Contact Us
Categories
- SCOTUS
- FTC
- Emotional Support Animals
- Service Animals
- Employee Agreement
- Remote Work
- Federal Trade Commission
- LGBTQ
- Minors
- United States Department of Justice ("DOJ")
- Work from Home
- Arbitration
- Workplace health
- Intellectual Property
- Trade Secrets
- Corporate
- Center for Disease Control
- Americans with Disabilities Act ("ADA")
- FFCRA
- Opioid Epidemic
- Occupational Safety and Health Administration (“OSHA”)
- COVID-19
- Families First Coronavirus Response Act
- H.R.6201
- Health Care Law
- IRS
- Paid Sick Leave
- Temporary Leave
- Treasury
- Coronavirus
- Worker Misclassification
- Labor Law
- Overtime
- Kentucky Unemployment Insurance Commission
- Sexual Harassment
- FMLA Retaliation
- Overtime Rule
- Employer Wellness Programs
- Employment Non-Discrimination Act ("ENDA")
- Genetic Information Nondiscrimination Act ("GINA")
- Independent Contractors
- Kentucky minimum wage
- Minimum wage
- Paid Time Off ("PTO")
- Sick Employees
- Wage and Hour
- Employee Benefits
- Employee Handbook
- Employee Misconduct
- Employment Discrimination Laws
- ERISA
- Fair Labor Standards Act (FLSA)
- Human Resource Department
- Kentucky Civil Rights Act (“KCRA”)
- National Labor Relations Act (NLRA)
- National Labor Relations Board (NLRB)
- OSHA
- Overtime Pay
- Pregnancy Discrimination Act
- Social Media
- Social Media Policies
- U.S. Department of Labor
- Union
- Young v. UPS
- ADA Amendments Act of 2008 (“ADAAA”)
- Adverse Employment Action
- Amazon
- Americans with Disabilities Act
- Bring Your Own Device
- BYOD
- Civil Rights
- Compliance
- Department of Health and Human Services
- Department of Labor ("DOL")
- EEOC
- Employment Law
- Family and Medical Leave Act (“FMLA”)
- Portal-to-Portal Act of 1947
- Security Screening
- Title VII of the 1964 Civil Rights Act
- U.S. Equal Employment Opportunity Commission (“EEOC”)
- U.S. Supreme Court
- Uncategorized
- Volunteer
- Creech v. Brown
- Federal contractors
- Kentucky Labor Cabinet’s Occupational Safety and Health Program (KOSH)
- Lane v. Franks
- Micro-unit
- Security Checks
- Specialty Healthcare & Rehabilitation Center of Mobile
- "Ban-the-box"
- Citizens United v. Federal Election Commission
- Cloud
- Conestoga Woods Specialties v. Sebelius
- Crystalline Silica
- Drug-Free Workplaces
- EEOC v. Hill Country Farms
- Equal Employment Opportunity Commission v. Kaplan Higher Education Corp.
- Illness and Injury Reports
- Job applications
- Kentucky Department of Workers’ Claims
- Kentucky Wage and Hour Act
- Mine Safety and Health Administration ("MSHA")
- Non-exempt employees
- Northwestern
- Permissible Exposure Level ("PEL")
- Sebelius v. Hobby Lobby Stores
- Senate Bill 157
- Shazor v. Prof’l Transit Mgmt.
- Web Content Accessibility Guidelines
- Whistleblower
- WorkSmart Kentucky
- 2013)
- At-will employment
- Berrier v. Bizer
- Bullying
- Chapter 11 Bankruptcy
- Chenzira v. Cincinnati Children’s Hospital Medical Center
- COBRA
- Companionship services
- Compensatory time off
- Consumer Credit Protection Act (“CCPA”)
- Davis-Bacon and Related Acts
- Defamation
- Defense of Marriage Act (“DOMA”)
- Earnings
- EEOC v. Fabricut
- EEOC v. The Founders Pavilion
- Ehling v. Monmouth-Ocean Hospital Service Corp.
- Employee of the Month Programs
- Endorsements
- Federal Stored Communications Act (“SCA”)
- Freedom of Speech
- Giant Food LLC
- Government employees
- Government shutdown
- Health-Contingent Wellness Programs
- HIPAA
- Home Health Care Workers
- Jury duty
- KYSHRM 2013
- Madry v. Gibraltar National Corporation
- Mandatory vaccination policies
- Maternity Leave
- McNamara O’Hara Service Contract Act
- Medical Exams
- Megivern v. Glacier Hills Incorporated
- Motivating Factor
- NFL Bullying Scandal
- Obesity
- Online Defamation
- Participatory Wellness Programs
- Payroll
- Pennington v. Wagner’s Pharmacy
- Pension Plans
- Private employers
- Reference checks
- SHRM
- Small Business Administration (SBA)
- Social Media Ownership
- Supervisor
- Tangible employment actions
- Title VII retaliation cases
- Troyer v. T.John.E Productions
- United States v. Windsor
- University of Texas Southwestern Medical Center v. Nassar
- Vance v. Ball State University
- Violence
- Wage garnishment
- Contraceptive Mandate
- Employee Arrests
- Employee Forms
- Employee Hazards
- Employee photographs
- Employee Training
- Employer Group Health Plans
- Employer Mandate
- Employment Practices Liability Insurance
- Federal Workplace Agencies
- FICA
- Form I-9
- Gatto v. United Airlines and allied Aviation Services
- House Labor and Industry Committee
- Kentucky’s Whistleblower Act
- KRS 391.170
- Litigation
- Municipal Liability
- Online Account Protection
- Patient Protection and Affordable Care Act
- Play or Pay
- Posting Requirements
- Public Sector Liability
- Record Retention
- Religious Employer
- Right to Work Bill
- Sequester
- Severance Pay
- Supplemental Unemployment Compensation Benefits
- Tax Refund
- Telecommuting
- U.S. Citizenship and Immigration Services
- Unfair Labor Practice
- United States v. Quality Stores
- White v. Baptist Memorial Health Care Corp.
- Wilson v. City of Central City
- Class Action Waivers
- Criminal Background Checks
- Crisis Management
- Employee Performance Reviews
- Employee Personnel Files
- Federal Arbitration Act (FAA)
- Federal Department of Labor
- Job Description
- Job Requirement
- Kentucky Labor Cabinet
- Labor and Pensions ("HELP")
- PhoneDog v. Kravitz
- Salary Threshold
- Social Networking Online Protection Act (SNOP)
- Social Privacy Laws
- Strategic Enforcement Plan (SEP)
- Workplace Discrimination, Harassment and Retaliation
- Workplace Politics
- Business Insurance
- Communications Decency Act
- Employee Contracts
- Hiring and Firing
- Hosanna-Tabor Opinion
- Informal Discussion Letter (“EEOC Letter”)
- Insurance Coverage
- Internet & Media Law
- Internet Defamation
- National Labor Relations Act
- Non-Compete Agreement
- Retaliation by Association
- Unemployment Benefits
- Uniformed Services Employment and Reemployment Rights Act
- USERRA
Twitter: Little Statements with Big Consequences for Companies, cont.
Earlier this week, I gave some advice on how to protect your business’s Twitter account. The hijacking of a Twitter account can have an incredibly negative impact on your business. If you missed it, review the advice I offered in my earlier post and consider these additional steps.
Watch out for strange emails
Twitter will never ask you to provide your password via email, a direct message, or @reply. Twitter will never ask you to download something or sign-in to a non-Twitter website. So, if you get an email or message prompting you to do any of these things, don’t. If you receive a suspicious email, delete it (preferably without opening) and immediately visit https://Twitter.com to change your password. Emails like this are “phishing” for personal, online information that they can use to hack into your accounts. If the folks at Twitter believe your account has been phished or hacked, they may reset your password to prevent access. In this event, they will email you a link to where you can reset the password on your own. The password reset link is always available on the Twitter website, so you can visit it directly.
In addition to watching out for strange emails, be sure to use caution when sending your own. It is good practice to verbally communicate the log-in information with those who have user-access. If your name and password are in an email, the email may be sent to the wrong person internally or may be accessed externally via hackers.
Keep your computer up-to-date
Company browsers and operating systems should always be updated with the most current versions. All computers should have some kind of program which protects against viruses, spyware, and adware. By keeping your software in good overall health, you make the chance of a Twitter hack less likely.
Be on the lookout for two-factor authentication
There are online accounts (Facebook, for example) which require or offer users the option of two-factor authentication. With the slew of recent Twitter hackings, Twitter will no doubt soon be offering two-factor authentication to increase its security. This two-factor authentication should be used by all businesses, if not also for personal accounts. Two-factor authentication is a process in which a user is sent a randomly generated code to enter along with their user name and password when logging in. This code can be sent via text message to users’ mobile phones. Thus, even if a hijacker discovers your password, access will be denied without the random code. Think of it as another lock on your company’s social media door.
_______________
If an errant tweet does make it onto your company’s Twitter feed, swift action is necessary. You should have a social media crisis plan in place so that the problem can be handled immediately and effectively. The plan may involve steps such as changing passwords, sending an email to clients and customers explaining your account has been compromised, or tweeting out an apology to followers.
A 140-character message can do a lot of damage to your business. Take preventive steps to curb the likelihood of this happening. Just like every company should have a lock on the front door, every social media account should be bolted with security to keep out evil-doers.
Services may be performed by others.
This article does not constitute legal advice.