News & Analysis as of

Bring Your Own Device (BYOD) Data Security

ArentFox Schiff

Bring Your Own Device Policies: A Strategic Guide for Regulated Industries

ArentFox Schiff on

In the era of technology-driven workplaces, Bring Your Own Device (BYOD) policies have emerged as a significant trend. A BYOD policy allows employees to use their personal devices, such as smartphones, for work purposes,...more

Epiq

BYOD in 2023: Regular Evaluation Can Help Reduce Risk

Epiq on

Is it time to revisit your organization’s Bring Your Own Device (BYOD) policies? The answer to this question is subjective, but doing so can be beneficial as the workforce and productivity behaviors change. Having a BYOD...more

Fisher Phillips

5-Step Plan for Employers to Defeat Text Message ‘Smishing’ Scams

Fisher Phillips on

Have you received a text from a random number in the last few days? Perhaps the text looks quite obviously suspicious, but it could pass as legitimate – especially if you are distracted or multitasking while scrolling through...more

Reveal

What is Shadow IT and Why Your Legal Team Should Be Concerned

Reveal on

Before the COVID-19 Pandemic, legal technology writers like myself, wrote about BYOD (an acronym for Bring Your Own Device) policies and how they affect the eDiscovery process. But since March 2020 and the great migration...more

Reveal

There Are More Challenges in Managing Discovery in Healthcare Than You Probably Realize

Reveal on

A few months ago on this blog, I wrote about using Artificial Intelligence (AI) to keep up with the “alphabet soup” of compliance. An important area to address from a compliance standpoint is health data and at least two of...more

Fisher Phillips

One Year Later: How the Evolving Work-from-Home Climate Prompts Reminders for Technology Best Practices

Fisher Phillips on

Perhaps no COVID-19 phenomenon will have a more lasting impact than the virtual office. Many employers recently marked the first anniversary of the decision to ask their employees to work from home in an effort to combat the...more

Health Care Compliance Association (HCCA)

Security Threats Soar From Nation-State Bad Actors as the New Year Gets Underway

Report on Patient Privacy 18, no. 1 (January 2021) - Security threats to health care entities will continue to escalate in 2021, as bad actors with significant capabilities target pandemic-weary organizations still...more

Robinson+Cole Data Privacy + Security Insider

Secureworks 2020 Incident Response Report Confirms Increased Vulnerabilities with At Home Workers During Pandemic

Secureworks issues an annual Incident Response Report that is very helpful in obtaining information on what types of incidents are occurring in order to become more resistant to threats. The 2020 IR Report was recently...more

Association of Certified E-Discovery...

[Virtual Event] ACEDS Wisconsin Chapter: Returning to Business as Usual – What It Means for IG and Your E-Discovery - August 13th,...

As the nation continues to struggle with our new COVID-19 realities, it is evident that what will come next is hugely uncertain. “Normal” will likely look very different for the majority of the population, and this includes...more

Seyfarth Shaw LLP

Normalizing the Abnormal—Protecting Trade Secrets in a Post-COVID-19 World

Seyfarth Shaw LLP on

On April 16, 2020, the White House issued its “Guidelines for Opening Up America Again,” and several states have begun a slow process of emerging from the shutdown....more

BakerHostetler

Key COVID-19 Considerations for U.S. Discovery and Information Governance

BakerHostetler on

Many businesses have remote work and bring-your-own-device policies that cover access to company systems and information from personal devices. ...more

Epiq

When a Deal Goes Wrong, Possession is Not Nine-Tenths of the Law

Epiq on

The ways that businesses communicate have changed a great deal over the past twenty years. In the good ol’ days, most communicative dealings happened in a prestigious boardroom or over the phone, with no record of exactly...more

Miles & Stockbridge P.C.

Employees Are a Gatekeeper to Effective Data Security

Data security and privacy concerns have become one of the top issues keeping business leaders up at night. According to the Ponemon Institute’s 2018 study regarding the cost of data breaches, data breaches are increasingly...more

Baker Donelson

BYOD Programs: Ensuring the Savings are Worth the Risks

Baker Donelson on

Many employers are moving towards a "Bring Your Own Device" (BYOD) program, in which employees are allowed to connect their own personal cell phones, iPads, and laptops to the employer's network and systems. ...more

Epiq

BYOD Challenges

Epiq on

If you are like most, you probably have 4-5 different chat applications on your phone to talk to friends and family members.  Dad only likes to text via SMS, brother Peter only uses Facebook Messenger, Aunty Bridgette can...more

Jackson Lewis P.C.

Cost And Benefit Analysis Of Bring Your Own Device Programs

Jackson Lewis P.C. on

An increasing number of companies have adopted Bring Your Own Device (“BYOD”) programs. Under a BYOD program, companies permit employees to connect their personal devices (e.g. laptops, smartphones, and tablets) to the...more

Dechert LLP

OCIE Publishes Risk Alert on the Use of Electronic Messaging by Investment Advisers and Employees

Dechert LLP on

The U.S. Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) issued a National Exam Program Risk Alert on December 14, 2018 concerning the use of electronic messaging by registered...more

Clark Hill PLC

Crafting "Bring Your Own Device" ("BYOD") Policies to Protect Your Company Data and Ensure Compliance with the Law

Clark Hill PLC on

It’s hard to believe that just over a decade ago, the modern touchscreen smartphone was first introduced. Amidst the “oos” and “ahs” of the crowd, Steve Jobs unveiled the revolutionary Apple iPhone on June 29, 2007. The...more

Jackson Lewis P.C.

New FTC Report Makes Security Recommendations To The Mobile Device Industry

Jackson Lewis P.C. on

Securing data held by mobile devices is largely reliant upon technology, and a recent report by the Federal Trade Commission (“FTC”) takes aim at how that technology can be both improved and better utilized. The report,...more

Association of Certified E-Discovery...

Growing Business Use of “Chat Apps” Poses Information Risk for Corporate Legal Departments

A 2017 survey of business professionals worldwide found that the average business professional uses 9.4 software apps for work purposes. Nearly half of the respondents said they use apps that are not sanctioned by their...more

Kelley Drye & Warren LLP

Your Employee is Leaving…. How Do You Safeguard Your Company’s IP?

It is a fact: employees leave. According to the Bureau of Labor Statistics, the average worker currently holds ten different jobs before age forty. Because employee transitions are inevitable, businesses must prepare to...more

Searcy Denney Scarola Barnhart & Shipley

BYOD – Another reasonable basis for discovery about discovery

I still remember typewriters. Heck, I still remember carbon paper, mimeographs and bag phones. Would a company, “back in the day”, have ever asked an employee, “hey, we need you to bring your own typewriter, desk,...more

Patterson Belknap Webb & Tyler LLP

Pokémon GO Exposes Risks of Bring-Your-Own-Device (BYOD) Policies

There’s no denying it: Pokémon GO is a phenomenon. The smartphone game, in which players use their mobile device camera and GPS to capture, battle, and train virtual creatures, was released in the United States on July...more

Parker Poe Adams & Bernstein LLP

Mobile Device Privacy Considerations for Employers

The use of mobile devices in the workplace, including cell phones, tablets, and other devices, has generated significant risks for employers, both in terms of data security and of litigation strategy. Access to these devices...more

Smith Anderson

Protecting Company Relationships and Information Upon an Employee Departure

Smith Anderson on

Learn how your company can prepare to act quickly and strategically to protect important relationships, information and trade secrets at the time that a key employee leaves. This webinar will review the latest developments in...more

30 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide