News & Analysis as of

Bring Your Own Device (BYOD) Data Protection Personally Identifiable Information

Dechert LLP

BYOD Risks under HIPAA – Does Your HIPAA Compliance Program Adequately Address the Ever Increasing Use of Portable Electronic...

Dechert LLP on

Many U.S. employers are now allowing employees to use their own personal handheld devices and laptop computers for work-related purposes. As the age of employer-provided devices is coming to an end and “bring your own device”...more

Robinson+Cole Data Privacy + Security Insider

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

Zelle  LLP

HR Has More Important Things To Do

Zelle LLP on

On Tuesday, Salon published an article titled “5 Ways Corporate HR Departments Monitor Your Movements – Even When You’re Not Working.” Because we’re always interested in the subject of employee monitoring, we eagerly clicked...more

Davis Wright Tremaine LLP

Encryption and Securing BYO Devices at the Heart of Massachusetts AG $100,000 Settlement

The Massachusetts Attorney General announced Friday that her office had reached a settlement with Beth Israel Deaconess Medical Center (BIDMC) surrounding a 2012 data breach in which a physician’s unencrypted personal laptop...more

Mintz - Privacy & Cybersecurity Viewpoints

Privacy Monday - July 1st, 2013

Privacy Tidbits to start your week - The Risk-Benefit Analysis of BYOD: As we have written in the past, the proliferation of the “bring your own device” (BYOD) trend is a high-wire balancing act for IT and...more

Fenwick & West LLP

Safeguards against Data Security Breaches (Part One)

Fenwick & West LLP on

With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide