News & Analysis as of

Data Breach Bring Your Own Device (BYOD)

ArentFox Schiff

Bring Your Own Device Policies: A Strategic Guide for Regulated Industries

ArentFox Schiff on

In the era of technology-driven workplaces, Bring Your Own Device (BYOD) policies have emerged as a significant trend. A BYOD policy allows employees to use their personal devices, such as smartphones, for work purposes,...more

Health Care Compliance Association (HCCA)

Security Threats Soar From Nation-State Bad Actors as the New Year Gets Underway

Report on Patient Privacy 18, no. 1 (January 2021) - Security threats to health care entities will continue to escalate in 2021, as bad actors with significant capabilities target pandemic-weary organizations still...more

Robinson+Cole Data Privacy + Security Insider

Secureworks 2020 Incident Response Report Confirms Increased Vulnerabilities with At Home Workers During Pandemic

Secureworks issues an annual Incident Response Report that is very helpful in obtaining information on what types of incidents are occurring in order to become more resistant to threats. The 2020 IR Report was recently...more

Kramer Levin Naftalis & Frankel LLP

Cybersecurity: the SEC Provides Guidance on Well-Known and Emerging Best Practices

At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more

Miles & Stockbridge P.C.

Employees Are a Gatekeeper to Effective Data Security

Data security and privacy concerns have become one of the top issues keeping business leaders up at night. According to the Ponemon Institute’s 2018 study regarding the cost of data breaches, data breaches are increasingly...more

BCLP

How Employers Can Become Experts at Data Breaches: Lost Laptops and USBs

BCLP on

A large portion of the data breaches that occur each year involve human resource related information. Bryan Cave has put together a multi-part series to help human resource managers understand, prepare for, and react to, a...more

Morgan Lewis

Navigating the IoT Workplace Quagmire

Morgan Lewis on

The Internet of Things (IoT) promises a societal transformation based on a virtuous circle of constantly improving connectivity, integration, data, intelligence, and automation. One important element of this transformation is...more

Robinson+Cole Data Privacy + Security Insider

Survey Shows Employees Top Security Risk for Companies

A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more

A&O Shearman

The Big Think: Cybersecurity – The Threat From Within

A&O Shearman on

Welcome to The Big Think – the thought leadership series from Allen & Overy’s global Employment practice. Its mission is to think big, think forward and think without boundaries. Members of our international team put...more

Robinson+Cole Data Privacy + Security Insider

Warning Issued to Businesses About Pokemon GO App

The International Association of Information Technology Asset Managers (IAITAM) has issued a warning to businesses alerting them to the risks posed by employees downloading the Pokemon GO app on a company issued phone....more

Dechert LLP

BYOD Risks under HIPAA – Does Your HIPAA Compliance Program Adequately Address the Ever Increasing Use of Portable Electronic...

Dechert LLP on

Many U.S. employers are now allowing employees to use their own personal handheld devices and laptop computers for work-related purposes. As the age of employer-provided devices is coming to an end and “bring your own device”...more

Burr & Forman

TN Ethics Opinion Approves Lawyers’ Cloud Storage of Client Data

Burr & Forman on

Tennessee has joined other states in formally approving lawyers’ cloud-storage of client-confidential data. The Board of Professional Responsibility (“BOPR”) held that lawyers ethically may use cloud storage for...more

Robinson+Cole Data Privacy + Security Insider

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

Poyner Spruill LLP

“Bring Your Own Device” To Work Programs: Regulatory and Legal Risks and How To Minimize Them

Poyner Spruill LLP on

If you’ve ever left your mobile phone on an airplane, in a restaurant, or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as your...more

Davis Wright Tremaine LLP

Encryption and Securing BYO Devices at the Heart of Massachusetts AG $100,000 Settlement

The Massachusetts Attorney General announced Friday that her office had reached a settlement with Beth Israel Deaconess Medical Center (BIDMC) surrounding a 2012 data breach in which a physician’s unencrypted personal laptop...more

Foley & Lardner LLP

Bring Your Own Device Doesn't Mean Bring in Security Breach

Foley & Lardner LLP on

Bring-Your-Own-Device (“BYOD”) policies have been picking up steam because of increased productivity, improved communications, and the need for employees to work remotely. However, when implementing any BYOD policy there are...more

Benesch

BYOD: Where the Employee and the Enterprise Intersect

Benesch on

The proliferation of bring your own device programs – or “BYOD” as it is commonly referred – has drastically changed today’s corporate workplace environment. Employees are availing themselves of smart phones, tablets, and...more

BakerHostetler

Information Governance - 2013 in Review

BakerHostetler on

2013 was the year that the term "Information Governance" or "IG" began to be widely used outside of technical circles. Despite that fact, the concept of IG is not well understood. Gartner, a premier information advisory...more

Troutman Pepper

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

Troutman Pepper on

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

Troutman Pepper

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately

Troutman Pepper on

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

Pillsbury - Global Sourcing Practice

Employer BYOD Concerns: Part 2 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 2 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will discuss employer BYOD concerns. Check out Part 1 to learn more about employee interests; Part 3 will present developing trends and suggest best...more

NAVEX

Getting It In Writing - The Art of Policy Management

NAVEX on

Inside this e-Book: - Company Descriptions - Policy Management: From Dilbert to Reality - The Art of Managing Policy Exception Requests - From NAVEX Global: Business Case: The ROI of Policy Management -...more

Morrison & Foerster LLP

Global Sourcing Group -- Spring 2013

Every year, we survey Morrison & Foerster’s Global Sourcing Group lawyers around the world to create a snapshot of the current state of the global outsourcing market and to identify emerging trends that are likely to shape...more

Cozen O'Connor

Feeling Cyber-Secure: Avoiding The Devastating Hacker

Cozen O'Connor on

Pro-actively drafting cybersecurity policies and protocols is like doing a will for yourself, or an employee manual for your company. The thought process is that there is nothing imminently pressing that requires me to think...more

Fenwick & West LLP

Safeguards against Data Security Breaches (Part One)

Fenwick & West LLP on

With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more

27 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide