<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>COVID-19 Archives - CWM Law</title>
	<atom:link href="https://www.cwm-law.com/covid-19/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.cwm-law.com/covid-19/</link>
	<description>Crenshaw, Ware &#38; Martin PLC</description>
	<lastBuildDate>Fri, 24 Apr 2020 19:16:42 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.cwm-law.com/wp-content/uploads/2016/01/cropped-FAV11-32x32.png</url>
	<title>COVID-19 Archives - CWM Law</title>
	<link>https://www.cwm-law.com/covid-19/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Video Conferencing Best Practices</title>
		<link>https://www.cwm-law.com/news/updates/video-conferencing-best-practices/</link>
		
		<dc:creator><![CDATA[Arketa Howard]]></dc:creator>
		<pubDate>Fri, 24 Apr 2020 17:32:48 +0000</pubDate>
				<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Updates]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[remote work]]></category>
		<category><![CDATA[Teleworking]]></category>
		<category><![CDATA[Video Conferencing]]></category>
		<category><![CDATA[Video Conferencing Zoom Microsoft Teams Security Cyber Security Teleworking Remote Work]]></category>
		<category><![CDATA[Zoom]]></category>
		<guid isPermaLink="false">https://www.cwm-law.com/?p=5885</guid>

					<description><![CDATA[<p>With many employees transitioning from the office to teleworking from home, video conferencing has surged in popularity and demand. Wherever your work takes you, consider these best practices to increase the security of your next video conference: Know the Current Vulnerabilities With a quick online search, you can stay abreast of the latest vulnerabilities associated [&#8230;]</p>
<p>The post <a href="https://www.cwm-law.com/news/updates/video-conferencing-best-practices/">Video Conferencing Best Practices</a> appeared first on <a href="https://www.cwm-law.com">CWM Law</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter"><img fetchpriority="high" decoding="async" width="500" height="230" src="https://www.cwm-law.com/wp-content/uploads/2020/04/WEBSITE-COVER2.jpg" alt="" class="wp-image-5928" srcset="https://www.cwm-law.com/wp-content/uploads/2020/04/WEBSITE-COVER2.jpg 500w, https://www.cwm-law.com/wp-content/uploads/2020/04/WEBSITE-COVER2-300x138.jpg 300w" sizes="(max-width: 500px) 100vw, 500px" /></figure></div>



<div class="wp-block-file"><a href="https://www.cwm-law.com/wp-content/uploads/2020/04/COVID-19-Video-Conferencing-Best-Practices.pdf">Video Conferencing Best Practices</a><a href="https://www.cwm-law.com/wp-content/uploads/2020/04/COVID-19-Video-Conferencing-Best-Practices.pdf" class="wp-block-file__button" download>Download</a></div>



<p>With many employees transitioning from the office to teleworking from home, video conferencing has surged in popularity and demand. Wherever your work takes you, consider these best practices to increase the security of your next video conference:</p>



<h5 class="wp-block-heading"><strong>Know the
Current Vulnerabilities</strong></h5>



<p>With a quick online search, you can stay abreast of
the latest vulnerabilities associated with most web conferencing platforms. Following
basic tips from security experts will protect your online meetings from
compromise. </p>



<h5 class="wp-block-heading"><strong>Avoid Unwanted Visitors and Content</strong></h5>



<p>To ensure the content of your video conferencing is shared only with its intended participants:</p>



<ul class="wp-block-list"><li>Do not post meeting links (i.e. Zoom, WebEx, MS
Teams) on public websites or social media.</li><li>Do not use your personal meeting ID for meetings.</li><li>Do not allow participants to share their screen,
or require the host to approve participant desktop sharing. </li><li>Disable file transfers unless you know the files
to be shared and file sharer. </li><li>Enable features that prevent removed
participants from rejoining a meeting. </li><li>Add a passcode to your meetings and only share
that passcode with your attendees. </li><li>Enable features that allow participants to join
and interact before the host enters. </li><li>Restrict meetings to only authenticated users if
feasible. </li><li>Enable “waiting room” features prior to starting
meetings so that you can identify participants before letting everyone in.</li></ul>



<h5 class="wp-block-heading"><strong>Take Advantage of Built-In Security Bells
and Whistles </strong></h5>



<p>Scheduling and configuring the details of
your upcoming video conference is best done within the conferencing platform so
you can take advantage of the built-in security features.</p>



<ul class="wp-block-list"><li>If available, ensure encryption is turned on,
within the software, for each video conference.</li><li>Use a web camera cover so no one else can use
your camera without your knowledge.</li><li>Do not record the video conference unless truly
necessary.</li><li>Use background blur, digital backgrounds, or greenscreen
settings to conceal information about your location.</li><li>Turn off any “attention tracking” features that
track participants during a screenshare. </li><li>Enable muted microphones as default setting.</li></ul>



<h5 class="wp-block-heading"><strong>Your Privacy Matters</strong></h5>



<p>Get rid of the crumbs left behind that
leave evidence of your video conferencing call so you can avoid unwanted
marketing and hackers. </p>



<ul class="wp-block-list"><li>Use a unique email address specifically for
video conferencing.</li><li>Clear cookies and block trackers after every
video call.</li><li>Opt out of all secondary data uses where
possible.</li><li>When there is a privacy issue, leave feedback with
the service about the problem.</li><li>Use other devices for communications during video
conferences.</li><li>Don’t sign into video conferencing platforms
through third parties like Facebook or Google.</li></ul>



<div class="wp-block-media-text alignwide" style="grid-template-columns:30% auto"><figure class="wp-block-media-text__media"><img decoding="async" width="1024" height="1024" src="https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-1024x1024.jpg" alt="" class="wp-image-5835" srcset="https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-1024x1024.jpg 1024w, https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-150x150.jpg 150w, https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-300x300.jpg 300w, https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-768x768.jpg 768w, https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport.jpg 1875w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure><div class="wp-block-media-text__content">
<p style="font-size:25px"><strong><a href="https://www.cwm-law.com/our-legal-team/darius-k-davenport/">Darius K. Davenport</a></strong></p>



<p><strong>Practice Areas:</strong></p>



<ul class="wp-block-list"><li><a href="https://www.cwm-law.com/practice-areas/cybersecurity-data-privacy/">Cybersecurity and Data Privacy</a>, Practice Group Chair</li><li><a href="https://www.cwm-law.com/practice-areas/government-and-public-sector/">Government and Public Sector</a><em>, Practice Group Chair</em></li><li><a href="https://www.cwm-law.com/practice-areas/admiralty-and-maritime-law/">Admiralty and Maritime Law</a></li><li><a href="https://www.cwm-law.com/practice-areas/employment-law/">Employment Law</a></li><li><a href="https://www.cwm-law.com/practice-areas/government-contracting/">Government Contracting</a></li><li><a href="https://www.cwm-law.com/practice-areas/litigation/">Litigation</a></li><li><a href="https://www.cwm-law.com/practice-areas/railroad-and-transit-law/">Railroad and Transit Law</a></li></ul>



<p>Contact by <a href="mailto:ddavenport@cwm-law.com">email </a>or phone (757) 623-3000.   </p>
</div></div>
<p>The post <a href="https://www.cwm-law.com/news/updates/video-conferencing-best-practices/">Video Conferencing Best Practices</a> appeared first on <a href="https://www.cwm-law.com">CWM Law</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Paid Family and Sick Leave: How it Works in the Era of Coronavirus</title>
		<link>https://www.cwm-law.com/news/updates/paid-family-and-sick-leave-how-it-works-in-the-era-of-coronavirus/</link>
		
		<dc:creator><![CDATA[Arketa Howard]]></dc:creator>
		<pubDate>Sat, 28 Mar 2020 20:16:55 +0000</pubDate>
				<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Updates]]></category>
		<category><![CDATA[children]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[employees]]></category>
		<category><![CDATA[employers]]></category>
		<category><![CDATA[families first]]></category>
		<category><![CDATA[FMLA]]></category>
		<category><![CDATA[paid leave]]></category>
		<category><![CDATA[paid sick leave]]></category>
		<category><![CDATA[remote work]]></category>
		<category><![CDATA[small business]]></category>
		<category><![CDATA[telework]]></category>
		<guid isPermaLink="false">https://www.cwm-law.com/?p=5576</guid>

					<description><![CDATA[<p>Recent amendments to the Family and Medical Leave Act, coupled with Governor Northam’s Executive Order mandating state-wide school closure, present challenges to normal small business office operations.</p>
<p>The post <a href="https://www.cwm-law.com/news/updates/paid-family-and-sick-leave-how-it-works-in-the-era-of-coronavirus/">Paid Family and Sick Leave: How it Works in the Era of Coronavirus</a> appeared first on <a href="https://www.cwm-law.com">CWM Law</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-file"><a href="https://www.cwm-law.com/wp-content/uploads/2020/04/COVID-19-Family-and-Sick-Leave-Updates.pdf">Paid Family and Sick Leave: How it Works in the Era of Coronavirus</a><a href="https://www.cwm-law.com/wp-content/uploads/2020/04/COVID-19-Family-and-Sick-Leave-Updates.pdf" class="wp-block-file__button" download>Download</a></div>



<p>Like your business, our law firm is dealing with a rapidly changing workplace environment as COVID-19 continues to impact our daily lives and operations. Recent amendments to the Family and Medical Leave Act, coupled with Governor Northam’s <a href="https://www.governor.virginia.gov/media/governorvirginiagov/executive-actions/EO-53-Temporary-Restrictions-Due-To-Novel-Coronavirus-(COVID-19).pdf">Executive Order</a> mandating state-wide school closure, present challenges to normal small business office operations. This translates into big changes at the workplace and for those who require time off to support out-of-school children and/or those directly impacted by the diagnosis of COVID-19. </p>


<p><!-- /wp:post-content --></p>
<p><!-- wp:download-monitor/download-button /--></p>
<p><!-- wp:paragraph {"align":"left","customFontSize":18} --></p>
<p style="font-size: 18px; text-align: left; padding-left: 40px;"><strong>Employees</strong></p>
<p style="padding-left: 40px;"><!-- /wp:paragraph --></p>
<p style="padding-left: 40px;"><!-- wp:paragraph {"align":"left"} --></p>
<p style="text-align: left; padding-left: 80px;">The <a href="https://www.congress.gov/116/bills/hr6201/BILLS-116hr6201enr.pdf">Families First Coronavirus Response Act</a> provides relief by expanding paid family and sick leave when employees are unable to go to work or work remotely. For those businesses with less than 500 employees, federal law now gives employees who are unable to telework the right to take up to 12 weeks of job-protected leave to care for children who cannot now attend school.  In addition, the statute expands paid sick leave to employees, up to 80 hours of paid sick leave for full-time employees. </p>
<p style="padding-left: 40px;"><!-- /wp:paragraph --></p>
<p style="padding-left: 40px;"><!-- wp:paragraph {"align":"left","customFontSize":18} --></p>
<p style="font-size: 18px; text-align: left; padding-left: 40px;"><strong>Businesses</strong></p>
<p style="padding-left: 40px;"><!-- /wp:paragraph --></p>
<p style="padding-left: 40px;"><!-- wp:paragraph --></p>
<p style="padding-left: 80px;">Under the Act, dollar-per-dollar tax credits are available to small businesses who provide paid family leave or paid sick leave to their employees.  Smaller businesses with 50 or less employees may be able to obtain an exemption from the Department of Labor (pending guidance once law is implemented).  These amendments are effective from April 2, 2020 to December 31, 2020.</p>
<p style="padding-left: 80px;"><!-- /wp:paragraph --></p>
<p style="padding-left: 80px;"><!-- wp:paragraph --></p>
<p style="padding-left: 80px;">Please visit the <a href="https://www.dol.gov/agencies/whd/pandemic">resource page</a> created by<br />Wage and Hour Division of the Department of Labor for further updates to<br />employees and employers responding to COVID-19.  </p>
<p><!-- /wp:paragraph --></p>
<p><!-- wp:paragraph --></p>
<p>As your partner, Crenshaw, Ware &amp; Martin is committed to helping you and your business navigate through any challenge. We are here to answer questions, deliver solutions and help develop multi-scenario contingency plans. Please let us know how we may be of assistance to you. </p>
<p><!-- /wp:paragraph --></p>
<p><!-- wp:media-text {"mediaId":5618,"mediaType":"image","mediaWidth":33} --></p>
<div class="wp-block-media-text alignwide" style="grid-template-columns: 33% auto;">
<figure class="wp-block-media-text__media"><img decoding="async" width="493" height="493" class="wp-image-5618" src="https://www.cwm-law.com/wp-content/uploads/2020/03/1sms_sm.png" alt="" srcset="https://www.cwm-law.com/wp-content/uploads/2020/03/1sms_sm.png 493w, https://www.cwm-law.com/wp-content/uploads/2020/03/1sms_sm-150x150.png 150w, https://www.cwm-law.com/wp-content/uploads/2020/03/1sms_sm-300x300.png 300w" sizes="(max-width: 493px) 100vw, 493px" /></figure>
<div class="wp-block-media-text__content"><!-- wp:paragraph {"placeholder":"Content…","customFontSize":27} -->
<p> </p>
<p style="font-size: 27px;"><strong><a href="https://www.cwm-law.com/our-legal-team/steve-stancliff/">Steven M. Stancliff</a></strong></p>
<p><!-- /wp:paragraph --></p>
<p><!-- wp:paragraph {"customFontSize":18} --></p>
<p style="font-size: 18px;"><strong>Practice Areas:</strong></p>
<p><!-- /wp:paragraph --></p>
<p><!-- wp:list --></p>
<ul>
<li><a href="https://www.cwm-law.com/practice-areas/admiralty-and-maritime-law/">Admiralty and Maritime Law</a>, Practice Group Chair</li>
<li><a href="https://www.cwm-law.com/practice-areas/autonomous-and-unmanned-systems/">Autonomous and Unmanned Systems</a></li>
<li><a href="https://www.cwm-law.com/practice-areas/government-contracting/">Government Contracting</a></li>
</ul>
<p><!-- /wp:list --></p>
<p><!-- wp:paragraph {"customFontSize":18} --></p>
<p style="font-size: 18px;">Contact by <a href="mailto:sstancliff@cwm-law.com">email</a> or phone (757) 623-3000.</p>
<p><!-- /wp:paragraph --></p>
</div>
</div>
<p><!-- /wp:media-text --></p>
<p><!-- wp:separator --></p>
<hr class="wp-block-separator" /><!-- /wp:separator -->
<p> </p>
<p><!-- wp:media-text {"mediaId":5632,"mediaType":"image","mediaWidth":33} --></p>
<div class="wp-block-media-text alignwide" style="grid-template-columns: 33% auto;">
<figure class="wp-block-media-text__media"><img loading="lazy" decoding="async" width="493" height="493" class="wp-image-5632" src="https://www.cwm-law.com/wp-content/uploads/2020/03/Alex_cr.png" alt="" srcset="https://www.cwm-law.com/wp-content/uploads/2020/03/Alex_cr.png 493w, https://www.cwm-law.com/wp-content/uploads/2020/03/Alex_cr-150x150.png 150w, https://www.cwm-law.com/wp-content/uploads/2020/03/Alex_cr-300x300.png 300w" sizes="auto, (max-width: 493px) 100vw, 493px" /></figure>
<div class="wp-block-media-text__content"><!-- wp:paragraph {"placeholder":"Content…","customFontSize":27} -->
<p> </p>
<p style="font-size: 27px;"><strong><a href="https://www.cwm-law.com/our-legal-team/alexander-r-mcdaniel/">Alexander R. McDaniel</a></strong></p>
<p><!-- /wp:paragraph --></p>
<p><!-- wp:paragraph {"customFontSize":18} --></p>
<p style="font-size: 18px;"><strong>Practice Areas:</strong></p>
<p><!-- /wp:paragraph --></p>
<p><!-- wp:list --></p>
<ul>
<li><a href="https://www.cwm-law.com/practice-areas/admiralty-and-maritime-law/">Admiralty and Maritime Law</a></li>
<li><a href="https://www.cwm-law.com/practice-areas/business-disputes/">Business Disputes</a></li>
<li><a href="https://www.cwm-law.com/practice-areas/litigation/">Litigation</a></li>
<li><a href="https://www.cwm-law.com/practice-areas/railroad-and-transit-law/">Railroad and Transit Law</a></li>
</ul>
<p><!-- /wp:list --></p>
<p><!-- wp:paragraph {"align":"left","customFontSize":18} --></p>
<p style="font-size: 18px; text-align: left;">Contact by <a href="mailto:amcdaniel@cwm-law.com">email</a> or phone (757) 623-3000.</p>
<p><!-- /wp:paragraph --></p>
</div>
</div>
<p><!-- /wp:media-text --></p>
<p><!-- wp:paragraph --></p>
<p><!-- /wp:paragraph --></p><p>The post <a href="https://www.cwm-law.com/news/updates/paid-family-and-sick-leave-how-it-works-in-the-era-of-coronavirus/">Paid Family and Sick Leave: How it Works in the Era of Coronavirus</a> appeared first on <a href="https://www.cwm-law.com">CWM Law</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Teleworking Data Security Tips</title>
		<link>https://www.cwm-law.com/news/updates/teleworking-data-security-tips/</link>
		
		<dc:creator><![CDATA[Arketa Howard]]></dc:creator>
		<pubDate>Mon, 16 Mar 2020 23:47:59 +0000</pubDate>
				<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Updates]]></category>
		<guid isPermaLink="false">https://www.cwm-law.com/?p=5516</guid>

					<description><![CDATA[<p>Teleworking data-security is essential to protecting company data when employees are working at remote locations.  Consider these simple tips to encourage your company and employees to maintain data security outside of the office. </p>
<p>The post <a href="https://www.cwm-law.com/news/updates/teleworking-data-security-tips/">Teleworking Data Security Tips</a> appeared first on <a href="https://www.cwm-law.com">CWM Law</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-file"><a href="https://www.cwm-law.com/wp-content/uploads/2020/04/COVID-19-Teleworking-Tips-1.pdf">Teleworking Data Security Tips</a><a href="https://www.cwm-law.com/wp-content/uploads/2020/04/COVID-19-Teleworking-Tips-1.pdf" class="wp-block-file__button" download>Download</a></div>


<p>Teleworking data-security is essential to protecting company data when employees are working at remote locations.&nbsp; Consider these simple tips to encourage your company and employees to maintain data security outside of the office.</p>
<p><span style="color: #000000;"><strong data-rich-text-format-boundary="true">Employees</strong></span></p>
<p style="padding-left: 40px;"><strong data-rich-text-format-boundary="true">Secure Connection&nbsp;&nbsp; </strong>Do not access company data via unsecured home or public Wi-Fi networks. When working remotely, protect data by using a Virtual Private Network (VPN) and a home firewall. Directly plug your machine into the router if possible. Segregate and conceal your work connection from other home Wi-Fi traffic.</p>
<p style="padding-left: 40px;"><strong data-rich-text-format-boundary="true">Data Protection&nbsp;&nbsp; </strong>Avoid transferring sensitive company data to personal devices, non-company applications, and/or prohibited external storage (physical or cloud). Do not share personal or company information online or store in personal accounts (email or cloud). Securely back up files on company storage in case of a data incident.</p>
<p style="padding-left: 40px;"><strong data-rich-text-format-boundary="true">Device Security&nbsp;&nbsp; </strong>Do not leave your personal or company device unsecured. Physically secure your device and external storage. Enable automatic lock and log-off screens to prevent unauthorized access when away. Do not allow anyone to use computers or devices that have access to company data. Use complex passwords and keep passwords secure when working remotely.</p>
<p style="padding-left: 40px;"><strong data-rich-text-format-boundary="true">Software &amp; Updates&nbsp;&nbsp; </strong>Ensure all device applications, anti-virus, operating systems, and web browsers are up to date. Run a complete scan of your entire device before accessing company data. Remove all peer to peer, file sharing and outdated/unused applications from personal devices that access company data.</p>
<p style="padding-left: 40px;"><strong data-rich-text-format-boundary="true">Software &amp; Updates&nbsp;&nbsp; </strong>Ensure all device applications, anti-virus, operating systems, and web browsers are up to date. Run a complete scan of your entire device before accessing company data. Remove all peer to peer, file sharing and outdated/unused applications from personal devices that access company data.</p>
<p style="padding-left: 40px;"><strong data-rich-text-format-boundary="true">Avoid and Report Suspicious Activity&nbsp;&nbsp; </strong>Contact the company and follow the company’s incident response plan to report all data security issues. Disable pop-ups and do not click on suspicious links or open unknown emails.</p>
<p style="padding-left: 40px;"><strong data-rich-text-format-boundary="true">Avoid and Report Suspicious Activity&nbsp;&nbsp; </strong>Contact the company and follow the company’s incident response plan to report all data security issues. Disable pop-ups and do not click on suspicious links or open unknown emails.</p>
<p style="text-align: center;"><span style="color: #993300;"><em>Do not take any significant business actions (i.e. transfer funds) without verifying the transaction with actual parties to the transaction over the phone.</em></span></p>
<p><span style="color: #000000;"><strong data-rich-text-format-boundary="true">Businesses</strong></span></p>
<p style="padding-left: 40px;"><strong data-rich-text-format-boundary="true">Secure Connection&nbsp;&nbsp; </strong>Ensure Wi-Fi networks are secure, encrypted, and hidden. Configure your firewall to prevent unauthorized access to company data and applications. Provide those working remotely with device security software.</p>
<p style="padding-left: 40px;"><strong data-rich-text-format-boundary="true">Data Protection&nbsp;&nbsp; </strong>Implement mandatory complex passwords and multi-factor authentication for devices and applications. Limit access to data and applications based on employee roles and information needs.</p>
<p style="padding-left: 40px;"><strong data-rich-text-format-boundary="true">Device Security</strong> &nbsp; Ensure all devices that access company data are properly configured, i.e. enable automatic screen locks to engage after a period of inactivity. Implement device and communication encryption as needed.</p>
<p style="padding-left: 40px;"><strong data-rich-text-format-boundary="true">Security Software and Updates</strong>&nbsp;&nbsp;&nbsp; Increase the sensitivity of network security tools. Ensure all applications, anti-virus, operating systems, and web browsers are automatically updating on all devices.</p>
<p style="padding-left: 40px;"><strong data-rich-text-format-boundary="true">Incident Management</strong>&nbsp;&nbsp; Provide employees with clear data incident response guidance outlining how to report an issue, plan of action, and escalation path for remote technical and security issues.</p>
<p style="padding-left: 40px;"><strong data-rich-text-format-boundary="true">Security Training</strong>&nbsp;&nbsp; Keep employees trained on best practices and how to handle security issues when they arise. Ensure employees are familiar with device, email, and storage encryption practices when handling sensitive data.</p>


<div class="wp-block-media-text alignwide" style="grid-template-columns:33% auto"><figure class="wp-block-media-text__media"><img loading="lazy" decoding="async" width="1024" height="1024" src="https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-1024x1024.jpg" alt="" class="wp-image-5835" srcset="https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-1024x1024.jpg 1024w, https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-150x150.jpg 150w, https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-300x300.jpg 300w, https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-768x768.jpg 768w, https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport.jpg 1875w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure><div class="wp-block-media-text__content">
<p style="font-size:25px"><strong><a href="https://www.cwm-law.com/our-legal-team/darius-k-davenport/">Darius K. Davenport</a></strong></p>



<p><strong>Practice Areas:</strong></p>



<ul class="wp-block-list"><li><a href="https://www.cwm-law.com/practice-areas/cybersecurity-data-privacy/">Cybersecurity and Data Privacy</a>, Practice Group Chair</li><li><a href="https://www.cwm-law.com/practice-areas/government-and-public-sector/">Government and Public Sector</a><em>, Practice Group Chair</em></li><li><a href="https://www.cwm-law.com/practice-areas/admiralty-and-maritime-law/">Admiralty and Maritime Law</a></li><li><a href="https://www.cwm-law.com/practice-areas/employment-law/">Employment Law</a></li><li><a href="https://www.cwm-law.com/practice-areas/government-contracting/">Government Contracting</a></li><li><a href="https://www.cwm-law.com/practice-areas/litigation/">Litigation</a></li><li><a href="https://www.cwm-law.com/practice-areas/railroad-and-transit-law/">Railroad and Transit Law</a></li></ul>



<p>Contact by <a href="mailto:ddavenport@cwm-law.com">email </a>or phone (757) 623-3000.   </p>
</div></div>
<p>The post <a href="https://www.cwm-law.com/news/updates/teleworking-data-security-tips/">Teleworking Data Security Tips</a> appeared first on <a href="https://www.cwm-law.com">CWM Law</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
