Bring Your Own Device Cybersecurity

Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues... more +
Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues associated with BYOD. Many companies draft formalized BYOD policies to address these concerns, but there are still inherent risks associated with the practice. less -
News & Analysis as of

From Sedona to Georgetown to New York—What’s Fashionable in eDiscovery This Year?

It’s that time of year, when bench, bar, vendors, and clients think big eDiscovery thoughts. They go to The Sedona Conference (which is not in Sedona), Georgetown Law’s Advanced eDiscovery Institute (which is not at...more

Bring Your Own Challenges

From reliable surveys and less dependable anecdotes in most major markets, including the UK and the US, opinions point to the almost inevitable expansion of BYOD – Bring Your Own Device – as a cost-saving model for employers....more

Protecting Trade Secrets in the Digital Age Requires Extra Vigilance

Technology allows businesses around the world to easily communicate and access data, increasing both business opportunities and worker productivity. However, this same technology also makes corporate data more vulnerable to...more

Poetic Justice - 2013 Wrap Up (Part 1 of 2)

This is the time of year to anxiously look forward to all that is anticipated to come in 2014. But it is also the time to look back at all that has happened in 2013. Rather than simply give you links to all of the stimulating...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately  [Video]

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

BYOD Can Be A Four-Letter Word

So your employee wants to use his new iPhone5S to respond to work emails while on vacation. As an employer, you’re thrilled. You don’t have to pay for the technology (or the data plan), but your employee is now accessible...more

Risky Business: "Bring-Your-Own-Device" And Your Company

Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more

Security Is Key To "BYOD" Policies

In the last several years, there has been an explosion in the number of workers who use their own personal mobile devices to perform work functions (commonly referred to as “Bring Your Own Device” or “BYOD”)....more

NIST Issues Mobile Device Security Guidelines

On June 25, the National Institute of Standards and Technology (NIST) released a mobile device management guide to help federal agencies centrally manage the security of mobile devices....more

BYOD Trends and Best Practices: Part 3 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 3 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will address developing BYOD trends and best practices. Please check out Part 1 and 2 of this 3-part series addressing employee and employer concerns,...more

Getting It In Writing - The Art of Policy Management

Inside this e-Book: - Company Descriptions - Policy Management: From Dilbert to Reality - The Art of Managing Policy Exception Requests - From NAVEX Global: Business Case: The ROI of Policy Management -...more

It's 2013. Do You Know Where Your BYOD Policies Are?

Imagine you grab your phone only to find it locked, with all of your applications, pictures, and contacts permanently deleted. Imagine your employer's IT department remote-wiped your phone because they mistakenly believed it...more

Mitigating Theft of Trade Secrets

In today’s complex global economy, competition is fierce. For many businesses, trade secrets are their single most important and valuable asset, and strong protection of that asset is paramount. In the same regard, trade...more

Feeling Cyber-Secure: Avoiding The Devastating Hacker

Pro-actively drafting cybersecurity policies and protocols is like doing a will for yourself, or an employee manual for your company. The thought process is that there is nothing imminently pressing that requires me to think...more

Safeguards against Data Security Breaches (Part One) [Video]

With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more

#Edchat Followup: Legal Issues For BYOD And 1:1 Programs In Schools

Each Tuesday the #Edchat hashtag brings together educators from across the globe to discuss education-related topics on Twitter. Last week one of the questions on #Edchat was “How do we train educators to teach in programs...more

Corporate Law Report: Managing Cyber Risks, BYOD, Obama's NLRB Crisis, Iran Sanctions, and More [Video]

Our latest Corporate Law Report looks at: - top ways to manage cyber risks in the workplace; - the growing trend of employees bringing their own electronic devices (BYOD) to work; - new reporting requirements as a result...more

Bring Your Own Hassles -- How to manage the explosion of employee-owned devices

Time was, organizations provided employees with the computer hardware they needed for their jobs. Today, many workers prefer to use the same device for business and personal use. Organizations have signed on to accommodate...more

Healthcare Organizations are Suffering from Serious Data Security Ills

The diagnosis is in, and its not good. Unless an aggressive treatment plan is put in place, the prognosis will be just as bleak. On December 6, 2012, the Ponemon Institute issued its Third Annual Benchmark Study on...more

Health Information Security Is No Game...Except When It Is

On Sept. 17, 2012, HHS announced its fourth HIPAA settlement of the year, reaching a resolution agreement with Massachusetts Eye and Ear Infirmary and Massachusetts Eye and Ear Associates, Inc. (collectively, “MEEI”) for $1.5...more

Mobile Problems? The Bring Your Own Device to Work Movement

As I settle in at a table in my favorite cafe near my home, large coffee in hand, I check my work emails from my personal smart phone as I pull out my personal laptop and dial into my company servers providing access to all...more

"Bring Your Own Device" Brings its Own Challenges

The consumerisation of IT is the growing trend for information technology to emerge first in the consumer market and then drive change in the industry generally. One of the most dramatic impacts of this shift is a rise in...more

Take 5: Views You Can Use - January 2012

The first two months of the year are a good time for employers to do a quick "tech check" to make sure that they have a firm grip on some important current issues. Here are five points that you can count off on one hand, as...more

24 Results
|
View per page
Page: of 1