News & Analysis as of

Data Protection Bring Your Own Device (BYOD)

CloudNine

Efficient Text and Chat Data Discovery Starts with Information Governance (IG)

CloudNine on

When it comes to ensuring that data is preserved and available for litigation, investigations, or government inquiries, it all starts with establishing and codifying clear data governance policies and procedures....more

The Volkov Law Group

Practical Steps to Mitigate Electronics Communications Risks: “This is the Way” (Part III of III)

The Volkov Law Group on

I always welcome any chance to use references to The Mandalorian series on Disney (or Ashoka for that matter) in the compliance arena.  My take on the issue of electronic communications and ephemeral messaging is rooted in...more

The Volkov Law Group

Google’s Failure to Preserve Electronic Communications — A Warning to Every Company of a New Reality Surrounding Electronic Data

The Volkov Law Group on

One thing you can count on — change.  Not that there is anything wrong with that, but not to be too dramatic, we are at the precipice of some significant technology trends that will have a profound impact on corporate...more

Foley & Lardner LLP

BYOD to E-Discovery: What Happens When Employees “Scan” and Send Chats of Company Documents Using Their Phones?

Foley & Lardner LLP on

We recently cautioned employers about their confidential information showing up in selfies posted online, but social media is not the only reason employees are taking photos at work. Picture this: An employee quickly...more

Fisher Phillips

5-Step Plan for Employers to Defeat Text Message ‘Smishing’ Scams

Fisher Phillips on

Have you received a text from a random number in the last few days? Perhaps the text looks quite obviously suspicious, but it could pass as legitimate – especially if you are distracted or multitasking while scrolling through...more

Reveal

There Are More Challenges in Managing Discovery in Healthcare Than You Probably Realize

Reveal on

A few months ago on this blog, I wrote about using Artificial Intelligence (AI) to keep up with the “alphabet soup” of compliance. An important area to address from a compliance standpoint is health data and at least two of...more

Association of Certified E-Discovery...

[Webinar] Dealing with the Growing Risks of the ‘Shadow IT’ Environment - August 11th, 1:00 pm - 2:00 pm BST

The ever-expanding information technology environment is one of the biggest challenges for IT, e-discovery and digital forensics practitioners today. It takes just seconds for anyone to open a webpage and download a new tool...more

Fisher Phillips

One Year Later: How the Evolving Work-from-Home Climate Prompts Reminders for Technology Best Practices

Fisher Phillips on

Perhaps no COVID-19 phenomenon will have a more lasting impact than the virtual office. Many employers recently marked the first anniversary of the decision to ask their employees to work from home in an effort to combat the...more

Health Care Compliance Association (HCCA)

Security Threats Soar From Nation-State Bad Actors as the New Year Gets Underway

Report on Patient Privacy 18, no. 1 (January 2021) - Security threats to health care entities will continue to escalate in 2021, as bad actors with significant capabilities target pandemic-weary organizations still...more

Blank Rome LLP

NYDFS Issues New Guidance on COVID-19 Cybersecurity Risks

Blank Rome LLP on

As the coronavirus (“COVID-19”) pandemic continues, cyber criminals have upped the intensity of their COVID-19-themed cyber-attacks designed to exploit the current crisis. With financial institutions representing primary...more

Constangy, Brooks, Smith & Prophete, LLP

Digital Workplace Issues

Our increasingly connected world presents tremendous opportunities for employers as well as considerable confusion and risk. Should you Google a job applicant? Allowing employees to use their own mobile devices for work...more

Seyfarth Shaw LLP

Belonging, Connection, and Inclusion Amid COVID-19

Seyfarth Shaw LLP on

In a short span of time, we have gone from thinking about the virus as a distant concern to working remotely from home as we have been asked to help flatten the curve by social distancing. We are daily bombarded with news and...more

Foley Hoag LLP - Security, Privacy and the...

Beware of COVID-19-Based Cyber Attacks, Say US and UK Agencies

Malicious cyber actors have been exploiting the COVID-19 crisis, warn the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and the UK’s National Cyber Security Centre (NCSC) in a joint...more

Proskauer on Privacy

FTC Ramps up COVID-19 Activity After Improving its Data Security Enforcement Orders

Proskauer on Privacy on

With the spread of the novel coronavirus (COVID-19), cybersecurity criminals and scammers are ramping up their efforts to target vulnerable employers and workforces. The FTC announced today that since January they have...more

K&L Gates LLP

COVID-19: System Security With a Remote Workforce

K&L Gates LLP on

COVID-19 has forced many businesses to quickly accommodate a significant portion of their employees working remotely. Having an employee base working away from established offices creates security vulnerabilities that many...more

BakerHostetler

Key COVID-19 Considerations for U.S. Discovery and Information Governance

BakerHostetler on

Many businesses have remote work and bring-your-own-device policies that cover access to company systems and information from personal devices. ...more

Mintz - Privacy & Cybersecurity Viewpoints

Coronavirus (COVID-19): Managing Cyber Security Risks of Remote Work

With cases of the Novel Coronavirus (COVID-19) emerging in nearly every state, many businesses are taking swift action in an effort to curb its spread. Teleworking, “remote working,” or simply “working from home,” is a...more

Kramer Levin Naftalis & Frankel LLP

Cybersecurity: the SEC Provides Guidance on Well-Known and Emerging Best Practices

At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more

Akerman LLP - HR Defense

Minimizing Risks of BYOD Use For Work

Employees seem permanently attached to their smart phones today, but allowing employees to use their personal devices to make work calls, and send and receive work emails can carry substantial risks. ...more

Miles & Stockbridge P.C.

Employees Are a Gatekeeper to Effective Data Security

Data security and privacy concerns have become one of the top issues keeping business leaders up at night. According to the Ponemon Institute’s 2018 study regarding the cost of data breaches, data breaches are increasingly...more

Jackson Lewis P.C.

Cost And Benefit Analysis Of Bring Your Own Device Programs

Jackson Lewis P.C. on

An increasing number of companies have adopted Bring Your Own Device (“BYOD”) programs. Under a BYOD program, companies permit employees to connect their personal devices (e.g. laptops, smartphones, and tablets) to the...more

Gray Reed

An Employer’s Spooky Interpretation of its Bring Your Own Device (BYOD) Policy

Gray Reed on

Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more

Clark Hill PLC

Crafting "Bring Your Own Device" ("BYOD") Policies to Protect Your Company Data and Ensure Compliance with the Law

Clark Hill PLC on

It’s hard to believe that just over a decade ago, the modern touchscreen smartphone was first introduced. Amidst the “oos” and “ahs” of the crowd, Steve Jobs unveiled the revolutionary Apple iPhone on June 29, 2007. The...more

Hogan Lovells

The UK Cyber Essentials Requirements for IT Infrastructure provides a window into GDPR expectations for data security requirements

Hogan Lovells on

The EU’s General Data Protection Regulation (GDPR), which went into effect in May 2018, requires companies to implement appropriate security measures when handling personal data....more

Payne & Fears

Don’t Let Technology Run Away With Your Customer Information

Payne & Fears on

For many companies, customer information ranks among its most important assets. Yet these days, employees often keep this sensitive customer information in electronic locations that are not readily accessible to or controlled...more

74 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide