Legal Issues 2018 Legal ReportGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652018-07-01T04:00:00Z, Megan Gates<h4>​Judicial Decisions</h4><p><strong>WAGES.</strong> Employers cannot use prior salary to justify pay discrepancies between men and women hired for the same position, a U.S. federal court of appeals ruled.</p><p>"The Equal Pay Act stands for a principle as simple as it is just: men and women should receive equal pay for equal work regardless of sex," wrote Circuit Judge Stephen Reinhardt in his opinion for the court. "The question before us is also simple: can an employer justify a wage differential between male and female employees by relying on prior salary? Based on the text, history, and purpose of the Equal Pay Act, the answer is clear: No."</p><p>The ruling stems from a case brought by Aileen Rizo, who was hired as a math consultant by the Fresno County Office of Education in October 2009. Rizo's previous employer paid her a salary of $50,630 for 206 working days as a middle and high school math teacher, along with an educational stipend of $1,200 per year for her master's degrees.</p><p>As a Fresno County employee, Rizo was paid a salary of $62,133 for 196 days of work with a master's degree stipend of $600. Her salary was determined using the county's standard operating procedure (SOP) of 10 stepped salary levels, with a new hire's salary determined by adding 5 percent to his or her previous salary and placing the individual in the corresponding step. The SOP did not consider experience.</p><p>In 2012, Rizo learned that her male colleagues were hired at higher salary steps—meaning their salaries were more than hers because their previous salaries were higher. She filed a complaint with the county, which said all salaries were determined using the SOP.</p><p>Rizo filed suit against Jim Yovino, the superintendent of the Fresno County Office of Education, in February 2014, alleging that the county had violated the Equal Pay Act, engaged in sex discrimination, and failed to prevent discrimination under California state law.</p><p>Fresno County argued that setting Rizo's salary at a level lower than her colleagues was legal because it used the same SOP to set all employees' salaries. It filed a motion to dismiss the suit, arguing that it was not a violation of the Equal Pay Act to use previous salary to set employees' salaries.</p><p>Rizo's case reached the U.S. Court of Appeals for the Ninth Circuit, which took up the case to clarify the law. </p><p>"We now hold that prior salary alone or in combination with other factors cannot justify a wage differential," Reinhardt wrote. "To hold otherwise—to allow employers to capitalize on the persistence of the wage gap and perpetuate that gap ad infinitum—would be contrary to the text and history of the Equal Pay Act and would vitiate the very purpose for which the Act stands."</p><p>The wage gap between men and women has improved since the act was passed, Reinhardt added, but it continues today, sending the message that women are not worth as much as men. </p><p>"Allowing prior salary to justify a wage differential perpetuates this message, entrenching in salary systems...the very discrimination that the Act was designed to prohibit and rectify," Reinhardt wrote, remanding the case to a district court to determine if the county engaged in discrimination. (Rizo v. Yovino, U.S. Court of Appeals for the Ninth Circuit, No. 16-15372, 2018)</p><p> </p><p><strong>SCHOOL SECURITY.</strong> Universities have a duty to protect and warn students if they are aware of a threat or foreseeable violence towards students, the California Supreme Court ruled.</p><p>In fall 2008, Damon Thompson transferred to the University of California Los Angeles (UCLA) and started having problems with his fellow students in his classes and residence hall. Thompson emailed a history professor complaining about other students' behavior and saying that he'd heard the professor call him "troubled" and "crazy," according to court documents.</p><p>The professor, who had not said such things to the student, forwarded the email to his department chair and was told to encourage Thompson to visit the university's counseling services. Thompson then sent a letter to the dean of students, complaining about "unwelcomed sexual advances" and other offensive behaviors perpetrated by other students. Thompson said if the university did not discipline those responsible, the matter would escalate.</p><p>The university moved Thompson into a new dormitory, but Thompson continued to make complaints to professors that his fellow students were making offensive comments about him. Another professor encouraged Thompson to visit the counseling center, but he refused, while another professor forwarded Thompson's complaints—which reached the university's Consultation and Response Team.</p><p>Thompson continued to experience problems on campus and underwent a psychiatric evaluation after an incident where he claimed he'd spoken to his father about shooting people on campus. He was diagnosed with possible schizophrenia and major depressive disorder and agreed to take medication. The Response Team also began to discuss Thompson at its weekly meetings and later moved him to a single room on campus.</p><p>Thompson, however, began to experience auditory hallucinations while in class—especially in his chemistry lab. He began to accuse fellow student Katherine Rosen of "calling him stupid," but the professor did not witness any harassment. </p><p>The professor alerted the Response Team to Thompson's behavior, and it expressed concern that he had identified Rosen as a tormentor. The team scheduled a meeting to discuss Thompson's behavior and decided to investigate if he was having similar difficulties in other classes.</p><p>The next day during his chemistry lab, however, Thompson stabbed Rosen in the chest and neck with a kitchen knife. Thompson pleaded not guilty for the attack by reason of insanity and was later diagnosed with paranoid schizophrenia.</p><p>Rosen survived the attack and filed suit against Thompson, the regents of the University of California, and UCLA employees. </p><p>She alleged that UCLA was negligent because the university had a duty "to take reasonable protective measures to ensure her safety against violent attacks and otherwise protect her from reasonable foreseeable criminal conduct, to warn her as to such reasonable foreseeable criminal conduct on its campus and in its buildings, and/or to control the reasonably foreseeable wrongful acts of third parties/other students," according to the lawsuit. UCLA had failed to do this, Rosen said, because it did not warn her, attempt to protect her, or control Thompson's foreseeable violent conduct.</p><p>UCLA moved to have the case dismissed because it claimed it did not have a duty to protect students from criminal acts, that if it did have such a duty it was not breached in this incident, and that UCLA was immune from liability under government provisions.</p><p>The case reached the California Supreme Court, which reversed a lower court decision and remanded the case for further proceedings. The court ruled in Rosen's favor due to the special relationship universities have with their enrolled students. </p><p>"We conclude that violence against students in the classroom or during curricular activities, while rare, is a foreseeable consequence, and considerations of public policy do not justify categorically barring an injured student's claims against the university," the court wrote.</p><p>The court explained its ruling, saying that the focus was not on whether UCLA could predict that Thompson would stab Rosen, but if it could foresee that its failure to control a violent student or warn students he'd complained about could result in harm to them.</p><p>The court's ruling, however, was not a blanket decision mandating that universities prevent all violence against students. </p><p>"Such a duty could be impossible to discharge in many circumstances," the court said. "Rather, the school's duty is to take reasonable steps to protect students when it becomes aware of a foreseeable threat to their safety." (Regents of the University of California v. Superior Court of Los Angeles County, Supreme Court of California, No. S230568, 2018)​</p><h4>Legislation</h4><h5>Honduras</h5><p><strong>SPEECH. </strong>The Honduran Congress is considering legislation that would require that Internet service providers (ISPs) block or remove "illegal content" from their platforms.</p><p>The bill would require ISPs to delete illegal content within 24 hours after a complaint is filed about the content. ISPs would have an additional seven days to complete the deletion if the extension is deemed "duly justified."</p><p>Content can be considered illegal if it is designed to incite discrimination, harms dignity, incites or is an expression of hate, or promotes discourse with discriminatory connotations, according to the legislation. </p><p>Critics, including Human Rights Watch, have called the legislation an attempt to censor free speech.</p><h5>United States.</h5><p><strong>SCHOOL SECURITY.</strong> Maryland Governor Larry Hogan signed legislation into law that creates new standards for school safety.</p><p>The Maryland Safe to Learn Act (formerly S.B. 1265) requires each local school system to designate a school safety coordinator and develop and submit to the Maryland Police Training and Standards Commission a curriculum for use in training school resource officers.</p><p>The law also requires local school systems and local law enforcement agencies to collaborate to establish policies for responding to an emergency at each public school, and mandates that school systems conduct safety evaluations regularly. </p><p>Additionally, the law instructs schools to update their school emergency plans, which must be submitted to the Maryland Center for School Safety for review to correct identified weaknesses within them. </p><p>Maryland enacted the law after a student opened fire at his school, targeting his ex-girlfriend. The gunman committed suicide after being confronted by an armed school resource officer.</p><h4>Elsewhere in the Courts​</h4><p><strong>Discrimination</strong></p><p>Target will pay $3.7 million to settle charges that its criminal background check process was biased against African American and Latino applicants. As part of the settlement, which is still subject to court approval, Target would be required to prioritize hiring applicants that were discriminated against during the background check process. </p><p>Target has since changed its background check process, such as asking if an applicant has a criminal record at the end of the hiring process. (Times v. Target, U.S. District Court for the Southern District of New York, No. 1:18-cv-02993, 2018)</p><p><strong>Harassment</strong></p><p>A Florida wealth investment management and trust services company will pay $180,000 and provide additional relief to settle a sexual harassment and retaliation suit filed by the U.S. Equal Employment Opportunity Commission (EEOC). In its lawsuit, the EEOC alleged that a female executive assistant and marketing officer was subjected to a hostile work environment—including verbal and physical harassment—and retaliated against after she complained. </p><p>As part of the settlement, the company must provide the executive assistant with a positive job reference, revise its policy on sex discrimination, and provide individual training to the company's chief wealth advisor. (EEOC v. Coral Gables Trust Company, U.S. District Court for the Southern District of Florida Miami Division, No. 1:18cv21148-JAL/JJO, 2018)​</p><p><strong>Trade Secrets</strong></p><p>Chinese scientist Weiqiang Zhang, 51, was sentenced to 121 months in a U.S. federal prison for conspiring to steal samples of rice seeds from a biopharmaceutical research facility. Zhang was convicted on one count of conspiracy to steal trade secrets, one count of conspiracy to commit interstate transportation of stolen property, and one count of interstate transportation of stolen property after stealing hundreds of rice seeds from the facility in Kansas and storing them at his residence in Manhattan. U.S. Customs and Border Protection officers discovered the seeds in Zhang's luggage when he attempted to take them to China. (U.S. v. Zhang, U.S. District Court for the District of Kansas, No. 13-20134, 2018)</p>

Legal Issues 2018 Legal Report 2018 Legal Report Resources 2018 Legal Report 2018 SM Online 2018 Legal Report Resources Flight 2018 Legal Report Balk on Bud 2018 SM Online 2018 SM Online 2018 Legal Report Resources the Wheel: Stopping Distracted Driving 2018 Legal Report Review: Tradecraft Primer 2018 SM Online 2018 Legal Report Resources & Neutral in the Workplace 2018 Legal Report 2018 SM Online

 You May Also Like... Online January 2018<h4>​SCHOOL SAFETY</h4><p>Campus security nonprofit <a href="" target="_blank">Safe Havens International </a>offers free school safety resources on its website that can be used in K-12 schools as well as for higher learning institutions. Documents include a <a href="" target="_blank">safety plan evaluation tool</a>, a building design checklist, and a sample background investigation booklet for the hiring process. Safe Havens International works with schools on national and international levels in planning, coordinating, and evaluating a wide range of school crisis simulations.</p><h4>​BIODEFENSE</h4><p>Despite a call for a united biodefense approach, U.S. federal agencies continue to face challenges in sharing threat information, according to <a href="" target="_blank">a GAO report​</a>. A <a href="" target="_blank">2016 panel on biodefense</a> contends that the U.S. vice president should lead the nation’s biodefense efforts.</p><h4>CYBER STRATEGY</h4><p>Despite awareness of cyber risks, many companies remain unprepared to deal with them, according to PricewaterhouseCoopers’ <a href="" target="_blank">The Global State of Information Security Survey 2018.​</a></p><h4>CRISIS COMMUNICATIONS</h4><p>SmartRiskSolutions GmbH <a href="" target="_blank">published a handbook​</a> with advice for crisis management and crisis communications during a terrorist attack or active shooter incident. </p><h4>ASIS ACCOLADES</h4><p>Attendees at the ASIS 2017 voted the Pelco by Schneider Electric VideoXpert Professional Video Management System an ASIS Accolades People’s Choice Award winner. The Judges Choice awardee was the intelligent security robot from Cobalt Robotics. <a href="" target="_blank">Read about all the winners.​</a></p><h4>WHISTLEBLOWING REWARDS</h4><p>Financial incentives can discourage whistleblower reporting, <a href="" target="_blank">according to a new study.​​</a></p><h4>FIRE SAFETY</h4><p>The <a href="" target="_blank">2016 Fire and Life Safety Study</a> from Consulting-Specifying Engineer surveyed its subscribers on what matters to them when selecting a fire and life safety system. ​</p><h4>EMAIL</h4><p>The U.S. Department of Homeland Security <a href="" target="_blank">issued a binding directive ​</a>that requires all U.S. agencies to adopt email and Web security guards against phishing and spam.</p><h4>BOMBING CONVICTION</h4><p><a href="" target="_blank">A jury convicted</a> Ahmad Khan Rahimi on eight charges related to bombings in New York City on September 17, 2016, which injured more than 30 people and caused millions of dollars in property damage.</p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465's-New-in-Access-Control.aspxWhat's New in Access Control?<p>​Innovation in access control is quietly heating up. The industry is ready to implement innovations on a broad scale that have been just out of reach. Demand for virtual credentials is growing, facial recognition technology is both technically and economically feasible, and migration to the cloud is increasing—and increasingly beneficial. Over the next few years, market adoption of these advances will transform the ways security professionals operate and organizations benefit from their access control systems. </p><p><strong>Virtual credentials and mobile access technology</strong></p><p>The demand for virtual credentials and mobile access is intensifying, driven in part by younger members of the workforce who never go anywhere without their smartphones. Suffice to say, most employees wouldn't turn their cars around for a forgotten physical credential, but they'll certainly restart their commutes to collect forgotten smartphones. </p><p>The benefits are simple: convenience, compliance, and satisfaction of workforce demand. Everyone carries their phone, security professionals enhance their management capabilities, and employees can stay on the move. By including the credential in a mobile device, embedded in an app, organizations can also provide novel security capabilities, such as threat reporting and virtual photo ID. </p><p>The good news is that virtual credentials and mobile access technology have progressed to the point that they are easier to implement. Migration is straightforward, and implementation does not need to be all-or-nothing. Instead it can be taken in phases leading to an interim hybrid approach that includes physical and virtual credentials. </p><p><strong>Facial recognition</strong></p><p>Facial recognition offers the advantage of using existing access control rules, while reducing the friction of the user experience. </p><p>Picture a busy New York City high-rise office building with turnstiles that control access to an elevator lobby. There are always a few employees who have to search their pockets or backpacks to fish out a physical credential. Implementing facial recognition eliminates that bottleneck. The software scans people as they approach the turnstile and transmits a virtual credential to the access control system. Where a line might otherwise have formed, authorized employees now pass through turnstiles efficiently. </p><p>Facial recognition access control is no longer out of reach. Today's computing power can be combined with increasingly high-definition cameras and advanced recognition algorithms to bring the costs of implementation way down. </p><p><strong>Access control in the cloud</strong></p><p>The access control server is the nerve center of an access control system, but it no longer needs to physically exist. The increasing prevalence of the cloud eliminates that necessity. </p><p>Rather than dealing with the maintenance of a physical server, the speed and convenience of the cloud can handle everything a hardware box used to. This advance allows for increased scalability. And it provides flexibility in how security professionals purchase and use access control servers. Now the integrator or manufacturer can reduce end user burden and cost by ensuring that systems are backed up and updated remotely.<strong> </strong></p><p><strong>What's next?</strong></p><p><strong></strong>Innovations in access control systems will drive the industry over the coming years. Novel credentials, such as mobile access and face recognition technology, combined with cloud-based servers will deliver an altogether improved experience. </p><p><em>John L. Moss is CEO of S2 Security.</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465