News & Analysis as of

Bring Your Own Device (BYOD) Information Technology

CloudNine

Efficient Text and Chat Data Discovery Starts with Information Governance (IG)

CloudNine on

When it comes to ensuring that data is preserved and available for litigation, investigations, or government inquiries, it all starts with establishing and codifying clear data governance policies and procedures....more

A&O Shearman

Overcoming eDiscovery-related chat data challenges: Part 2 - prior to an investigation

A&O Shearman on

This post provides some tips from eDiscovery experts on what to consider ahead of any investigation commencing. Consider ease of compliance when procuring chat software The pandemic accelerated the adoption of chat and...more

Holland & Knight LLP

Contractors: Direct Employees to Remove TikTok from Personal Cell Phones, Other Devices

Holland & Knight LLP on

Holland & Knight previously noted an Office of Management and Budget (OMB) memorandum prohibiting the use of TikTok on information technology used by federal agencies and contractors. (See Holland & Knight's previous blog...more

Morrison & Foerster LLP - Government...

When Does The So-Called TikTok Ban Really Apply To Contractors And Their Employees?

In the extensive chatter since the Federal Acquisition Regulatory Council (“FAR Council”) published an interim rule on the new Federal Acquisition Regulation (FAR) 52.204-27, “Prohibition on a ByteDance Covered Application,”...more

Wiley Rein LLP

FAR Council Publishes Interim Rule Banning TikTok on Contractor Devices

Wiley Rein LLP on

WHAT: The Federal Acquisition Regulation (FAR) Council published an interim rule implementing the No TikTok on Government Devices Act that was included in the Consolidated Appropriations Act, 2023 (Pub. L. No. 117-328) and...more

Reveal

What is Shadow IT and Why Your Legal Team Should Be Concerned

Reveal on

Before the COVID-19 Pandemic, legal technology writers like myself, wrote about BYOD (an acronym for Bring Your Own Device) policies and how they affect the eDiscovery process. But since March 2020 and the great migration...more

Association of Certified E-Discovery...

[Webinar] Dealing with the Growing Risks of the ‘Shadow IT’ Environment - August 11th, 1:00 pm - 2:00 pm BST

The ever-expanding information technology environment is one of the biggest challenges for IT, e-discovery and digital forensics practitioners today. It takes just seconds for anyone to open a webpage and download a new tool...more

Health Care Compliance Association (HCCA)

Security Threats Soar From Nation-State Bad Actors as the New Year Gets Underway

Report on Patient Privacy 18, no. 1 (January 2021) - Security threats to health care entities will continue to escalate in 2021, as bad actors with significant capabilities target pandemic-weary organizations still...more

Reveal

The Best of “eDiscovery Blues” Legal Comic Strip in 2020

Reveal on

Humor isn’t necessary in eDiscovery, but it sure helps. Which is why Ipro has created our own comic strip, eDiscovery Blues™ and included them with articles highlighting insights and best-practices across the legal technology...more

Robinson+Cole Data Privacy + Security Insider

Secureworks 2020 Incident Response Report Confirms Increased Vulnerabilities with At Home Workers During Pandemic

Secureworks issues an annual Incident Response Report that is very helpful in obtaining information on what types of incidents are occurring in order to become more resistant to threats. The 2020 IR Report was recently...more

Reveal

3 Challenges Corporate Legal Teams Face With BYOD

Reveal on

Today’s eDiscovery Blues comic highlights several challenges In-House legal teams might face when working with data in the face of litigation, starting with the sinking feeling that comes when you ask yourself, “Is the I.T....more

K&L Gates LLP

COVID-19: System Security With a Remote Workforce

K&L Gates LLP on

COVID-19 has forced many businesses to quickly accommodate a significant portion of their employees working remotely. Having an employee base working away from established offices creates security vulnerabilities that many...more

Robinson+Cole Data Privacy + Security Insider

A Value Add to Employee Security Education: Mobile Apps

While we have been talking about the very important message of educating employees about data security, I find that giving employees tips about their personal data security keeps them interested and engaged during education...more

Hogan Lovells

The UK Cyber Essentials Requirements for IT Infrastructure provides a window into GDPR expectations for data security requirements

Hogan Lovells on

The EU’s General Data Protection Regulation (GDPR), which went into effect in May 2018, requires companies to implement appropriate security measures when handling personal data....more

Robinson+Cole Data Privacy + Security Insider

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

McNees Wallace & Nurick LLC

Smartphones & Smart Employers: Device Policies Enable Businesses To Safely Embrace Technology

Employers who don’t think they need a bring-your-own-device policy should consider this: Nearly 70 percent of millennials and 31 percent of baby boomers surveyed last year by TrackVia admitted to using their own devices and...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide