Bring Your Own Device

Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues... more +
Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues associated with BYOD. Many companies draft formalized BYOD policies to address these concerns, but there are still inherent risks associated with the practice. less -
News & Analysis as of

Top 10 Issues for Employers, Issue #6: Balancing BYOD Programs with Expectations of Privacy at Work

This is the sixth instalment in our Top 10 Issues for Employers series. OVERVIEW - The workplace practice of bring your own device (BYOD) has hit the mainstream as more and more employees use their own mobile...more

Understanding the DNS Attacks: Convenience v Security

How Did This Attack Happen? While the attack is still under investigation, initial reports indicate that it was part of a genre of DDoS that infects Internet of Things (IoT) devices, such as webcams, DVRs, routers, smart TVs,...more

Cell Phones at the Workplace: Protecting Employee Safety

Seyfarth Synopsis: As OSHA’s enforcement relating to employee cell phone use gains more notoriety, it can be expected that it will have a significant collateral impact on law enforcement at all levels to address this hazard....more

Worker Privacy and Security in an Internet of Things

The Internet of Things (IoT) refers to the phenomenon of everyday objects like phones, refrigerators, and cars connecting to the internet in order to send and receive data. While the IoT promises a future of convenience and...more

Bring Your Own Device (BYOD) – Be Smart

At the dawn of portable electronic devices, they were primarily work-related productivity tools. Often, employers would purchase (or lease) devices and distribute them to their need-to-have employee base. It’s not so long...more

Survey Shows Employees Top Security Risk for Companies

A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more

Hong Kong's Privacy Commissioner addresses privacy compliance and best practice for BYOD

Following the publication of industry-specific BYOD guidelines such as those issued by the Hong Kong Association of Banks (the HKAB Guidelines), the trend towards Bring Your Own Device (BYOD) has come to the attention of Hong...more

The Big Think: Cybersecurity – The Threat From Within

Welcome to The Big Think – the thought leadership series from Allen & Overy’s global Employment practice. Its mission is to think big, think forward and think without boundaries. Members of our international team put...more

Pokémon, No!

There is something a little bit different about going back to school this year: your school is filled with Pokémon, awaiting capture by your students, employees, and visitors. By now, you are probably familiar with Pokémon...more

Pokémon GO Exposes Risks of Bring-Your-Own-Device (BYOD) Policies

There’s no denying it: Pokémon GO is a phenomenon. The smartphone game, in which players use their mobile device camera and GPS to capture, battle, and train virtual creatures, was released in the United States on July...more

Pokémon – A Wake-up Call to Employers on the Importance of Electronic Use Policies

As my 11-year-old begs to borrow my mobile device to catch a Pokémon, I become one more Generation X member unwittingly joining the millions of millennials participating in an augmented reality game. For employers, Pokémon...more

Warning Issued to Businesses About Pokemon GO App

The International Association of Information Technology Asset Managers (IAITAM) has issued a warning to businesses alerting them to the risks posed by employees downloading the Pokemon GO app on a company issued phone....more

We Traced The Trade Secret Leak … It’s Coming From Inside The Business

Seyfarth Synopsis: Protecting trade secrets from employee theft requires more than using an NDA when onboarding new employees. If businesses want to protect their confidential information, they need to take a cradle-to-grave...more

Pokémon Go Back to Work!

Pokémon Go has taken the United States and the rest of the world by storm, with an estimated 75 million downloads in the first three weeks since its release. For the uninitiated, Pokémon Go is an augmented reality game where...more

Employment Law Navigator – Week in Review: July 2016 #3

The combined topics of Facebook and race were in the news last week. A Pennsylvania judge ruled that an employee’s personal Facebook page laced with race-based stereotypes could be used to impeach her in her lawsuit, which...more

Pokémon NO: New App Creates Risks For Employers

Seyfarth Synopsis: Pokémon GO’s popularity is at a fever pitch. However, the game poses several risks for employers including software security, privacy and workplace safety concerns. Your employees may be on a quest...more

BYOD Risks under HIPAA – Does Your HIPAA Compliance Program Adequately Address the Ever Increasing Use of Portable Electronic...

Many U.S. employers are now allowing employees to use their own personal handheld devices and laptop computers for work-related purposes. As the age of employer-provided devices is coming to an end and “bring your own device”...more

2016 Executive Employer Survey Report

The fifth annual report examines the legal, economic and social issues having the greatest impact on the workplace, based on survey responses from more than 800 in-house counsel, human resources professionals and C-suite...more

New Federal Trade Secret Statute Requires Important Updates To Contracts And Policies

With the recent passage of the Defense of Trade Secrets Act (DTSA), businesses are welcoming the many benefits the statute brings, including federal jurisdiction, robust equitable relief, and the ability to recover...more

What a Long Strange Trip It’s Been: E-Discovery Travel Guide Prepares Legal Teams for Adventure

The e-discovery process is definitely a trip. With each new matter comes new challenges, variables, data types, and key players—both inside and outside of your organization. And like a road trip, it can be a nightmare or a...more

Mobile Device Privacy Considerations for Employers

The use of mobile devices in the workplace, including cell phones, tablets, and other devices, has generated significant risks for employers, both in terms of data security and of litigation strategy. Access to these devices...more

Defend Trade Secrets Act of 2016 Heading to White House: What You Should Know Now

Congress has finally passed the anticipated Defend Trade Secrets Act of 2016 (DTSA). The bill, which is now on its way to the White House and is expected to be signed by President Obama, will be effective immediately once it...more

Steps Every Startup Should Take to Protect its Intellectual Property

Many startup entrepreneurs are not aware of California’s laws around the ownership of intellectual property. And for most, the concepts for products or services are the life-blood of a company’s operations and future....more

Swipe Left to Avoid Liability: Policing Dating Apps in the Workplace

According to a 2015 survey, nearly two-thirds of people in the United States and over 2 billion people worldwide own smartphones. For some smartphone users, their phones are their only avenue of access to the Internet....more

The Perils of BYOD Policies

Over the holidays, many employees are out of the office on family vacations or otherwise using their time off. Many employers rely on employees' use of their own personal electronic devices to keep up with what is going on in...more

165 Results
|
View per page
Page: of 7
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×