Bring Your Own Device

Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues... more +
Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues associated with BYOD. Many companies draft formalized BYOD policies to address these concerns, but there are still inherent risks associated with the practice. less -
News & Analysis as of

Your Employees Are Probably Doing It, So Have a BYOD Policy

People today can (and do) work from anywhere—connected through the Internet, WiFi, and cloud-based platforms with a variety of mobile devices. This makes preventing confidential and proprietary business information from...more

Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs

An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more

Be Alert Asia Pacific: Employment Law Newsletter: Top Tips for Employers: Cyber Risks and Fraud

Cyber risk is becoming a growing concern amongst businesses and institutions. Data breaches and hacking have been problematic among some sectors, predominantly financial services, for some time. These risks are now often...more

Smartphones & Smart Employers: Device Policies Enable Businesses To Safely Embrace Technology

Employers who don’t think they need a bring-your-own-device policy should consider this: Nearly 70 percent of millennials and 31 percent of baby boomers surveyed last year by TrackVia admitted to using their own devices and...more

HR Has More Important Things To Do

On Tuesday, Salon published an article titled “5 Ways Corporate HR Departments Monitor Your Movements – Even When You’re Not Working.” Because we’re always interested in the subject of employee monitoring, we eagerly clicked...more

Corporate Divorce: Property (Re)Distribution

Who Owns What - Unlike the marital relationship, which hypothetically balances power between spouses, the employment relationship is founded on the central concept of control: it is the employer who dictates the time,...more

Update On Recent And Anticipated Federal Regulatory Developments

Federal white collar exemptions: According to the Department of Labor’s (“DOL”) most recent Semiannual Regulatory Agenda, proposed rules revising the regulations implementing the federal Fair Labor Standards Act (“FLSA”) are...more

The Internet of Things

In this Presentation: - Internet of Things - definition - But what is it all about? - But not just that... - The IoT market in figures... - Beecham Research - view of the World - The Connected...more

Protecting Trade Secrets on Mobile Devices is that Easy and Inexpensive!

When I attended the ABA Legal Tech Show in Chicago a few months ago in the hopes of learning more about legal technology, I was taken aback at just how easy and inexpensive it is for employers to protect trade secrets on...more

E-Discovery Update: When Personal and Work Data Collide

In the modern world, employees routinely receive work-related data on personal mobile devices, such as smartphones and tablets, and access personal data on work-owned devices. ...more

New Rulings Address BYOD Policies

Bring Your Own Device (BYOD) policies are on the rise, meaning that an increasing number of employees are using their personal devices to access company servers. But, with the prevalence of a new employment trend inevitably...more

[Event] Massachusetts Employment Law Summit - May 13, Boston, MA

Employers and their HR departments are faced with a host of new issues and challenges. When you’re not navigating new state, federal, and local laws and making sure systems are in place to comply with them, you’re busy...more

BYOD: Five Things To Consider When Creating Your Policy

“BYOD” or “bring your own device” (also known as the “consumerization of IT”) is a fact of life in today’s workplace. BYOD refers to the practice of using personally owned devices—like smartphones, tablets, and laptops—for...more

Seven Training Imperatives to Address Your Biggest Cyber Security Risk: Employee Behavior

One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more

Bring Your Own Device (Everywhere): Legal and Practical Considerations for International BYOD Programs

The cross-use of mobile devices for personal and professional purposes, commonly referred to as “Bring Your Own Device” or “BYOD”, is a relatively recent phenomenon that has created a host of legal and practical challenges...more

Effective cybersecurity: 8 questions for you and your team

Cybersecurity has become a top-tier risk for US and multinational organizations. It is only a matter of time before a determined hacker will penetrate your organization’s system and successfully exfiltrate some data. (Indeed,...more

What Recent Case Law Can Teach About BYOD Workplaces

Bring Your Own Device (“BYOD”) is a movement that is changing the IT landscape of workplaces. In a BYOD workplace, employees use their own mobile device—smartphones, tablets, laptops, etc.—for both work and personal use. ...more

ICYMI: Privacy in the Workplace Webinar

Our 2015 monthly Privacy Issues Wednesday webinar series continued this month with Jennifer Rubin and Gauri Punjabi’s Privacy in the Workplace presentation. Jen and Gauri discussed the latest statutory and common law...more

“Bring Your Own Device” To Work Programs: Regulatory and Legal Risks and How To Minimize Them

If you’ve ever left your mobile phone on an airplane, in a restaurant, or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as your...more

Shorts on Long Term Care - February 2015

In this issue: - Document Retention in a Long Term Care Facility - Medicare RAC Program Improvements Delayed Until 2016 - “Bring Your Own Device” To Work Programs - NLRB Upends Legality of Employer Email...more

How to Mitigate Compliance Risks with BYOD - EndNotes February 2015

I?f you have ever left your mobile phone on an airplane, in a restaurant or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as...more

End Notes Newsletter February 2015 - News for North Carolina’s Hospice and Palliative Care Community

In this issue: - Gear Up for Increased CMS Scrutiny of Hospice Services for Assisted Living Facility Residents - Happy New Year from the DC District Court - Companionship Exemption Lives On!! - DEA Rules On...more

Is Privacy Dead?

If the Internet and social media have not already killed privacy, Big Data and the Internet of Things (IoT) are likely to finish the job. As 91 percent of American consumers agreed in a recent Pew Research Center survey,...more

The BYOD Question - Sound advice on ‘Bring Your Own Device’ to work.

The “Bring Your Own Device” to work movement, or BYOD, has drastically changed today’s workplace. In a recent study, Cisco Systems found that 95 percent of the 600 companies surveyed permitted the use of personal devices at...more

This Party is BYOD, Part Two

Another pitfall that might arise in a BYOD context pertains to the nature of the information on the device itself. In addition to proprietary information of the company, certain other information is subject to additional...more

147 Results
|
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×