News & Analysis as of

Data Breach Mobile Devices Smartphones

ArentFox Schiff

Bring Your Own Device Policies: A Strategic Guide for Regulated Industries

ArentFox Schiff on

In the era of technology-driven workplaces, Bring Your Own Device (BYOD) policies have emerged as a significant trend. A BYOD policy allows employees to use their personal devices, such as smartphones, for work purposes,...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2018 #3

Robinson & Cole LLP on

Verizon's Protected Health Information Data Breach Report Concludes that Insiders Are Greatest Threat to Health Care Entities - Verizon recently issued its Protected Health Information Data Breach Report, which is always...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - December 2017 #3

Robinson & Cole LLP on

Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more

Robinson+Cole Data Privacy + Security Insider

Data Breach Involving CloudPets “Smart” Toys Raises Internet-of-Things Security Concerns

On February 27, 2017, news reports disclosed a major security breach involving Spiral Toys, the seller of the CloudPets brand of internet-connected stuffed animals. The Bluetooth-connected CloudPets toys allow users to...more

Poyner Spruill LLP

“Bring Your Own Device” To Work Programs: Regulatory and Legal Risks and How To Minimize Them

Poyner Spruill LLP on

If you’ve ever left your mobile phone on an airplane, in a restaurant, or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as your...more

Latham & Watkins LLP

Enforcement of the Personal Data Protection Act in Singapore

Latham & Watkins LLP on

The Personal Data Protection Commission (the “Commission’) was established in January 2013 to implement and enforce The Personal Data Protection Act 2012 (“PDPA”). The PDPA fully came into force on 2 July 2014. So far, the...more

BakerHostetler

2014 Mobile Privacy and Security Trends and What to Look for in 2015

BakerHostetler on

Most analysts and commentators agree that 2014 was the year mobile reached a tipping point. With over 1 billion mobile smartphones in circulation, 2014 marked the first year that mobile Internet usage surpassed desktop use in...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide