Bring Your Own Device Data Breach

Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues... more +
Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues associated with BYOD. Many companies draft formalized BYOD policies to address these concerns, but there are still inherent risks associated with the practice. less -
News & Analysis as of

Encryption and Securing BYO Devices at the Heart of Massachusetts AG $100,000 Settlement

The Massachusetts Attorney General announced Friday that her office had reached a settlement with Beth Israel Deaconess Medical Center (BIDMC) surrounding a 2012 data breach in which a physician’s unencrypted personal laptop...more

Bring Your Own Device Doesn't Mean Bring in Security Breach

Bring-Your-Own-Device (“BYOD”) policies have been picking up steam because of increased productivity, improved communications, and the need for employees to work remotely. However, when implementing any BYOD policy there are...more

Human Error Biggest Threat to Patient Data Security and Privacy

Human error remains the biggest threat to healthcare data privacy, according to the latest study on patient privacy and data security by the Ponemon Institute. Healthcare organizations also continue to struggle with...more

BYOD: Where the Employee and the Enterprise Intersect

The proliferation of bring your own device programs – or “BYOD” as it is commonly referred – has drastically changed today’s corporate workplace environment. Employees are availing themselves of smart phones, tablets, and...more

Information Governance - 2013 in Review

2013 was the year that the term "Information Governance" or "IG" began to be widely used outside of technical circles. Despite that fact, the concept of IG is not well understood. Gartner, a premier information advisory...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately  [Video]

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

Employer BYOD Concerns: Part 2 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 2 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will discuss employer BYOD concerns. Check out Part 1 to learn more about employee interests; Part 3 will present developing trends and suggest best...more

Getting It In Writing - The Art of Policy Management

Inside this e-Book: - Company Descriptions - Policy Management: From Dilbert to Reality - The Art of Managing Policy Exception Requests - From NAVEX Global: Business Case: The ROI of Policy Management -...more

Global Sourcing Group -- Spring 2013

Every year, we survey Morrison & Foerster’s Global Sourcing Group lawyers around the world to create a snapshot of the current state of the global outsourcing market and to identify emerging trends that are likely to shape...more

Feeling Cyber-Secure: Avoiding The Devastating Hacker

Pro-actively drafting cybersecurity policies and protocols is like doing a will for yourself, or an employee manual for your company. The thought process is that there is nothing imminently pressing that requires me to think...more

Safeguards against Data Security Breaches (Part One) [Video]

With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more

Health Care E-Note - December 2012

In This Issue: - Health Care Data Breaches Becoming Major Concern - Hospitals, Doctors Giving Patients Access Through Web Portals - Number of Concierge Doctors Increases 30 Percent in 2012 - Hospitals Battle for...more

Healthcare Organizations are Suffering from Serious Data Security Ills

The diagnosis is in, and its not good. Unless an aggressive treatment plan is put in place, the prognosis will be just as bleak. On December 6, 2012, the Ponemon Institute issued its Third Annual Benchmark Study on...more

Health Information Security Is No Game...Except When It Is

On Sept. 17, 2012, HHS announced its fourth HIPAA settlement of the year, reaching a resolution agreement with Massachusetts Eye and Ear Infirmary and Massachusetts Eye and Ear Associates, Inc. (collectively, “MEEI”) for $1.5...more

15 Results
|
View per page
Page: of 1