Joshua B. Konvisser

Joshua B. Konvisser

Pillsbury Winthrop Shaw Pittman LLP

Contact  |  View Bio  |  RSS

Latest Publications

Share:

The Internet of Things--Avoid Getting Eaten by the Wolf in Sheep's Clothing

With the number of (internet) connected devices rapidly surpassing the number of internet people (actually, all people whether or not connected), we take this opportunity to explore some of the legal complexity brought about...more

5/23/2014 - Big Data Cybersecurity Data Collection Data Protection Internet Internet of Things

What Does the SOX Say?

Any negotiation for cloud and outsourced services undoubtedly ends up in a debate over what audits are appropriate, what are required, and who will pay for them. With numerous stakeholders, the business owner is often left...more

12/2/2013 - Compliance Corporate Counsel Corporate Governance Sarbanes-Oxley Shareholders

Too Much of A Good Thing? Mind the Privacy Implications of iOS 7's New MDM Capabilities in Your BYOD Workforce

In addition to the consumer hoopla over iOS 7, companies managing BYOD programs also have reason to rejoice. As reported on CIO.com, iOS 7 brings about a new level of control for companies through expanded app-level MDM...more

9/20/2013 - Apple Bring Your Own Device iPhone Mobile Apps Mobile Device Management Mobile Devices

Personal Email Privacy in a BYOD Environment - A View from the Bench

We recently posted a three-part series on BYOD issues in this blog. A primary theme was the inherent tension between employer control and employee privacy in a BYOD environment....more

8/8/2013 - Bring Your Own Device Email Personally Identifiable Information Stored Communications Act Wiretapping

Declarations of Indepedence: 4 Tips for the 4th on How to Wind Down an Outsourcing--Without a Revolution

When in the course of commercial events, it becomes necessary for one client to dissolve the operational bonds that have connected it with its supplier, and to assume a new service delivery model. . ....more

7/5/2013 - Bonds Contract Drafting Outsourcing Suppliers

BYOD Trends and Best Practices: Part 3 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 3 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will address developing BYOD trends and best practices. Please check out Part 1 and 2 of this 3-part series addressing employee and employer concerns,...more

5/21/2013 - Bring Your Own Device Cybersecurity Data Protection

Employer BYOD Concerns: Part 2 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 2 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will discuss employer BYOD concerns. Check out Part 1 to learn more about employee interests; Part 3 will present developing trends and suggest best...more

5/14/2013 - Breach Notification Rule Bring Your Own Device Compliance Data Breach Data Protection Information Security

It's 2013. Do You Know Where Your BYOD Policies Are?

Imagine you grab your phone only to find it locked, with all of your applications, pictures, and contacts permanently deleted. Imagine your employer's IT department remote-wiped your phone because they mistakenly believed it...more

5/7/2013 - Bring Your Own Device Cybersecurity Data Protection Security and Privacy Controls

8 Results
|
View per page
Page: of 1