Latest Publications

Share:

BYOD: No Such Thing as a Free Lunch

It seems intuitive that, by and large, employees prefer to use their own mobile devices, carrying only a single device for personal and work purposes, and having choice over the device to be used (please don't take away my...more

9/5/2014 - Bring Your Own Device Cell Phones Mobile Devices Reimbursements

Public Sector Outsourcing: Events and Lessons from 2013

2013 was not a stellar year for public sector outsourcing. As we reported in an earlier blog article, Indiana is appealing judgment in an ongoing court battle with IBM over a troubled welfare claims processing project....more

2/6/2014 - Australia Health and Welfare Plans Healthcare Outsourcing Unemployment Unemployment Benefits

Of Service Levels, Welfare, and Heartbreak: Indiana vs. IBM

In 2006 Indiana awarded IBM a contract for more than $1 billion to modernize Indiana's welfare case management system and manage and process the State of Indiana's applications for food stamps, Medicaid and other welfare...more

5/28/2013 - Breach of Contract Contract Claims Health and Welfare Plans IBM Liquidated Damages

BYOD Trends and Best Practices: Part 3 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 3 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will address developing BYOD trends and best practices. Please check out Part 1 and 2 of this 3-part series addressing employee and employer concerns,...more

5/21/2013 - Bring Your Own Device Cybersecurity Data Protection

Employer BYOD Concerns: Part 2 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 2 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will discuss employer BYOD concerns. Check out Part 1 to learn more about employee interests; Part 3 will present developing trends and suggest best...more

5/14/2013 - Breach Notification Rule Bring Your Own Device Compliance Data Breach Data Protection Information Security

It's 2013. Do You Know Where Your BYOD Policies Are?

Imagine you grab your phone only to find it locked, with all of your applications, pictures, and contacts permanently deleted. Imagine your employer's IT department remote-wiped your phone because they mistakenly believed it...more

5/7/2013 - Bring Your Own Device Cybersecurity Data Protection Security and Privacy Controls

6 Results
|
View per page
Page: of 1