Confidential Information Bring Your Own Device

News & Analysis as of

Bring Your Own Device (BYOD) – Be Smart

At the dawn of portable electronic devices, they were primarily work-related productivity tools. Often, employers would purchase (or lease) devices and distribute them to their need-to-have employee base. It’s not so long...more

We Traced The Trade Secret Leak … It’s Coming From Inside The Business

Seyfarth Synopsis: Protecting trade secrets from employee theft requires more than using an NDA when onboarding new employees. If businesses want to protect their confidential information, they need to take a cradle-to-grave...more

Defend Trade Secrets Act of 2016 Heading to White House: What You Should Know Now

Congress has finally passed the anticipated Defend Trade Secrets Act of 2016 (DTSA). The bill, which is now on its way to the White House and is expected to be signed by President Obama, will be effective immediately once it...more

The Perils of BYOD Policies

Over the holidays, many employees are out of the office on family vacations or otherwise using their time off. Many employers rely on employees' use of their own personal electronic devices to keep up with what is going on in...more

Protecting Company Relationships and Information Upon an Employee Departure

Learn how your company can prepare to act quickly and strategically to protect important relationships, information and trade secrets at the time that a key employee leaves. This webinar will review the latest developments in...more

TN Ethics Opinion Approves Lawyers’ Cloud Storage of Client Data

Tennessee has joined other states in formally approving lawyers’ cloud-storage of client-confidential data. The Board of Professional Responsibility (“BOPR”) held that lawyers ethically may use cloud storage for...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs

An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more

Mingling Employee Smartphone and Company Work Product Can be Dangerous

Many people will receive new smartphones as presents this month. Think carefully as an employer before allowing your employees to mingle work and pleasure on the same phone....more

Consent is Key for BYOD

With Black Friday behind us and holiday shopping still heating up, ‘tis the season when many of us will acquire new gadgets and technology to power our digitally-enhanced lives. For businesses, this time of year also means...more

Will California’s “Kill Switch” Law Kill An Employer’s Ability To Protect Sensitive Company Information?

Will California’s “Kill Switch” Law Kill An Employer’s Ability To Protect Sensitive Company Information? In this digital age, smartphone technology has become essential and ubiquitous to business operations. But the...more

On whose dime? Court rules California employers must pay employee cell phone expenses

In a world where mobile devices outnumber both personal computers and humans, it’s not surprising that we use our mobile devices for both business and pleasure. In a published opinion sure to wreak havoc with workplace bring...more

Blurring The Line Between Yours And Mine: Best Practices For Bring Your Own Device Policies

Let’s face it: bring-your-own-device (BYOD) situations are here to stay. With the ubiquity of employees having and using smartphones and tablets – devices that have more capacity and processing power than desktop computers...more

Bring Your Own Device Policies: What Employers Need to Know

Employers that allow their employees to use their own mobile devices for work purposes should have in place well-considered Bring Your Own Device (BYOD) policies.Effective employer BYOD policies anticipate and address a range...more

Nothing Personal: How to be Smart About Your BYOD Workplace Policy (And Why It Matters!)

You might think people are making more out of BYOD than it deserves, that it is a relatively benign issue. Alas, you’d be wrong....more

Social Media: Protecting Trade Secrets and Proprietary Information

The ability of employees to steal trade secrets, reveal customer lists, and expose proprietary business information with the press of a button is frightening. In over 85 percent of trade-secret cases, the alleged...more

16 Results
|
View per page
Page: of 1
Cybersecurity

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×