Bring Your Own Device

Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues... more +
Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues associated with BYOD. Many companies draft formalized BYOD policies to address these concerns, but there are still inherent risks associated with the practice. less -
News & Analysis as of

European Competition Law Newsletter – October 2015

On 14 September 2015, an individual (Nigel Snee) was sentenced by a UK court to six months of imprisonment, suspended for 12 months, for committing the criminal “cartel offence”. He was also ordered to do 120 hours of...more

Who is Stealing Your Trade Secrets? An Overview of Key Threats

Every company has trade secrets – for some, they may be special manufacturing processes, for other organizations, trade secrets could include product formulae, customer lists, software code or marketing strategies. The more...more

TN Ethics Opinion Approves Lawyers’ Cloud Storage of Client Data

Tennessee has joined other states in formally approving lawyers’ cloud-storage of client-confidential data. The Board of Professional Responsibility (“BOPR”) held that lawyers ethically may use cloud storage for...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

Gavel to Gavel: Filling data security gaps

Sound data security programs are not only structured, but populated. Managers provide active oversight of employee access to and usage of data. Proper management can help avoid certain often-­-overlooked ...more

OCIE to Conduct More Cybersecurity Exams

This week the SEC’s Office of Compliance Inspections and Examinations (“OCIE”) announced a second-round of cybersecurity examinations, continuing its initiatives on the issue. The move follows the SEC’s: March 2014 roundtable...more

eWorkplace Policies Restricting Employees’ Acceptable Use of Technology, Social Media & The Cloud

I. OVERVIEW – THE MODERN LANDSCAPE - A. Physical Conduct PLUS Digital Activity - Traditional concerns for employers have included: conduct leading to liability to third-parties; “frolic and detour” or other...more

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

Your Employees Are Probably Doing It, So Have a BYOD Policy

People today can (and do) work from anywhere—connected through the Internet, WiFi, and cloud-based platforms with a variety of mobile devices. This makes preventing confidential and proprietary business information from...more

Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs

An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more

Be Alert Asia Pacific: Employment Law Newsletter: Top Tips for Employers: Cyber Risks and Fraud

Cyber risk is becoming a growing concern amongst businesses and institutions. Data breaches and hacking have been problematic among some sectors, predominantly financial services, for some time. These risks are now often...more

Smartphones & Smart Employers: Device Policies Enable Businesses To Safely Embrace Technology

Employers who don’t think they need a bring-your-own-device policy should consider this: Nearly 70 percent of millennials and 31 percent of baby boomers surveyed last year by TrackVia admitted to using their own devices and...more

HR Has More Important Things To Do

On Tuesday, Salon published an article titled “5 Ways Corporate HR Departments Monitor Your Movements – Even When You’re Not Working.” Because we’re always interested in the subject of employee monitoring, we eagerly clicked...more

Corporate Divorce: Property (Re)Distribution

Who Owns What - Unlike the marital relationship, which hypothetically balances power between spouses, the employment relationship is founded on the central concept of control: it is the employer who dictates the time,...more

Update On Recent And Anticipated Federal Regulatory Developments

Federal white collar exemptions: According to the Department of Labor’s (“DOL”) most recent Semiannual Regulatory Agenda, proposed rules revising the regulations implementing the federal Fair Labor Standards Act (“FLSA”) are...more

The Internet of Things

In this Presentation: - Internet of Things - definition - But what is it all about? - But not just that... - The IoT market in figures... - Beecham Research - view of the World - The Connected...more

Protecting Trade Secrets on Mobile Devices is that Easy and Inexpensive!

When I attended the ABA Legal Tech Show in Chicago a few months ago in the hopes of learning more about legal technology, I was taken aback at just how easy and inexpensive it is for employers to protect trade secrets on...more

E-Discovery Update: When Personal and Work Data Collide

In the modern world, employees routinely receive work-related data on personal mobile devices, such as smartphones and tablets, and access personal data on work-owned devices. ...more

New Rulings Address BYOD Policies

Bring Your Own Device (BYOD) policies are on the rise, meaning that an increasing number of employees are using their personal devices to access company servers. But, with the prevalence of a new employment trend inevitably...more

[Event] Massachusetts Employment Law Summit - May 13, Boston, MA

Employers and their HR departments are faced with a host of new issues and challenges. When you’re not navigating new state, federal, and local laws and making sure systems are in place to comply with them, you’re busy...more

BYOD: Five Things To Consider When Creating Your Policy

“BYOD” or “bring your own device” (also known as the “consumerization of IT”) is a fact of life in today’s workplace. BYOD refers to the practice of using personally owned devices—like smartphones, tablets, and laptops—for...more

Seven Training Imperatives to Address Your Biggest Cyber Security Risk: Employee Behavior

One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more

Bring Your Own Device (Everywhere): Legal and Practical Considerations for International BYOD Programs

The cross-use of mobile devices for personal and professional purposes, commonly referred to as “Bring Your Own Device” or “BYOD”, is a relatively recent phenomenon that has created a host of legal and practical challenges...more

Effective cybersecurity: 8 questions for you and your team

Cybersecurity has become a top-tier risk for US and multinational organizations. It is only a matter of time before a determined hacker will penetrate your organization’s system and successfully exfiltrate some data. (Indeed,...more

What Recent Case Law Can Teach About BYOD Workplaces

Bring Your Own Device (“BYOD”) is a movement that is changing the IT landscape of workplaces. In a BYOD workplace, employees use their own mobile device—smartphones, tablets, laptops, etc.—for both work and personal use. ...more

155 Results
View per page
Page: of 7

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.