News & Analysis as of

Bring Your Own Device (BYOD) Mobile Device Management

“Opening Clauses” and the GDPR – It Might Not Be As Easy As We Thought

by Seyfarth Shaw LLP on

The General Data Protection Regulation is coming, and along with it, a significant expectation of increased harmonization in the privacy rules across the EU. Considering the 60-plus articles which directly impose obligations...more

The right to disconnect: a new right for French employees?

A new law, called El Khomri law, passed on August 8th, 2016 in France providing a right to disconnect for employees. Such right is entered into force on January 1st, 2017 - According to the law, it belongs to the...more

Pokémon Go Back to Work!

by Littler on

Pokémon Go has taken the United States and the rest of the world by storm, with an estimated 75 million downloads in the first three weeks since its release. For the uninitiated, Pokémon Go is an augmented reality game where...more

BYOD Risks under HIPAA – Does Your HIPAA Compliance Program Adequately Address the Ever Increasing Use of Portable Electronic...

by Dechert LLP on

Many U.S. employers are now allowing employees to use their own personal handheld devices and laptop computers for work-related purposes. As the age of employer-provided devices is coming to an end and “bring your own device”...more

Mobile Device Privacy Considerations for Employers

The use of mobile devices in the workplace, including cell phones, tablets, and other devices, has generated significant risks for employers, both in terms of data security and of litigation strategy. Access to these devices...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

by Seyfarth Shaw LLP on

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

Smartphones & Smart Employers: Device Policies Enable Businesses To Safely Embrace Technology

Employers who don’t think they need a bring-your-own-device policy should consider this: Nearly 70 percent of millennials and 31 percent of baby boomers surveyed last year by TrackVia admitted to using their own devices and...more

Information Governance - 2013 in Review

by BakerHostetler on

2013 was the year that the term "Information Governance" or "IG" began to be widely used outside of technical circles. Despite that fact, the concept of IG is not well understood. Gartner, a premier information advisory...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

by Pepper Hamilton LLP on

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately

by Pepper Hamilton LLP on

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

Model Policy For Purchase: Acceptable Use Of Technology

by Franczek Radelet P.C. on

The use of technology in school districts continues to increase and evolve. Districts are using technology to enhance curriculum, replace traditional text books, and communicate with students, parents, and the community. ...more

Risks of Bring Your Own Device

by Scott & Scott, LLP on

Scott & Scott, LLP attorney, Brian Von Hatten, lists some of the risks companies face when their workforce wants to bring their own devices to work....more

BYOD Can Be A Four-Letter Word

by Jaburg Wilk on

So your employee wants to use his new iPhone5S to respond to work emails while on vacation. As an employer, you’re thrilled. You don’t have to pay for the technology (or the data plan), but your employee is now accessible...more

Risky Business: "Bring-Your-Own-Device" And Your Company

by Carlton Fields on

Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more

Too Much of A Good Thing? Mind the Privacy Implications of iOS 7's New MDM Capabilities in Your BYOD Workforce

In addition to the consumer hoopla over iOS 7, companies managing BYOD programs also have reason to rejoice. As reported on CIO.com, iOS 7 brings about a new level of control for companies through expanded app-level MDM...more

16 Results
|
View per page
Page: of 1
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.