Bring Your Own Device Data Protection

Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues... more +
Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues associated with BYOD. Many companies draft formalized BYOD policies to address these concerns, but there are still inherent risks associated with the practice. less -
News & Analysis as of

Week in Review - April 14, 2014

With technological innovations appearing daily in the workplace, employers must continually evaluate how best to proactively prepare for and respond to these changes. As you do your planning, you might want to check out the...more

BYOD for 501(c)s: Pros and Perils of "Bring Your Own Device"

In this presentation: - Current Issues - Overview of BYOD Policies - Integrating BYOD in Your Workforce - Lessons from the Front Lines - Putting It All Together - Takeaways and...more

Bring Your Own Device Policies: What Employers Need to Know

Employers that allow their employees to use their own mobile devices for work purposes should have in place well-considered Bring Your Own Device (BYOD) policies.Effective employer BYOD policies anticipate and address a range...more

Bring-Your-Own-Device Programs: Steps to Minimize Nonprofits' Legal Risks

Nonprofit organizations are increasingly allowing their employees to use their own mobile devices to access, view, download, and transmit work-related materials. While these bring-your-own-device (BYOD) programs may enhance...more

Allowing Employees To Connect Own Devices Has Risks, Benefits

Smartphones and tablets are everywhere. People are spending more and more money to have the latest smart devices, and employers are struggling to keep up with employees’ demands for the latest technology. Originally...more

BYOD: Policy Considerations for Employers in the Age of Personal Devices

Employees who use personal smart phones, PDAs, tablets, laptops and other electronic devices to connect to the employer’s computer network are fast becoming more of a rule than an exception. Today’s employees are often...more

14 Global Workplace Trends For 2014 (Infographic)

With January in full swing and your first new year’s resolution already broken, here’s one goal you can keep: stay abreast of developments to get ahead of the curve, beginning with the top 14 trends impacting multinational...more

14 Global Workplace Trends for 2014

With January in full swing and your first new year’s resolution already broken, here’s one goal you can keep: stay abreast of developments to get ahead of the curve, beginning with the top 14 trends impacting multinational...more

Information Governance - 2013 in Review

2013 was the year that the term "Information Governance" or "IG" began to be widely used outside of technical circles. Despite that fact, the concept of IG is not well understood. Gartner, a premier information advisory...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

BYOD Can Be A Four-Letter Word

So your employee wants to use his new iPhone5S to respond to work emails while on vacation. As an employer, you’re thrilled. You don’t have to pay for the technology (or the data plan), but your employee is now accessible...more

The “Bring Your Own Device” Boon Comes at the Expense of Security. How Can You Protect Your Business?

Bring your own device policies in the workplace aren’t novel. Companies have experimented and implemented policies requiring employees to use their own personal phones, computers and tablets in the scope of their employment...more

BYOD: Party Essentials for Corporations and Employees

The need to stay connected these days applies not only to our social universe, but also to our business universe. The result is a trend known as “bring your own device” or “BYOD.” BYOD is the practice where employees use...more

Risky Business: "Bring-Your-Own-Device" And Your Company

Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more

Privacy Monday - July 1st, 2013

Privacy Tidbits to start your week - The Risk-Benefit Analysis of BYOD: As we have written in the past, the proliferation of the “bring your own device” (BYOD) trend is a high-wire balancing act for IT and...more

BYOD Trends and Best Practices: Part 3 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 3 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will address developing BYOD trends and best practices. Please check out Part 1 and 2 of this 3-part series addressing employee and employer concerns,...more

Employer BYOD Concerns: Part 2 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 2 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will discuss employer BYOD concerns. Check out Part 1 to learn more about employee interests; Part 3 will present developing trends and suggest best...more

Getting It In Writing - The Art of Policy Management

Inside this e-Book: - Company Descriptions - Policy Management: From Dilbert to Reality - The Art of Managing Policy Exception Requests - From NAVEX Global: Business Case: The ROI of Policy Management -...more

It's 2013. Do You Know Where Your BYOD Policies Are?

Imagine you grab your phone only to find it locked, with all of your applications, pictures, and contacts permanently deleted. Imagine your employer's IT department remote-wiped your phone because they mistakenly believed it...more

Global Sourcing Group -- Spring 2013

Every year, we survey Morrison & Foerster’s Global Sourcing Group lawyers around the world to create a snapshot of the current state of the global outsourcing market and to identify emerging trends that are likely to shape...more

Mitigating Theft of Trade Secrets

In today’s complex global economy, competition is fierce. For many businesses, trade secrets are their single most important and valuable asset, and strong protection of that asset is paramount. In the same regard, trade...more

Personal Smartphones: A Ticking HIPAA/HITECH Time Bomb?

In this brave new world of health information privacy, many industry experts and healthcare organizations have emphasized the need to secure portable electronic devices such as laptops, issued to employees. But a recently...more

BYOD & The Board Of Directors — Part One: A Risk To Reckon With?

The information security concerns relating to employees using their own devices for work (such as smart phones, netbooks and laptops) are a hot topic. Although “bring your own device” or BYOD is here to stay, the practice of...more

Safeguards against Data Security Breaches (Part One) [Video]

With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more

The BYOD Policy: From The Yugo To The Cadillac

Your employees want to be able to use their own iPhones or Android devices at work. Angry Birds on the Blackberry is just not the same. This trend is being referred to as Bring Your Own Device or BYOD....more

36 Results
|
View per page
Page: of 2