening before they happen.
  •  
    With the development of high-tech management system, HRIS is no long strange for us. The HRIS is a software or online solution to data tracking, data management, or all of the data needs of the company within the human resources department. The reason why HRIS is becoming  more popular is that it has some useful functions such as the employee self-service through which employees can find answers to common questions by themselves while not ask a human resources representative. This system can help to save time and money for the company in certain aspects. But in this article, the author compares the advantages and disadvantages that HRIS brings to the company.The disadvantages can be that it may involve human errors during information input, costly technology update and so on. So if a company wants to apply this system, it should also look at these disadvantages, compare them with the advantages and then make a final decision in order to avoid suffering from the bad sides of the system. 
  •  
    The HRIS is used for applicant tracking, performance management, attendance, compensation and benefits management, work force analyses, and scheduling. HRIS can be also used for employee self-service. The human resources department staff can find answers to common questions they would have asked a human resources representative from the HRIS. HRIS has many advantages. It can help organization manage compliance with laws, streamline processes for recruitment and selection, and produce analyses, data and reports. The ease of use for qualified specialists, accuracy of information and the ability to perform HR audits using any combination of parameters. However, there are still some disadvantages, such as human error during information input, costly technology to update your system and malfunctions or insufficient applications to support human resources needs. In addition, the cost of hiring an HRIS specialist is also a problem for the small business.
bhern082

4 Ways You Can Keep Your Business and Guests Safe from Data Breaches | Hospitality Tech... - 0 views

  • external data breaches constitute 96 per cent of all breaches in the hospitality industry.
  • Many guests are increasingly choosing to stay at hotels that prioritize information security since many employees are working remotely or must take work away with them on vacation.
  • : Verify that the hotel’s privacy policy complies with federal and provincial laws that apply.  Ensure that your staff remains compliant of these laws by making them a mandatory part of staff training to avoid breaches and fines. 
  • ...4 more annotations...
  • Documents such as copies of travel information, passport and identity documents, licenses, customer lists, etc. should be shredded daily.
  • Invest in cyber-security tools such as firewalls and tokenization and encryption to avoid online breaches through the business’ website or third-party sites.
  • Regularly update equipment and software with monitoring systems that can detect breaches at numerous terminals to avoid PoS breaches.
  • Ongoing training helps ensure employees understand and follow policies and best practices. They should also be trained on how to recognize potential risks such as phishing.
  •  
    This article review four ways in which the hospitality industry can keep their guests safe. The first way is to have a company "shred list" so that the guests physical information is being shredded upon he completion of their stay. The second way is to remain compliant with federal laws when it comes to their privacy policy. The third way is to have IT safeguards like regularly updated equipment and have cyber security firewalls in place. ?The last way is to have constant employee training to keep the employees up to date on the best practices.
apate114

5 Ways Technology is Transforming Accounting - 1 views

  •  
    Although this article is not specific to the hospitality industry it discusses how new technology has changed accounting and how the role of an accountant has evolved. The author mentions five ways that technology is transforming accounting. I found the following very interesting and believe they relate to the hospitality industry. These include: cloud computing, innovations in tax software, mobile accounting, and OCR technology. We have already covered cloud computing and its benefits in previous modules. Cloud computing allows accounting professionals to perform tasks remotely by accessing the cloud. Advancements in technology has allowed tax software to be much more powerful and useful to accounting. In the past when tax laws would change accountants would spend months learning the new laws. It is now much easier with modern technology and software. OCR technology in my opinion helps all industries that require any soft of bookkeeping/ file keeping. With OCR technology you can convert scanned docs, PDF files, and even images into editable data. The best benefit of this technology is that it allows you to organize all data and make it searchable.
jiayi017

Stopping Data Breaches in Hospitality | Impact Networking - 0 views

  • Nearly half of all cyberattacks target SMBs, a number which is expected to increase.
  • Human error is the number one cause of data breaches from cyberattacks, with 52% of incidents directly attributable to them.
  • The majority of attacks that occur within businesses happen because somewhere along the line, someone made a mistake. Perhaps they opened an attachment they shouldn’t have or visited a risky website.
  • ...7 more annotations...
  • 93% of companies without a disaster recovery plan who suffer a major data disaster are out of business within one year.
  • SMBs simply don’t have the resources to survive breaches and are risking their entire business by not fully preparing against attacks.
  • Research suggests that 70% of consumers would stop doing business with a company if it experienced a data breach.
  • even for businesses who can survive a breach and save their data, long-term consequences can be dire.
  • Consider a true next-gen antivirus for everyone under your network to minimize the potential for attack.
  • By keeping all your data periodically backed up in secure data centers, you can rest a lot more easily knowing that should the worst happen, you can respond quickly and effectively.
  • One of the most effective ways of counteracting the dangers of cyberthreats is by training employees and establishing policies around a security strategy.
  •  
    This article describes the destructive effects of cyber attacks on enterprises, especially small and medium-sized enterprises. Because it does not have sufficient prevention and sufficient resources for disaster recovery. The most direct cause of current cyber attacks is that people open some risky websites or emails in the wrong place. For the hospitality industry, there is a large amount of customer privacy and sensitive information. Once attacked, its destructiveness is unimaginable. And to protect consumer data, most service industries just comply with local state laws, but most state laws have not made greater progress in information protection. Therefore, enterprises should protect themselves and their customers from cyber threats from the three aspects of their own network endpoints, disaster recovery and education.
mmilian

What Have Hotels Done on Cybersecurity Since the Marriott Hack? - Skift - 0 views

  • Faced with the possibility of such intrusions, hotels are now turning to outside companies to protect their customers’ data
  • Hilton in 2017 had to pay $700,000 to New York and Vermont to resolve two data breaches that resulted in more than 363,000 credit card numbers being compromised.
  • California law that is intended to protect consumers from having their data sold without their consent or knowledge. The law was passed in 2018 after Cambridge Analytica got access to private information from Facebook. The California Consumer Privacy Act goes into effect Jan. 1.
  • ...3 more annotations...
  • “Companies are still struggling somewhat in finding a budget for this effort,” she said. “It’s not something that many businesses want to spend money on. Compliance is pretty thankless.”
  • Hyatt Hotels earlier this year launched a “public bug bounty” program with cybersecurity company HackerOne that allows ethical hackers to test its websites and mobile apps for vulnerabilities.
  • Joe Saracino, CEO of Cino, said that the hotel industry is starting to be more proactive to prevent more breaches.
  •  
    This article talks about Marriott's data breach. It talks about what other companies that have also been affected are doing. California has passed an act that protects guest information. The new law is a bit challenging for smaller businesses that dont typically have any IT onsite.
alo328

Electronic Waste Is Becoming a Global Environmental Problem | Time - 1 views

  • s a tech-hungry nation flush with cash gets ready to upgrade to the next generation of lightning-fast 5G devices, there is a surprising environmental cost to be reckoned with: a fresh mountain of obsolete gadgets. About 6 million lb
  • Workers with hammers hack at the bulkiest devices, while others remove dangerous components like lithium-ion batteries
  • That cycle of consumption has made electronics waste the world’s fastest-growing s
  • ...17 more annotations...
  • “In our society, we always have to have the new, best product,” said Aaron Blum, the co-founder and chief operating officer of ERI, on a tour of the facility
  • Even when e-waste rules exist, it’s left up to consumers to handle their old devices prop
  • But less than a quarter of all U.S. electronic waste is recycled, according to a United Nations estimate. The rest is incinerated or ends up in landfills
  • Environmental concerns aside, compacting flammable lithium-ion batteries with paper recycling can be dangerous; recycling centers have reported an uptick in fires
  • 5G promises faster speeds and other benefits. But experts say it will also result in a dramatic increase in e-waste, as millions of smartphones, modems and other gadgets incompatible with 5G networks are made obsolete
  • ly. But recycling them can be a
  • We don’t necessarily have the measures to make sure people aren’t throwing it away,” Walters said.
  • Even so, some companies are increasing their recycling efforts on their own, whether for the economic benefit or the public relations boost (mining fresh materials has financial, environmental and human costs of its own). For instance, Apple in 2018 introduced Daisy, a smartphone-recycling robot that can take apart 200 iPhones every hour, and says it diverted 48,000 metric tons of electronic waste from landfills that year
  • Our products today don’t last as long as they used to, and it’s a strategy by manufacturers to force us in
  • o shorter and shorter upgrade cycles,” said Kyle Wiens, the founder of iFixit
  • Some environmental groups say multibillion-dollar companies like Apple and Samsung should pick up the cost of recycling the devices they sell. Lawmakers in parts of Europe and Canada and in some U.S. states have passed so-called Extended Producer Responsibility (EPR) laws, which require manufacturers to establish and fund systems to recycle or collect obsolete products
  • One solution is to make electronics last as long as they once did. At ERI’s facility, Shegerian showed TIME dozens of televisions from the 1970s and 1980s that stopped working only recently
  • About 6 million lb. of discarded electronics are already processed monthly at recycling giant ERI’s Fresno plant.
  • Americans spent $71 billion on telephone and communication equipment in 2017, nearly five times what they spent in 2010 even when adjusted for inflation, according to the Bureau of Economic Analysis. (Apple alone sold 60 million iPhones domestically last year, according to Counterpoint Research.)
  • That stream is expected to turn into a torrent as the world upgrades to 5G, the next big step in wireless technology.
  • Part of the problem is regulatory. Only 19 states have laws banning electronics from the regular trash. In states without such rules, like Nevada, electronics often end up in garbage and recycling bins, said Jeremy Walters, a community-relations manager for waste collector Republic Services
  • Our products today don’t last as long as they used to, and it’s a strategy by manufacturers to force us into shorter and shorter upgrade cycles,”
  •  
    Advancement in technology every day has led to the dumping of electronic gadgets no longer wanted to the environment. Heaps of unwanted electronic waste, hazardous containing substances like lithium-ion batteries, are dumped into the ground with all their toxicology. As the world upgrades to 5G, it will end in a rapid surge in e-waste. According to John Shegerian thinks people are yet to see the magnitude of the transition to 5G, it is tremendous than changing from analog to digital (Samuels & Calif, 2019). However, it comes with many advantages; its outcome is a drastic rise in electronic waste. The ERI recycles less than a quarter of the United States' e-waste according to the estimate made by the United Nations, and the other dumped in landfills. This waste contains harmful metals such as beryllium and mercury, that have adverse environmental dangers. Among the 50 states in the United States, only 19 States have imposed a law to bun electronics from regular trash (Samuels & Calif, 2019); the rest of the states, like Nevada they are incorporated in recycling and trash bins, according to Jeremy Walters's manager for waste collection. The consumers are left to handle their e-waste even though there are e-waste rules. Multibillion companies should the responsibility and cater for the cost of recycling for the products they are manufacturing. Companies like Apple and Samsung, nonetheless the United States is repelling modifications to the prevailing laws, according to Scott Cassel Product Stewardship Institute found. However, some companies are improving through increasing their recycling efforts. For instance, Daisy, a recycling robot introduced by Apple, can collect more than 200 iPhones for recycling every hour. But this is not enough since e-waste generated annually globally is more than we can imagine, which almost 50 tons (Samuels & Calif, 2019). In a nutshell, technology can bring many benefits to society. Still, it can also harm both the environment and the p
  •  
    the article explores the dangers of elctronic waste and give suggestions on how to better monitor this issue and resolve.
  •  
    This article explains how the rapid advancement of technology has impulsed an increase in the use of technology, however has resulted in a rise in ewaste percentage. This happens because companies have opted for creating products that do not last for long periods of time, since they want to sell future products.
Laura Alonso

Biometrics | Homeland Security News Wire - 0 views

  • In a study which evaluated some of the latest in automatic facial recognition technology, researchers at Michigan State University were able quickly to identify one of the Boston Marathon bombing suspects from law enforcement video, an experiment that demonstrated the value of such technology.
  • Under controlled conditions, when the face is angled toward the camera and if the lighting is good, this technology can be up to 99 percent accurate.
  • While the technology has made great strides in recent years, it does not mean that improvements are not needed. Also, more police agencies have to put the technology to use.
  •  
    This article talks about how with the help of Biometrics technology, one of the Boston Marathon bombers were identified. This is a great example as to why biometrics technology is crucial in today's society. It has helped law enforcement and government agencies track down and arrest criminals. 
apembert1920

California's Green Chemistry Initiative: "Work Plan" basics and the 7 product categorie... - 0 views

  • Under the Green Chemistry Initiative, manufacturers of “Priority Products” – product/chemical combinations targeted by the DTSC – must conduct an Alternatives Analysis, evaluating the use of substitute chemicals with lesser environmental harm and reporting results to regulators.
  •  
    This article is about California's newly implemented law called the Green Chemistry Initiative to "increase the regulation and oversight of consumer product chemical exposure". They are the first state to legally force companies to actually be aware of not only what their products are made of but also how it can be hurt the consumer once disposed. The best part is that they force the companies to provide a list of alternatives that will also be reviewed before a decision is made by the Dept of Toxic Control. at the moment there is a short list of products but California would like to expand this initiative. With expansion, my concern would be how many products actually being regulated and would there be enough funding and manpower to conclude these in-depth reviews for them to be accurate?
avila031

HNN - How to prevent, handle employee theft - 0 views

  • No employer hires an employee thinking he or she is someday going to steal. Hoteliers need to take steps to prevent theft and be cautious in taking action against an employee after a suspected theft. Both have practical and legal implications.  
  • The first step is prevention.
  • Maintain a well-publicized policy covering searches of employees’ lockers or personal belongings. Conduct searches in a manner that minimizes confrontation, is minimally invasive and conducted with the dignity of the employee in mind.    
  • ...2 more annotations...
  • Consult with trusted labor and employment law counsel in your particular state before making this decision.
  • While hoteliers can take steps to reduce employee theft, eliminating it entirely is likely an impossibility.
  •  
    This article relates back to our discussion post for the week; employee theft and fraud. It explains how hotels create quite the opportunity for employees to steal and however you try to filter potential employees you never hire someone expecting they will do such a thing to your business. Because you can not be 100% sure your employee is a trustworthy person who would never steal you have to set the proper rules and precautions. Prevention is the first and likely most important step in keeping your company safe from internal theft because once it has already happened there are several contingencies. The article explains the many laws and crimes that an be committed when accusing an employee of theft and from terminating them because of it.
anonymous

POS System in Cannabis Industry Leaks 85,000 Files | 2020-01-22 | Security Magazine - 0 views

  • Led by internet privacy researchers Noam Rotem and Ran Locar, vpnMentor’s research team discovered a data breach in THSuite, a point-of-sale system in the cannabis industry. 
  • an unsecured Amazon S3 bucket owned by THSuite that exposed 85,000 files of sensitive data from multiple marijuana dispensaries around the U.S. and their customers.
  • leaked data included scanned government and employee IDs, exposing personally identifiable information (PII) for over 30,000 individuals.
  • ...7 more annotations...
  • US. Cannabis dispensaries have to collect large quantities of sensitive information in order to comply with state laws,
  • the THSuite platform is designed to simplify this process for dispensary operators by automatically integrating with each state’s API traceability system.
  • The vpnMentor team says that the breach affected many more dispensaries, and that it’s possible that all THSuite clients and their customers were involved.
  • The researchers also found photographs of government-issued photo IDs and corresponding signatures of dispensary visitors and patients alike.
  • Under HIPAA regulations, it’s a federal crime in the U.S. for any health services provider to expose protected health information (PHI) that could be used to identify an individual.
  • the researchers say that THSuite could be subject to HIPAA violations, which can result in fines of up to $50,000 for every exposed record, or even in jail time.
  • hackers and scammers can take advantage of personal details exposed in the data breach about dispensary customers and employees to create highly effective personalized phishing attacks.
  •  
    There was a huge data breach at THSuite which exposed 85,000 files, some of those files being personal identification information. Dispensaries usually collect a lot of information to comply with U.S State laws. The files that were retrieved by the hackers means they can take advantage of those profiles. THSuite is looking at fines of up to $50,000 PER record or jail time.
anonymous

COVID-19 & Employment: State & Local Laws - 0 views

  • Although it is not possible to discuss all related state and local developments that have occurred, this update provides a brief overview of some of these developments to help you maintain compliance for your organization.
  • Over half of all states have issued this type of order. In addition, over 80 counties and more than 10 cities have issued their own orders, typically in the absence of a state order
  • Several of the orders also require that non-essential businesses cease operations at their physical locations, but do allow for minimum basic operations to continue such as the minimum necessary activities to
  • ...2 more annotations...
  • Maintain the value of the business’s inventory, preserve the condition of the business’s physical plant and equipment, ensure security, process payroll and employee benefits, or for related functions.
  • Facilitate employees of the business being able to continue to work remotely from their residences.
  •  
    With COVID-19 shutting down businesses across the world or at least taking their work remotely, businesses have left their equipment behind. However, under these restrictions, businesses are still allowed to maintain the condition of their physical plants and equipment.
rderonville

Jury sides with US Airways against Sabre in GDS antitrust trial of the century - Tnooz - 0 views

  • The jury has returned its verdict in US Airways’s $134 million antitrust lawsuit against travel technology giant Sabre.
  • The airline’s lawyers successfully argued that Sabre had threatened it, saying that it had to accept a contract on Sabre’s terms or else be cut off from a network of thousands of travel agents worldwide who depend on the inventory that the tech giant provides via desktop software.
  • During contract negotiations, Sabre never offered a deal for less than full-content, the airline said. Full-content contracts typically require an airline to provide the same fares it offers via any other channel, such as its own website, to Sabre, too.
  • ...2 more annotations...
  • full-content contracts are widespread between major airlines and the three major global distribution systems (Sabre, Amadeus, and Travelport), who act as middlemen for plane ticket sales worldwide.
  • Sabre argued that its fees are justified relative to the cost an airline would incur to distribute its fares comparably by other methods. It said consumers benefited by agents having a full array of options for price comparison.
  •  
    The role of GDSs in the travel industry has a major impact on revenue, competition, and reservations. In this article, Sabre, one of the largest known GDSs was sued by US Airways for failing to provide a fair contract to the airline. The lawyers from US Airways claimed that Sabre threatened to "cut off the airlines from a network of thousands of travel agents worldwide who depend on inventory that the tech giant provides via desktop software". The jury concluded that Sabre indeed violated antitrust law. Sabre, apparently, charged US Airways increased fees though their cost per transaction decreased because of the advances in technology. According to the article, Sabre argued that the fees were justified relative to the cost that an airline would incur to distribute its fares by other methods. This helped the agents have access to a plethora of information regarding price comparison. In my opinion, this is just a messy situation. However, it goes to show how important and how much of an impact that GDSs have on airline companies. They determine what consumers or agents readily see on the site. They determine how much of a presence a company has. The GDSs provide company information to a worldwide network that markets to consumers. Having a GDS system hold back or increase fees has proved to be detrimental. Ethical issues have come into play. The fact cannot be ignored that the technology being used by Sabre is helping lower cost for transactions. This decrease in cost should have resulted in a decrease in fees for the airlines. Nevertheless, the key to this article is that GDSs have the power (though Sabre did illegally) to determine which avenue a company goes through in regards to apparent competition and markets. The advancement of GDSs is resulting in lower cost transactions and giving agents and consumers "more bang for their buck". So it is important that the relationship between GDSs and airline companies remain ethical in all ways, especially dealing with
shanegmark

The Right to Privacy in Tourism | Tourism Watch - Information Service Tourism and Devel... - 0 views

  • We have a right to be left alone. The state must not know everything about us. It must not penetrate our private affairs. The right to privacy is a human right. It can be interpreted differently in different countries.
  • no-fly-registers of people who are denied to board an aircraft. The data of air passengers are accumulated and retained, including even their food preferences. When entering a country, fingerprints may be taken or the iris may be scanned. There are data bases for visa information. We have security cameras at airports, railway stations and public places.
  • We are talking about the effects of globalisation here. Travelling has become very cheap. This has changed tourism, and it has changed the situation of the locals. The global village has become a reality not only online, but also offline. Surely this affects the right to privacy. Let’s keep talking about the Berlin staircase: Some tourist might find it so attractive that he takes a video of it, maybe even capturing someone who actually lives in the house and does not like to see strangers there. Afterwards the video goes viral. Offline becomes online. And the side effect: The video might have contributed to data profiles that make it easy to draw conclusions about the people concerned.
  • ...1 more annotation...
  • First of all, each one of us has to respect the laws of the country where we stay. This includes the laws concerning privacy. In Germany, for example, there is the right to control what happens to your image as an aspect of criminal law.
  •  
    This is an interesting article that is written by a Data Privacy Lawyer. He outlines the complexity of data privacy in travel given that there are so many different interpretations of what it means in different countries. He also highlights that when privacy might be violated by another individual, there is almost no recourse.
kmill139

Why the U.S. is Terrible at Recycling Electronics | Digital Trends - 0 views

  • E-waste in the United States is out of control.
  • You may assume America has to at least be on par with the rest of the first world when finding a forever home for computers, phones, and printers, but you’d be wrong.
  • Those millions of old motherboards and TVs consoles rotting in landfills and warehouses aren’t just eyesores. They amount to a massive health hazard. While electronics waste comprises only 2-3 percent of America’s solid waste stream, the lead, cadmium, chromium, and other materials in aging circuitry account for 70 percent of the hazardous material in landfills, according to an EPA report.
  • ...31 more annotations...
  • Others go belly up, leaving behind millions of pounds of old gadgets piled in mountainous heaps atop land which has lead levels many times normal.
  • You’re probably not screaming into a paper bag about the $20 billion or so of gold that’s trashed in electronics every year worldwide. Precious metals come and go. But if you care about the soil that comprises the land of the brave, you should start thinking about what happened to last year’s smartphone (even if it’s just sitting in the garage).
  • This list of reasons isn’t exhaustive, but serves as a solid starting point for understanding the United States’ e-waste dilemma and what can be done.
  • U.S. e-waste recycling laws are often outdated or nonexistent
  • Only 25 states (plus Washington, D.C.) have legislation that addresses e-waste recycling. The other 25 don’t have comprehensive programs, and don’t report what happens to the electronics beyond occasional voluntary numbers, says Jason Linnell, head of the National Center for Electronics Recycling (NCER). Federal laws don’t explicitly address e-waste recycling.
  • The U.S. isn’t good at recycling
  • The current level and effectiveness of e-waste recycling depends on which state you live in and whether or not you trust locals to “do the right thing.” The hope for improvement sits with congressional reps, state lawmakers, manufacturers, and gadget freaks (yes, you).
  • Single-stream recycling hasn’t helped
  • Between 2005 and 2014, single stream recycling programs increased from 29 to 80 percent in American towns and cities. During that same time period, material contamination rates increased from 7 to 25 percent.
  • E-waste legislation regularly disappears in Congress
  • This is not the first Congressional session in which similar bills have been introduced and allowed to die like a first grade classroom goldfish on summer break. SEERA currently sits with the house’s Foreign Affairs Committee. Why is it so tough to pass e-waste legislation?
  • The U.S. is an environmental rogue
  • As of late 2018, 186 states and the European Union have ratified it and follow its legal framework. The United States has signed the Basel Convention, indicating an intent to ratify, but is the only developed nation that hasn’t actually done so, which
  • After the initial Basel Convention was adopted in 1989, many organizations said the treaty didn’t do enough to address the disposal of waste from first world countries into the developing world, and pressed for an update, which eventually became 1995’s Basel Ban Amendment. The tweak — which was attacked by many industrial powers, including the U.S., Canada, and Japan — needed three decades before it was accepted by enough countries to go into effect. In August 2019, Croatia became the 97th country to ratify it, which transformed the updated stipulations into international law in December 2019.
  • EPA regulations are incomplete
  • Federal attempts at regulation have stalled, been killed
  • U.S. pushes back against international efforts
  • As a part of the 2003 Waste Electrical and Electronic Equipment Directive (WEEE Directive), the public was guaranteed free recycling services, and conveniently located collection centers. Around the same time, the EU also passed the Restriction of Hazardous Substances Directive (RoHS), aka the “lead-free directive,” which restricts the use of several toxic materials in the manufacture of circuitry and electronic products.
  • In Japan, the Association for Electric Home Appliances requires consumers to help pay for the processing of their goods and manufacturers to set up recycling programs. Electronics recycling has been promoted as such a point of national pride — because Japan is both a huge consumer of gadgets and the country has few indigenous precious metals — that there’s serious talk of making the 2020 Tokyo Olympic metals out of recycled materials. An estimated 80,000 cell phones need to be pulled apart and picked over to complete the plan.
  • State-level e-cycling programs are uneven
  • Certified e-cycling programs are important, but also confusing
  • If you’re the compliance officer who has to make sure the company’s used servers don’t wind up getting tossed in an Indonesian landfill, and you won’t have to nervously answer questions in a “60 Minutes” exposé, you probably want to get that e-waste removed by a disposal team with one of these
  • That all sounds great until you listen to Puckett, who helped create the e-Stewards protocols. He’s one of several people who took part in the development of R2 for over two years and then refused to continue when the proposed guidelines seemed to be too tainted by lobbyists, including ones at the Institute of Scrap Recycling (ISRI), an organization that favors a free market approach over regulation. Puckett and 13 recyclers created e-Stewards, which describes itself as the “the cleanest, most globally responsible standard for e-waste recycling.” He points out that the R2 certification still allows recyclers to export to developing countries. E-Stewards’ doesn’t. R2 recyclers can drop toxic e-waste in landfills or incinerators in the event of “circumstances beyond their
  • Scrap recycling lobby doesn’t like regulations
  • The announcer proudly explains e-cycling is a vibrant industry that adds 20.6 billion to the U.S. economy and supports 45,000 jobs domestically, “safeguarding our environment,” along the way.
  • Can anything be done? Possibly
  • Recycling isn’t the only answer for fewer landfills filled with decaying circuits. Chris Wellise, Chief Sustainability Officer for Hewlett Packard Enterprise (HPE), which installs and recovers tech, emphasizes the importance of designing products for longevity, disassembly, and reuse.
  • “On average, 85 percent of the environmental impacts can be addressed in the design phase,” estimates Wellise.
  • Similar challenges exist for smartphones. Review IFixit’s guide for repairability and you can expect the phones that are easy to disassemble are also easier to refurbish or scrap. In an unusual display of transparency, eco-minded electronics company Fairphone sells spare parts on its site and has visual cues printed on the pieces to help novices figure out where everything goes. In case you’re wondering, it’s possible to make a Fairphone work in America, but most of the company’s sales are in Europe.
  • In 2018, Apple gave birth to Daisy, a robot that can disassemble 200 of the company’s phones in an hour — 1.2 million a year. The company has an installation of the machine in Austin, Texas, and another in the Netherlands. Daisy’s supply chain of used products comes from the company’s in-store trade-in program and a partnership with Best Buy.
  • Pretty awe-inspiring, right? Keep in mind that Apple sold over 217 million phones just in 2018 and has moved 2.2 billion iPhone units since the product line launched in 2007. The two Daisy divisions aren’t even working at capacity. Apple is willing to license the robot technology so any company can use it to disassemble phones, but none have approached them yet.
  •  
    "Maybe it's easy to ignore the huge percentage of vintage gadgets that wind up torched in dicey scrap heaps in developing countries". This article was written on Feb-27-2020. The problem we saw on the old video is still very much a problem now, only bigger.
  •  
    This article was super informative in the realm of E-waste. It covered every aspect of the issue and most definitely is relevant in today's world.
isabelladlp

Confidentiality in the Hospitality Industry - 0 views

  • No specific laws govern confidentiality in the hospitality industry, but your contracts and policies should clearly dictate what degree of privacy customers can expect.
  • Hospitality businesses routinely swipe customer credit cards and may gain other sensitive financial data, such as a customer's bank account information.
  • If you inadvertently leak this data, you could be legally liable for your negligence, resulting in costly lawsuits.
  • ...18 more annotations...
  • If your connection isn't password protected, anyone can access the system.
  • And even with a password, computer-savvy network users can gain access to another user's data.
  • Hospitality workers don't have any special legal authority, so they can't physically restrain a customer. Instead, they should call the police if they suspect criminal activity.
  • Your company's confidentiality policy can educate customers about the amount of privacy they can expect.
  • If you promise a customer a specific amount of confidentiality and then break that agreement, you've broken your contract and can be sued.
  • No one can contract to engage in illegal behavior, and if someone is in immediate danger, it's your duty to take steps to protect him.
  • It also establishes guidelines for employees to follow, and a clear policy can even protect you against lawsuits.
  • The U.S. Supreme Court has established that hotel customers have a "reasonable expectation of privacy" in hotel rooms.
  • You can't enter or search a guest's room without her explicit consent, but guests are not entitled to any special privacy
  • As a business owner, you value the privacy of company secrets and procedures, which is why you expect your employees to maintain some standard of confidentiality
  • confidentiality in employment is implicit, regardless of whether employees have signed an agreement.
  • If a member of your staff violates this explicit or implicit agreement, the penalty for breach of confidentiality can be severe and long-lasting.
  • an employee who signs this type of agreement agrees that a violation of confidentiality is also a violation of the employment contract. The penalty for breach of confidentiality isn’t restricted to employees who have signed confidentiality agreements,
  • if you own a computer security company and an employee’s laptop is stolen, and that employee didn’t encrypt sensitive data on that computer per company policy, it could constitute a breach of confidentiality.
  • Healthcare privacy is essential, not only to protect a patient’s right to decide who has access to sensitive information but also to protect doctors and other healthcare professionals from malpractice claims.
  • Theft is a violation of criminal law that in some instances can be punishable by a stiff fine or imprisonment.
  • As a business owner, you would report the theft to law enforcement, and the state or federal government would charge your employee with the crime.
  • Employers will not look favorably on any prospective employees who were terminated due to a confidentiality breach, or convicted of a crime related to that type of violation.
naxiang2001

What hotels need to know about biometric privacy laws | Hotel Management - 0 views

  •  
    This article investigates the purpose of biometrics and how they can be put to use in the hospitality industry. Biometrics are often seen as the most secure method of identity verification, but with that comes the fact that this information is incredibly private and an very high security risk for the company holding it. It also discusses some of the challenges and difficulties companies may face in their implementation. It specifically focuses on different pieces of legislature that may limit the use of biometric data and what this means for employee and customer safety. This article concludes by acknowledging the fact that if biometrics continue to rise in technological prominence then a federal law should be put into place to designate its use.
1 - 20 of 121 Next › Last »
Showing 20 items per page