Bring Your Own Device

Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues... more +
Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues associated with BYOD. Many companies draft formalized BYOD policies to address these concerns, but there are still inherent risks associated with the practice. less -
News & Analysis as of

Employment Law Navigator – Week in Review: July 2016 #3

The combined topics of Facebook and race were in the news last week. A Pennsylvania judge ruled that an employee’s personal Facebook page laced with race-based stereotypes could be used to impeach her in her lawsuit, which...more

Pokémon NO: New App Creates Risks For Employers

Seyfarth Synopsis: Pokémon GO’s popularity is at a fever pitch. However, the game poses several risks for employers including software security, privacy and workplace safety concerns. Your employees may be on a quest...more

BYOD Risks under HIPAA – Does Your HIPAA Compliance Program Adequately Address the Ever Increasing Use of Portable Electronic...

Many U.S. employers are now allowing employees to use their own personal handheld devices and laptop computers for work-related purposes. As the age of employer-provided devices is coming to an end and “bring your own device”...more

2016 Executive Employer Survey Report

The fifth annual report examines the legal, economic and social issues having the greatest impact on the workplace, based on survey responses from more than 800 in-house counsel, human resources professionals and C-suite...more

New Federal Trade Secret Statute Requires Important Updates To Contracts And Policies

With the recent passage of the Defense of Trade Secrets Act (DTSA), businesses are welcoming the many benefits the statute brings, including federal jurisdiction, robust equitable relief, and the ability to recover...more

What a Long Strange Trip It’s Been: E-Discovery Travel Guide Prepares Legal Teams for Adventure

The e-discovery process is definitely a trip. With each new matter comes new challenges, variables, data types, and key players—both inside and outside of your organization. And like a road trip, it can be a nightmare or a...more

Mobile Device Privacy Considerations for Employers

The use of mobile devices in the workplace, including cell phones, tablets, and other devices, has generated significant risks for employers, both in terms of data security and of litigation strategy. Access to these devices...more

Defend Trade Secrets Act of 2016 Heading to White House: What You Should Know Now

Congress has finally passed the anticipated Defend Trade Secrets Act of 2016 (DTSA). The bill, which is now on its way to the White House and is expected to be signed by President Obama, will be effective immediately once it...more

Steps Every Startup Should Take to Protect its Intellectual Property

Many startup entrepreneurs are not aware of California’s laws around the ownership of intellectual property. And for most, the concepts for products or services are the life-blood of a company’s operations and future....more

Swipe Left to Avoid Liability: Policing Dating Apps in the Workplace

According to a 2015 survey, nearly two-thirds of people in the United States and over 2 billion people worldwide own smartphones. For some smartphone users, their phones are their only avenue of access to the Internet....more

Top Considerations When Building BYOD Policies

In a recent article, my Kroll Ontrack colleague Vikas Pall wrote about the growing concerns over bring your own device (BYOD) policies. Today’s employees integrate their personal and professional lives, and the use of...more

The Perils of BYOD Policies

Over the holidays, many employees are out of the office on family vacations or otherwise using their time off. Many employers rely on employees' use of their own personal electronic devices to keep up with what is going on in...more

Legal Issues Business Leaders Need to Know in 2016

A compilation of time-sensitive and trending legal and regulatory issues that general counsels and business leaders should be aware of in 2016. ...more

Protecting Company Relationships and Information Upon an Employee Departure

Learn how your company can prepare to act quickly and strategically to protect important relationships, information and trade secrets at the time that a key employee leaves. This webinar will review the latest developments in...more

In Drafting Company-Issued Device And BYOD Policies, Don’t Forget The Wage And Hour Issues.

I’ve been holding my breath waiting for the decision by the U.S. District Court for the Northern District of Chicago in the Allen v. City of Chicago overtime collective action before giving you a blog post on this case. The...more

European Competition Law Newsletter – October 2015

On 14 September 2015, an individual (Nigel Snee) was sentenced by a UK court to six months of imprisonment, suspended for 12 months, for committing the criminal “cartel offence”. He was also ordered to do 120 hours of...more

TN Ethics Opinion Approves Lawyers’ Cloud Storage of Client Data

Tennessee has joined other states in formally approving lawyers’ cloud-storage of client-confidential data. The Board of Professional Responsibility (“BOPR”) held that lawyers ethically may use cloud storage for...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

Gavel to Gavel: Filling data security gaps

Sound data security programs are not only structured, but populated. Managers provide active oversight of employee access to and usage of data. Proper management can help avoid certain often-­-overlooked ...more

OCIE to Conduct More Cybersecurity Exams

This week the SEC’s Office of Compliance Inspections and Examinations (“OCIE”) announced a second-round of cybersecurity examinations, continuing its initiatives on the issue. The move follows the SEC’s: March 2014 roundtable...more

eWorkplace Policies Restricting Employees’ Acceptable Use of Technology, Social Media & The Cloud

I. OVERVIEW – THE MODERN LANDSCAPE - A. Physical Conduct PLUS Digital Activity - Traditional concerns for employers have included: conduct leading to liability to third-parties; “frolic and detour” or other...more

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs

An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more

Be Alert Asia Pacific: Employment Law Newsletter: Top Tips for Employers: Cyber Risks and Fraud

Cyber risk is becoming a growing concern amongst businesses and institutions. Data breaches and hacking have been problematic among some sectors, predominantly financial services, for some time. These risks are now often...more

Smartphones & Smart Employers: Device Policies Enable Businesses To Safely Embrace Technology

Employers who don’t think they need a bring-your-own-device policy should consider this: Nearly 70 percent of millennials and 31 percent of baby boomers surveyed last year by TrackVia admitted to using their own devices and...more

156 Results
|
View per page
Page: of 7
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×