News & Analysis as of

Confidential Information Mobile Devices

Woods Rogers

What's the Tea in L&E? Employee Devices: What is #NSFW?

Woods Rogers on

What’s the Tea in L&E is a video series focused on the latest trends and updates in labor and employment law. In this short video, Woods Rogers L&E attorneys Leah Stiegler and Emily Kendall Chowhan discuss what content is...more

TransPerfect Legal

Three Strategies to Prevent Departing Employees from Absconding with Trade Secrets and Other Confidential Business Information

TransPerfect Legal on

One of the biggest threats to modern corporations involves departing employees who take confidential business information (CBI) and/or trade secrets with them prior to or upon their departure. Indeed, the misappropriation of...more

K2 Integrity

Romance Scams Could Result In Risks For Organizations And Employees

K2 Integrity on

While romance might be viewed as a personal matter, an employee falling for a romance scam can have a direct impact on an organization’s bottom line. Not only could their performance suffer, but a criminal may try to steal...more

AEON Law

Patent Poetry: Employee Confidentiality Agreements Can Be Enforced without New Consideration

AEON Law on

A federal court in Pennsylvania has held that a confidentiality agreement signed five months after an employee was hired can be enforced after the employee leaves even if the employee received no consideration other than...more

Willcox & Savage

BYOD Policies: A Great Idea When Properly Executed

Willcox & Savage on

In today’s highly connected, tech-obsessed world, personal electronic devices (“devices”), including tablet computers and mobile phones, are seemingly ubiquitous. Increasingly, employers are capitalizing on this phenomenon by...more

Goodwin

Litigation Insights - July 2021

Goodwin on

FOREWORD - On behalf of the new and expanding Goodwin London litigation team I am delighted to welcome you to our first ever ‘Litigation Insights’: a series of quarterly updates on important and interesting developments...more

Butler Snow LLP

Has Your Company's BYOD Policy Withstood to the Test of Time?

Butler Snow LLP on

Many companies have implemented Bring Your Own Device (“BYOD”) policies. For some, it has been years since they were put in place. Has your policy withstood the test of time? Employees are using their devices differently than...more

Robinson+Cole Data Privacy + Security Insider

A Value Add to Employee Security Education: Mobile Apps

While we have been talking about the very important message of educating employees about data security, I find that giving employees tips about their personal data security keeps them interested and engaged during education...more

Gray Reed

An Employer’s Spooky Interpretation of its Bring Your Own Device (BYOD) Policy

Gray Reed on

Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more

Stange Law Firm, PC

The Problems With Using Personal Devices In A Law Firm

Stange Law Firm, PC on

With technology today, there are lots of electronic devices law firm employees can use to communicate and to complete legal work. From desktops, laptops, cell phones and tablets, all of these devices can be used to perform...more

Benesch

U.S. Customs and Border Protection Updates Directive on Searches of Electronic Devices

Benesch on

U.S. Customs and Border Protection (“CBP”) recently updated its 2009 directive pertaining to border searches of electronic devices. The Supreme Court of the United States has deemed warrantless searches by CBP legal and...more

Robinson+Cole Data Privacy + Security Insider

Customs and Border Patrol Issue New Rules for Searching Devices at Borders

We previously reported that U.S. Customs and Border Patrol (CBP) have been stopping U.S. citizens at the borders of the United States and demanding passwords for access to mobile devices. According to CBP, 19,051 mobile...more

Seyfarth Shaw LLP

Searches of Devices at the U.S. Border

Seyfarth Shaw LLP on

Seyfarth Synopsis: Although longstanding policy of U.S. Customs and Border Protection authorizes searches of electronic devices in the possession of travelers arriving in the United States, recent reports of such searches...more

Dickinson Wright

Crossing the Border with Electronics - Helpful Tips and Pitfalls to Avoid

Dickinson Wright on

International travelers have been reporting that cell phones, computers, and other communication devices are being seized by Officers of the U.S. Customs and Border Protection (“USCBP”) branch of the U.S. Department of...more

Baker Donelson

Eight Keys to Securing Portable Devices

Baker Donelson on

Securing physical worksites and workspaces is by now old hat. We all know file cabinets should be locked, worksites secured and personal access to information monitored. Securing portable devices, however, often receives less...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #74 – What to Do About Customs and Border Patrol

There has been lots of talk about the ripple effects of the Trump travel ban. But here’s a new twist I hadn’t heard before—U.S. Customs and Border Control (CBP) agents are detaining U.S. citizens and requiring them to unlock...more

Snell & Wilmer

Five Workplace New Year’s Resolutions for 2017

Snell & Wilmer on

With the New Year comes the annual tradition of making New Year’s Resolutions—along with the annual tradition of breaking those resolutions by the second week of January. Even if last year’s Christmas tree survived longer...more

Orrick, Herrington & Sutcliffe LLP

When Employees Leave With Your Secrets

Recently I shared the podium with an FBI agent who was asked what frustrated him the most when trying to help businesses with trade secret theft. His answer was a surprise: they fire the guy too fast! He explained that when...more

Baker Donelson

Pokémon in the Workplace: Does Your Company Need a Policy?

Baker Donelson on

It seems crazy to have to tailor office policy because of the advent of a new phone app, doesn't it? But this is exactly what is transpiring due to the overwhelming popularity of Pokémon Go, an app for your phone that allows...more

Burr & Forman

Burr Alert: Is it Time to "Upgrade" your Cell Phone Policies?

Burr & Forman on

Are your cell phone policies as outdated as your original iPhone? Cell phones have become common place in today’s workplace and employers must consider the legal risks they pose. Thus, if you haven’t revisited your policies...more

McAfee & Taft

Graceful exits

McAfee & Taft on

No one likes layoffs. The person getting fired may be depressed and fearful about his or her job loss, and the person doing the firing usually feels rotten about being the bearer of bad news. In a layoff situation, an exit...more

Buchalter

Technology Industry Newsletter - January 2016

Buchalter on

As we begin the new year, it is a good time to reflect on the emerging trends in technology that present opportunities to be explored by entrepreneurs who are considering starting new businesses and growing existing...more

Smith Anderson

Protecting Company Relationships and Information Upon an Employee Departure

Smith Anderson on

Learn how your company can prepare to act quickly and strategically to protect important relationships, information and trade secrets at the time that a key employee leaves. This webinar will review the latest developments in...more

Seyfarth Shaw LLP

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

Seyfarth Shaw LLP on

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

Foley & Lardner LLP

Recent Enforcement Shows the Importance of Encrypting Mobile Devices Containing Protected Health Information

Foley & Lardner LLP on

With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more

29 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide