News & Analysis as of

Mobile Devices

How Computer Forensics Can Affect Your Divorce Case

As people spend more and more time on digital and electronic devices (smartphones, laptops, ipads, and computers), digital information becomes more relevant in divorce cases. Social media, computers and cell phones become...more

Court Upholds Murder-for-Hire Conviction, Rejects Fourth Amendment Challenges

The murder-for-hire statute makes it a crime to agree to commit murder in exchange for “anything of pecuniary value.” 18 U.S.C. § 1958. The Second Circuit has understood this language to require that, at the time of the...more

Mobile Wallets and Tokenization: Banks are Catching On

by Bryan Cave on

On April 20, 2017, the American Banker reported that U.S. Bank’s new high-end credit card features an interesting differentiator from the high-end cards recently introduced by other large credit card issuers. U.S. Bank’s new...more

Craig Ball Says That Failure to Preserve Mobile Devices in Litigation is the “M” Word: eDiscovery Best Practices

by CloudNine on

In the latest post in his excellent Ball in Your Court blog, Craig Ball has some strong words for attorneys who fail to advise clients to preserve ESI from mobile devices when under a preservation duty....more

“Geofencing” and Health-Related Targeted Advertising: Massachusetts AG Has Something to Say

by Kelley Drye & Warren LLP on

Earlier this month, the Massachusetts Attorney General announced that her office had reached a settlement with a digital advertising company, Copley Advertising, Inc. (Copley), prohibiting the company from using mobile...more

Real Answers to Common Questions on Cybersecurity

by NAVEX Global on

Q: In my company, the IT directors see cybersecurity as an IT and software issue to be solved with software and hardware. How do I convince the team that employees need to also be trained on risky behavior – something that...more

Privacy Perils: De-mobilize Your Mobile Device

by Bass, Berry & Sims PLC on

Have you ever been concerned about the security of your iPad/tablet when you leave your hotel room and head down to the beach or pool? Or when it is left in your car in the mall parking lot while you shop for hours? Or when...more

Regulating From Across The Pond: Rough Waters Ahead For Use of Big Data in the EU

by Dorsey & Whitney LLP on

A proposal for new e-Privacy legislation by the European Union may have a significant impact on businesses that wish to rely on use-generated data such as meta-data collected from users of mobile devices. Mobile...more

Mexico Courts Rule Telecom Agency's Interconnection Costs Model "Reasonable"

by Holland & Knight LLP on

Mexico's Telecom and Antitrust Federal Courts have issued three resolutions declaring that the model used by the Comisión Federal de Telecomunicaciones (COFETEL) for calculating interconnection costs for fixed and mobile...more

A Cautionary Tale Regarding Consent and In-Store Tablets

by Dentons on

The Office of the Privacy Commissioner (OPC) recently released a case summary with implications for retailers attempting to obtain consent for privacy-compliance or anti-spam compliance purposes....more

Smartphone Malware Up 400% in 2016

Here’s some more good news. Not really. According to a recent report by Nokia, malware infections against mobile devices were at an all- time high in 2016. Infections on smartphones rose almost 400 percent and...more

Privacy Tip #80 – Continued Controversy Over Mobile Device Searches by CBP

Many people were shocked and outraged over the story I relayed about a U.S. citizen, in fact, a NASA scientist, who, after returning from racing solar cars abroad was required by Custom and Border Patrol (CBP) agents to hand...more

Presentation Matters When Seeking to Compel Arbitration in Consumer Class Actions

by Polsinelli on

A pair of recent opinions proves that when it comes to compelling arbitration in a consumer class action, presentation of the arbitration clause may matter more than favorable Supreme Court precedent. First, in Norcia v....more

Knowing Where You Are, When You Are: Creepy or competitive? The privacy and security issues involved with geo-location tracking

by Bryan Cave on

Smartphones, smartphone apps, websites, and other connected devices (e.g., “wearables”) increasingly request that consumers provide their geo-location information. Geo-location information can refer to general information...more

Privacy TIp #79 – Consumer Reports Will Help Us With Privacy + Security of Products

What a great idea! Trusty Consumer Reports has announced that it is collaborating with three cybersecurity firms to “create a new standard that safeguards consumers’ security and privacy—and we hope industry will use...more

Searches of Devices at the U.S. Border

by Seyfarth Shaw LLP on

Seyfarth Synopsis: Although longstanding policy of U.S. Customs and Border Protection authorizes searches of electronic devices in the possession of travelers arriving in the United States, recent reports of such searches...more

France: Employees and Digital Devices Outside Working Hours, European Labour & Employment Update

by Jones Day on

New rules have come into force concerning employees' rights to disconnect from digital devices outside normal working time. From 1 January 2017, all relevant employers must negotiate on the employees' right to have periods...more

Crossing the Border with Electronics - Helpful Tips and Pitfalls to Avoid

by Dickinson Wright on

International travelers have been reporting that cell phones, computers, and other communication devices are being seized by Officers of the U.S. Customs and Border Protection (“USCBP”) branch of the U.S. Department of...more

Samsung Shut Out Of Arbitration In Recent Consumer Class Actions

Two federal circuit courts of appeals have recently found that documents Samsung included in boxes with consumer products did not effectively create an arbitration agreement. In both cases, the documents had titles...more

Eight Keys to Securing Portable Devices

by Baker Donelson on

Securing physical worksites and workspaces is by now old hat. We all know file cabinets should be locked, worksites secured and personal access to information monitored. Securing portable devices, however, often receives less...more

Cybersecurity, A-Z: B is for BYOD

BYOD, or “Bring Your Own Device,” is an umbrella term for policies that employers have concerning your smart phone, tablet, or laptop. Essentially, the questions that BYOD policies seek to answer are these: (1) Who owns...more

Texting and Driving – The Evolving Theories of Liability

Distracted driving has become one of the leading causes of motor vehicle accidents and fatalities in the United States. In 2014 alone, Pennsylvania saw more than 13,964 crashes involving a distracted driver, including 49...more

Data Breach Involving CloudPets “Smart” Toys Raises Internet-of-Things Security Concerns

On February 27, 2017, news reports disclosed a major security breach involving Spiral Toys, the seller of the CloudPets brand of internet-connected stuffed animals. The Bluetooth-connected CloudPets toys allow users to...more

Is Siri A Victim And A Cause Of Sexual Harassment?

The next time employers offer sexual harassment training, they might want to require employees to bring their mobile devices. According to Leah Fessler, virtual assistants Siri (Apple), Alexa (Amazon), Cortana...more

The Truth in Mac Security

For decades, it has been assumed that MacBook and iPhone devices are hack proof and virus free. Their advertisements and claims for being indestructible were never questioned. Yet, nothing is truly immune to intrusion....more

664 Results
|
View per page
Page: of 27
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!