News & Analysis as of

Bring Your Own Device (BYOD) Cybersecurity

Retailers Should Be Aware of Data Privacy Concerns With Bring Your Own Device Policies

by Bryan Cave on

Many retailers permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

Top 10 Employment & Labour Issues for Employers

1: Accommodation in the Workplace - OVERVIEW - Employers have a duty to accommodate employees’ needs based on those grounds protected under federal and provincial human rights legislation. All employers are required...more

Navigating the IoT Workplace Quagmire

by Morgan Lewis on

The Internet of Things (IoT) promises a societal transformation based on a virtuous circle of constantly improving connectivity, integration, data, intelligence, and automation. One important element of this transformation is...more

Cybersecurity, A-Z: B is for BYOD

BYOD, or “Bring Your Own Device,” is an umbrella term for policies that employers have concerning your smart phone, tablet, or laptop. Essentially, the questions that BYOD policies seek to answer are these: (1) Who owns...more

[Event] Stay Ahead: Nossaman's 2017 Emerging Employment Issues Seminar - Feb 8th, 9th,15th & 16th - Four California Locations

by Nossaman LLP on

Please join us for this complimentary presentation on cutting-edge employment law issues. California and federal employment laws are constantly developing and evolving so it is essential for human resource professionals and...more

Bring Your Own Device (BYOD) – Be Smart

by LeClairRyan on

At the dawn of portable electronic devices, they were primarily work-related productivity tools. Often, employers would purchase (or lease) devices and distribute them to their need-to-have employee base. It’s not so long...more

Survey Shows Employees Top Security Risk for Companies

A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more

The Big Think: Cybersecurity – The Threat From Within

by Allen & Overy LLP on

Welcome to The Big Think – the thought leadership series from Allen & Overy’s global Employment practice. Its mission is to think big, think forward and think without boundaries. Members of our international team put...more

Employment Law Navigator – Week in Review: July 2016 #3

by Zelle LLP on

The combined topics of Facebook and race were in the news last week. A Pennsylvania judge ruled that an employee’s personal Facebook page laced with race-based stereotypes could be used to impeach her in her lawsuit, which...more

Legal Issues Business Leaders Need to Know in 2016

by Arnall Golden Gregory LLP on

A compilation of time-sensitive and trending legal and regulatory issues that general counsels and business leaders should be aware of in 2016. ...more

TN Ethics Opinion Approves Lawyers’ Cloud Storage of Client Data

by Burr & Forman on

Tennessee has joined other states in formally approving lawyers’ cloud-storage of client-confidential data. The Board of Professional Responsibility (“BOPR”) held that lawyers ethically may use cloud storage for...more

Gavel to Gavel: Filling data security gaps

by GableGotwals on

Sound data security programs are not only structured, but populated. Managers provide active oversight of employee access to and usage of data. Proper management can help avoid certain often-­-overlooked ...more

OCIE to Conduct More Cybersecurity Exams

by Burr & Forman on

This week the SEC’s Office of Compliance Inspections and Examinations (“OCIE”) announced a second-round of cybersecurity examinations, continuing its initiatives on the issue. The move follows the SEC’s: March 2014 roundtable...more

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

Be Alert Asia Pacific: Employment Law Newsletter: Top Tips for Employers: Cyber Risks and Fraud

by DLA Piper on

Cyber risk is becoming a growing concern amongst businesses and institutions. Data breaches and hacking have been problematic among some sectors, predominantly financial services, for some time. These risks are now often...more

The Internet of Things

by DLA Piper on

In this Presentation: - Internet of Things - definition - But what is it all about? - But not just that... - The IoT market in figures... - Beecham Research - view of the World - The Connected...more

Seven Training Imperatives to Address Your Biggest Cyber Security Risk: Employee Behavior

by NAVEX Global on

One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more

Effective cybersecurity: 8 questions for you and your team

by DLA Piper on

Cybersecurity has become a top-tier risk for US and multinational organizations. It is only a matter of time before a determined hacker will penetrate your organization’s system and successfully exfiltrate some data. (Indeed,...more

“Bring Your Own Device” To Work Programs: Regulatory and Legal Risks and How To Minimize Them

by Poyner Spruill LLP on

If you’ve ever left your mobile phone on an airplane, in a restaurant, or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as your...more

From Sedona to Georgetown to New York—What’s Fashionable in eDiscovery This Year?

by BakerHostetler on

It’s that time of year, when bench, bar, vendors, and clients think big eDiscovery thoughts. They go to The Sedona Conference (which is not in Sedona), Georgetown Law’s Advanced eDiscovery Institute (which is not at...more

Bring Your Own Challenges

by DLA Piper on

From reliable surveys and less dependable anecdotes in most major markets, including the UK and the US, opinions point to the almost inevitable expansion of BYOD – Bring Your Own Device – as a cost-saving model for employers....more

Poetic Justice - 2013 Wrap Up (Part 1 of 2)

by Cozen O'Connor on

This is the time of year to anxiously look forward to all that is anticipated to come in 2014. But it is also the time to look back at all that has happened in 2013. Rather than simply give you links to all of the stimulating...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

by Pepper Hamilton LLP on

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately

by Pepper Hamilton LLP on

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

BYOD Can Be A Four-Letter Word

by Jaburg Wilk on

So your employee wants to use his new iPhone5S to respond to work emails while on vacation. As an employer, you’re thrilled. You don’t have to pay for the technology (or the data plan), but your employee is now accessible...more

40 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.