Data Governance for the BYOD Age
Corporate Compliance and Enforcement Hot Topics with IBM VP, Una Dean
Digital Workplace Issues
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Safeguards against Data Security Breaches (Part One)
Corporate Law Report: Managing Cyber Risks, BYOD, Obama's NLRB Crisis, Iran Sanctions, and More
Secureworks issues an annual Incident Response Report that is very helpful in obtaining information on what types of incidents are occurring in order to become more resistant to threats. The 2020 IR Report was recently...more
In our Quarterly Review, we bring you important UK developments relating to Business Crime, Investigations and Regulatory Enforcement from the last three months. Please contact us if you would like to discuss any of these...more
As the coronavirus (“COVID-19”) pandemic continues, cyber criminals have upped the intensity of their COVID-19-themed cyber-attacks designed to exploit the current crisis. With financial institutions representing primary...more
In a short span of time, we have gone from thinking about the virus as a distant concern to working remotely from home as we have been asked to help flatten the curve by social distancing. We are daily bombarded with news and...more
Malicious cyber actors have been exploiting the COVID-19 crisis, warn the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and the UK’s National Cyber Security Centre (NCSC) in a joint...more
With the spread of the novel coronavirus (COVID-19), cybersecurity criminals and scammers are ramping up their efforts to target vulnerable employers and workforces. The FTC announced today that since January they have...more
COVID-19 has forced many businesses to quickly accommodate a significant portion of their employees working remotely. Having an employee base working away from established offices creates security vulnerabilities that many...more
With cases of the Novel Coronavirus (COVID-19) emerging in nearly every state, many businesses are taking swift action in an effort to curb its spread. Teleworking, “remote working,” or simply “working from home,” is a...more
At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more
Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more
The EU’s General Data Protection Regulation (GDPR), which went into effect in May 2018, requires companies to implement appropriate security measures when handling personal data....more
1: Accommodation in the Workplace - OVERVIEW - Employers have a duty to accommodate employees’ needs based on those grounds protected under federal and provincial human rights legislation. All employers are required...more
BYOD, or “Bring Your Own Device,” is an umbrella term for policies that employers have concerning your smart phone, tablet, or laptop. Essentially, the questions that BYOD policies seek to answer are these: (1) Who owns...more
Please join us for this complimentary presentation on cutting-edge employment law issues. California and federal employment laws are constantly developing and evolving so it is essential for human resource professionals and...more
A compilation of time-sensitive and trending legal and regulatory issues that general counsels and business leaders should be aware of in 2016. ...more
Tennessee has joined other states in formally approving lawyers’ cloud-storage of client-confidential data. The Board of Professional Responsibility (“BOPR”) held that lawyers ethically may use cloud storage for...more
One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more