Bring Your Own Device Data Protection

Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues... more +
Bring Your Own Device (BYOD) typically refers to the practice of allowing employees to access business email and company files from personal smartphones and laptops. There are significant data protection issues associated with BYOD. Many companies draft formalized BYOD policies to address these concerns, but there are still inherent risks associated with the practice. less -
News & Analysis as of

Smartphones & Smart Employers: Device Policies Enable Businesses To Safely Embrace Technology

Employers who don’t think they need a bring-your-own-device policy should consider this: Nearly 70 percent of millennials and 31 percent of baby boomers surveyed last year by TrackVia admitted to using their own devices and...more

HR Has More Important Things To Do

On Tuesday, Salon published an article titled “5 Ways Corporate HR Departments Monitor Your Movements – Even When You’re Not Working.” Because we’re always interested in the subject of employee monitoring, we eagerly clicked...more

The Internet of Things

In this Presentation: - Internet of Things - definition - But what is it all about? - But not just that... - The IoT market in figures... - Beecham Research - view of the World - The Connected...more

New Rulings Address BYOD Policies

Bring Your Own Device (BYOD) policies are on the rise, meaning that an increasing number of employees are using their personal devices to access company servers. But, with the prevalence of a new employment trend inevitably...more

“Bring Your Own Device” To Work Programs: Regulatory and Legal Risks and How To Minimize Them

If you’ve ever left your mobile phone on an airplane, in a restaurant, or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as your...more

How to Mitigate Compliance Risks with BYOD - EndNotes February 2015

I?f you have ever left your mobile phone on an airplane, in a restaurant or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as...more

Is Privacy Dead?

If the Internet and social media have not already killed privacy, Big Data and the Internet of Things (IoT) are likely to finish the job. As 91 percent of American consumers agreed in a recent Pew Research Center survey,...more

The BYOD Question - Sound advice on ‘Bring Your Own Device’ to work.

The “Bring Your Own Device” to work movement, or BYOD, has drastically changed today’s workplace. In a recent study, Cisco Systems found that 95 percent of the 600 companies surveyed permitted the use of personal devices at...more

This Party is BYOD, Part One

The word you’re looking for is “ubiquity.” It describes the near-total assimilation of technology into every aspect of our lives. The words “cell phone” are falling by the wayside as the words “smart phone” take their place,...more

Every Employer Faces BYOD Risks, Even Those Who Don't Allow It

Bring your own device (BYOD) policies have become an established business practice, with over half of the respondents in a recent survey reporting they are permitted to access corporate information and services with their...more

2014 Ediscovery Trends: Survey Results

With about four weeks remaining in the year, let the “2014 reflections” bombardment begin! You know what I am talking about — the close of the calendar year prompts oodles of nostalgic news stories recalling the biggest...more

Encryption and Securing BYO Devices at the Heart of Massachusetts AG $100,000 Settlement

The Massachusetts Attorney General announced Friday that her office had reached a settlement with Beth Israel Deaconess Medical Center (BIDMC) surrounding a 2012 data breach in which a physician’s unencrypted personal laptop...more

Employment Law Commentary -- Volume 26, Issue 9, September 2014 -- California Court Warns Employers Trying To Pass The Buck...

California employers hoping to save money through a bring your-own device (BYOD) program should think twice about that objective, based on a recent California appellate decision. In Cochran v. Schwan’s Home Service, the...more

Texting For Business On Personal Cell Phones

In the last few years, many industries and companies have been coming to grips with the problems posed by employees using their personal phones, tablets, or laptops for business uses. The recognition of the need to develop...more

BYOD and the Auto Industry: A Marriage Made in Heaven or Hell?

By all accounts, Bring Your Own Device (BYOD) to work is catching on like wildfire because virtually every American worker holds a device in the palm of their hand which is faster and more powerful than some of the most...more

On whose dime? Court rules California employers must pay employee cell phone expenses

In a world where mobile devices outnumber both personal computers and humans, it’s not surprising that we use our mobile devices for both business and pleasure. In a published opinion sure to wreak havoc with workplace bring...more

Bring Your Own Device Doesn't Mean Bring in Security Breach

Bring-Your-Own-Device (“BYOD”) policies have been picking up steam because of increased productivity, improved communications, and the need for employees to work remotely. However, when implementing any BYOD policy there are...more

Blurring The Line Between Yours And Mine: Best Practices For Bring Your Own Device Policies

Let’s face it: bring-your-own-device (BYOD) situations are here to stay. With the ubiquity of employees having and using smartphones and tablets – devices that have more capacity and processing power than desktop computers...more

Protecting Trade Secrets in the Digital Age Requires Extra Vigilance

Technology allows businesses around the world to easily communicate and access data, increasing both business opportunities and worker productivity. However, this same technology also makes corporate data more vulnerable to...more

Human Error Biggest Threat to Patient Data Security and Privacy

Human error remains the biggest threat to healthcare data privacy, according to the latest study on patient privacy and data security by the Ponemon Institute. Healthcare organizations also continue to struggle with...more

EXPANDED – BYOD: Where the Employee and the Enterprise Intersect

BYOD Yesterday And Today - The proliferation of bring your own device programs – or “BYOD” as it is commonly referred – has drastically changed today’s corporate workplace environment. Employees are availing themselves...more

BYOD: Where the Employee and the Enterprise Intersect

The proliferation of bring your own device programs – or “BYOD” as it is commonly referred – has drastically changed today’s corporate workplace environment. Employees are availing themselves of smart phones, tablets, and...more

Bring Your Own Device Policies: What Employers Need to Know

Employers that allow their employees to use their own mobile devices for work purposes should have in place well-considered Bring Your Own Device (BYOD) policies.Effective employer BYOD policies anticipate and address a range...more

Allowing Employees To Connect Own Devices Has Risks, Benefits

Smartphones and tablets are everywhere. People are spending more and more money to have the latest smart devices, and employers are struggling to keep up with employees’ demands for the latest technology. Originally...more

BYOD: Policy Considerations for Employers in the Age of Personal Devices

Employees who use personal smart phones, PDAs, tablets, laptops and other electronic devices to connect to the employer’s computer network are fast becoming more of a rule than an exception. Today’s employees are often...more

53 Results
|
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×