Confidential Information Bring Your Own Device

News & Analysis as of

Top Considerations When Building BYOD Policies

In a recent article, my Kroll Ontrack colleague Vikas Pall wrote about the growing concerns over bring your own device (BYOD) policies. Today’s employees integrate their personal and professional lives, and the use of...more

The Perils of BYOD Policies

Over the holidays, many employees are out of the office on family vacations or otherwise using their time off. Many employers rely on employees' use of their own personal electronic devices to keep up with what is going on in...more

Protecting Company Relationships and Information Upon an Employee Departure

Learn how your company can prepare to act quickly and strategically to protect important relationships, information and trade secrets at the time that a key employee leaves. This webinar will review the latest developments in...more

Who is Stealing Your Trade Secrets? An Overview of Key Threats

Every company has trade secrets – for some, they may be special manufacturing processes, for other organizations, trade secrets could include product formulae, customer lists, software code or marketing strategies. The more...more

TN Ethics Opinion Approves Lawyers’ Cloud Storage of Client Data

Tennessee has joined other states in formally approving lawyers’ cloud-storage of client-confidential data. The Board of Professional Responsibility (“BOPR”) held that lawyers ethically may use cloud storage for...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs

An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more

This Party is BYOD, Part Two

Another pitfall that might arise in a BYOD context pertains to the nature of the information on the device itself. In addition to proprietary information of the company, certain other information is subject to additional...more

This Party is BYOD, Part One

The word you’re looking for is “ubiquity.” It describes the near-total assimilation of technology into every aspect of our lives. The words “cell phone” are falling by the wayside as the words “smart phone” take their place,...more

Mingling Employee Smartphone and Company Work Product Can be Dangerous

Many people will receive new smartphones as presents this month. Think carefully as an employer before allowing your employees to mingle work and pleasure on the same phone....more

Consent is Key for BYOD

With Black Friday behind us and holiday shopping still heating up, ‘tis the season when many of us will acquire new gadgets and technology to power our digitally-enhanced lives. For businesses, this time of year also means...more

Will California’s “Kill Switch” Law Kill An Employer’s Ability To Protect Sensitive Company Information?

Will California’s “Kill Switch” Law Kill An Employer’s Ability To Protect Sensitive Company Information? In this digital age, smartphone technology has become essential and ubiquitous to business operations. But the...more

On whose dime? Court rules California employers must pay employee cell phone expenses

In a world where mobile devices outnumber both personal computers and humans, it’s not surprising that we use our mobile devices for both business and pleasure. In a published opinion sure to wreak havoc with workplace bring...more

Blurring The Line Between Yours And Mine: Best Practices For Bring Your Own Device Policies

Let’s face it: bring-your-own-device (BYOD) situations are here to stay. With the ubiquity of employees having and using smartphones and tablets – devices that have more capacity and processing power than desktop computers...more

Bring Your Own Device Policies: What Employers Need to Know

Employers that allow their employees to use their own mobile devices for work purposes should have in place well-considered Bring Your Own Device (BYOD) policies.Effective employer BYOD policies anticipate and address a range...more

Nothing Personal: How to be Smart About Your BYOD Workplace Policy (And Why It Matters!)

You might think people are making more out of BYOD than it deserves, that it is a relatively benign issue. Alas, you’d be wrong....more

Social Media: Protecting Trade Secrets and Proprietary Information

The ability of employees to steal trade secrets, reveal customer lists, and expose proprietary business information with the press of a button is frightening. In over 85 percent of trade-secret cases, the alleged...more

17 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×