News & Analysis as of

Bring Your Own Device (BYOD) Cybersecurity Data Protection

Health Care Compliance Association (HCCA)

Security Threats Soar From Nation-State Bad Actors as the New Year Gets Underway

Report on Patient Privacy 18, no. 1 (January 2021) - Security threats to health care entities will continue to escalate in 2021, as bad actors with significant capabilities target pandemic-weary organizations still...more

Blank Rome LLP

NYDFS Issues New Guidance on COVID-19 Cybersecurity Risks

Blank Rome LLP on

As the coronavirus (“COVID-19”) pandemic continues, cyber criminals have upped the intensity of their COVID-19-themed cyber-attacks designed to exploit the current crisis. With financial institutions representing primary...more

Seyfarth Shaw LLP

Belonging, Connection, and Inclusion Amid COVID-19

Seyfarth Shaw LLP on

In a short span of time, we have gone from thinking about the virus as a distant concern to working remotely from home as we have been asked to help flatten the curve by social distancing. We are daily bombarded with news and...more

Foley Hoag LLP - Security, Privacy and the...

Beware of COVID-19-Based Cyber Attacks, Say US and UK Agencies

Malicious cyber actors have been exploiting the COVID-19 crisis, warn the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and the UK’s National Cyber Security Centre (NCSC) in a joint...more

Proskauer on Privacy

FTC Ramps up COVID-19 Activity After Improving its Data Security Enforcement Orders

Proskauer on Privacy on

With the spread of the novel coronavirus (COVID-19), cybersecurity criminals and scammers are ramping up their efforts to target vulnerable employers and workforces. The FTC announced today that since January they have...more

K&L Gates LLP

COVID-19: System Security With a Remote Workforce

K&L Gates LLP on

COVID-19 has forced many businesses to quickly accommodate a significant portion of their employees working remotely. Having an employee base working away from established offices creates security vulnerabilities that many...more

Mintz - Privacy & Cybersecurity Viewpoints

Coronavirus (COVID-19): Managing Cyber Security Risks of Remote Work

With cases of the Novel Coronavirus (COVID-19) emerging in nearly every state, many businesses are taking swift action in an effort to curb its spread. Teleworking, “remote working,” or simply “working from home,” is a...more

Kramer Levin Naftalis & Frankel LLP

Cybersecurity: the SEC Provides Guidance on Well-Known and Emerging Best Practices

At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more

Gray Reed

An Employer’s Spooky Interpretation of its Bring Your Own Device (BYOD) Policy

Gray Reed on

Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more

Hogan Lovells

The UK Cyber Essentials Requirements for IT Infrastructure provides a window into GDPR expectations for data security requirements

Hogan Lovells on

The EU’s General Data Protection Regulation (GDPR), which went into effect in May 2018, requires companies to implement appropriate security measures when handling personal data....more

BCLP

Retailers Should Be Aware of Data Privacy Concerns With Bring Your Own Device Policies

BCLP on

Many retailers permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

Robinson+Cole Data Privacy + Security Insider

Survey Shows Employees Top Security Risk for Companies

A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more

A&O Shearman

The Big Think: Cybersecurity – The Threat From Within

A&O Shearman on

Welcome to The Big Think – the thought leadership series from Allen & Overy’s global Employment practice. Its mission is to think big, think forward and think without boundaries. Members of our international team put...more

Robinson+Cole Data Privacy + Security Insider

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

Poyner Spruill LLP

“Bring Your Own Device” To Work Programs: Regulatory and Legal Risks and How To Minimize Them

Poyner Spruill LLP on

If you’ve ever left your mobile phone on an airplane, in a restaurant, or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as your...more

Troutman Pepper

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

Troutman Pepper on

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

Jaburg Wilk

BYOD Can Be A Four-Letter Word

Jaburg Wilk on

So your employee wants to use his new iPhone5S to respond to work emails while on vacation. As an employer, you’re thrilled. You don’t have to pay for the technology (or the data plan), but your employee is now accessible...more

Carlton Fields

Risky Business: "Bring-Your-Own-Device" And Your Company

Carlton Fields on

Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more

Pillsbury - Global Sourcing Practice

BYOD Trends and Best Practices: Part 3 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 3 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will address developing BYOD trends and best practices. Please check out Part 1 and 2 of this 3-part series addressing employee and employer concerns,...more

NAVEX

Getting It In Writing - The Art of Policy Management

NAVEX on

Inside this e-Book: - Company Descriptions - Policy Management: From Dilbert to Reality - The Art of Managing Policy Exception Requests - From NAVEX Global: Business Case: The ROI of Policy Management -...more

Pillsbury - Global Sourcing Practice

It's 2013. Do You Know Where Your BYOD Policies Are?

Imagine you grab your phone only to find it locked, with all of your applications, pictures, and contacts permanently deleted. Imagine your employer's IT department remote-wiped your phone because they mistakenly believed it...more

Snell & Wilmer

Mitigating Theft of Trade Secrets

Snell & Wilmer on

In today’s complex global economy, competition is fierce. For many businesses, trade secrets are their single most important and valuable asset, and strong protection of that asset is paramount. In the same regard, trade...more

Fenwick & West LLP

Safeguards against Data Security Breaches (Part One)

Fenwick & West LLP on

With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more

JD Supra Perspectives

Corporate Law Report: Managing Cyber Risks, BYOD, Obama's NLRB Crisis, Iran Sanctions, and More

JD Supra Perspectives on

Our latest Corporate Law Report looks at: - top ways to manage cyber risks in the workplace; - the growing trend of employees bringing their own electronic devices (BYOD) to work; - new reporting requirements as a result...more

Morrison & Foerster LLP

Bring Your Own Hassles -- How to manage the explosion of employee-owned devices

Time was, organizations provided employees with the computer hardware they needed for their jobs. Today, many workers prefer to use the same device for business and personal use. Organizations have signed on to accommodate...more

29 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide