News & Analysis as of

Mobile Devices

“KRACK” WiFi Security Vulnerability Discovered

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more

ALJ Finds Violation in Mobile Device Holders Investigation

by Jones Day on

ALJ Pender’s initial determination in Certain Mobile Device Holders and Components Thereof, Inv. No. 337-TA-1028 (Sept. 12, 2017), finding a violation of Section 337, provides important guidance on what investments count...more

Limiting Your Exposure and Visibility

We spend so much time on our mobile phones and on social media, yet often we don’t think of how these tools are broadcasting our lives as we work and play. With just a few steps, you can limit what you are digitally telling...more

Recording Conversations with Your Cellphone: with Great Power Comes Potential Legal Liability

by Varnum LLP on

In the cellphone age, nearly everyone walks around with a multi-tasking recording device in their pocket or purse, and it comes in handy for many of our modern problems: Your dog suddenly started doing something adorable?...more

Cybersecurity Best Practices

by Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

Third Parties Fail To Force Arbitration in Three Circuits

The “Summer of Arbitration” draws to a close today, if you can believe it. (On the first day of fall, it is supposed to be 91 degrees in Minnesota. Yikes.) But before I close that chapter, let’s take a look at a theme that...more

WEB EXCLUSIVE: Should Employees Receive Compensation For Off-The-Clock Cell Phone Use?

by Fisher Phillips on

You might hate to admit it, but it’s true: mobile devices are the adult version of a toddler’s teddy bear. They give us comfort and a sense of belonging. We carry them everywhere and traveling without them makes us feel like...more

Distracted Driving Increases Number of California Car Accidents

California is cracking down on distracted driving, especially in the form of texting and driving. If you are behind the wheel in California, you are now no longer able to hold your cell phone in your hand for any reason. This...more

Second Circuit Upholds Uber’s Mobile Contracting Process, Establishing Template for Mobile Online Contracting

In recent years, courts have issued varying rulings as to whether online or mobile users adequately consented to user agreements or terms of service when completing an online purchase or registering for a service. In each...more

Retailers Should Be Aware of Data Privacy Concerns With Bring Your Own Device Policies

by Bryan Cave on

Many retailers permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

Privacy Tip #103 – Smartphone Replacement Parts Subject to Hacking

You drop your smartphone and now there are a million cracks and you can hardly read your texts. Getting the screen replaced by the manufacturer of the phone is usually expensive and sometimes it is so expensive that it makes...more

Bring Your Own Device (“BYOD”) Policies

by Bryan Cave on

Many companies permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

Privacy Perils: Weather Apps Tracking more than Weather Patterns

by Bass, Berry & Sims PLC on

If you're like millions of Americans, you use the AccuWeather app for iOS to keep up to date about whether the weekend's forecast means fun in the sun or hiding out from the rain. It turns out that AccuWeather may have been...more

Another Federal Appeals Court Rejects Workplace Recording Bans

by Fisher Phillips on

The 5th Circuit Court of Appeals recently became the second federal appeals court this year to hold that an employer’s rule prohibiting recording in the workplace violates the National Labor Relations Act (NLRA). In a July 25...more

Supreme Court to Review Digital Privacy (Part 1)

by Miles & Stockbridge P.C. on

In 1986, Congress passed an obscure statute called the Stored Communications Act that has become much more relevant 30 years later. The U.S. Supreme Court will have two opportunities to help define the scope of digital...more

Senators Introduce Legislation to Improve Cybersecurity of Internet-Connected Devices

by Tucker Arensberg, P.C. on

It is estimated that the number of devices connected to the internet could reach 30 billion by 2020. These connected devices include mobile phones, household appliances, smart watches, and even vehicles....more

Apple Ordered to Pay $506 Million to the University of Wisconsin for Infringing its Computer Processor Chip Patent

by Knobbe Martens on

Patent Judgments & Awards - Wisconsin Alumni Research Found. V. Apple, Inc., No. 14-CV-062-WMC (W.D. Wisc.) On July 25, 2017, a federal court in Wisconsin ordered Apple to pay a whopping $506 million for infringement of...more

The FTC and Industry Propose Best Practices for IoT Security Updates

by Hogan Lovells on

How do you ensure that an Internet-connected sensor or device—often inexpensive and designed for lifespans of up to 20 years or more—can be secured against not only the intrusions of today but also those of the future? This...more

Privacy Perils: What's in Your Container?

by Bass, Berry & Sims PLC on

The use of "containers" in web application development is growing, but not without potentially increasing threats to the security of the data we store in our apps and devices. Containers are stand-alone packages of software...more

The Smartphone: A Treasure Trove of Evidence in Trade Secret Cases

by Seyfarth Shaw LLP on

It’s hard to believe the first smartphone was released over 20 years ago. At that time, few thought it would become such an integral part of our lives. Additionally, this year marks the 10th anniversary of the iPhone and its...more

Update for International Travelers: Flying with Computers and Smartphones (this week)

by Butler Snow LLP on

So the landscape—like dunes—shifts yet again…at least regarding what you can and can’t carry onto international flights…well, some of them anyway. Just last week, and driven by DHS’s own acknowledgement that the measure was...more

Illinois “Geolocation Privacy Protection Act” Passed By Legislature

by King & Spalding on

On June 28, 2017, the Illinois General Assembly passed a bill limiting the collection and use of geolocation information obtained via smartphones. The bill now heads to Governor Bruce Rauner’s desk for signature or veto. ...more

Key Considerations in Addressing Privacy Concerns During Drone Operations

by Williams Mullen on

Imagine that one of your employees uses his or her iPhone to take some pictures of work being done at a construction site. The employee captures several images that include teenagers sunbathing by a pool on the adjacent...more

All Dressed Up and Nowhere to Go: Ringless Voicemail FCC Petition Withdrawn

In the face of significant opposition from virtually all quarters, All About The Message, LLC (AATM), has withdrawn its petition asking the Federal Communications Commission (FCC) for a declaratory ruling that a prerecorded...more

Privacy Perils: Don't "Play" Around with Some Google Apps

by Bass, Berry & Sims PLC on

A group of researchers at the University of Michigan has discovered that hundreds of applications in Google Play, whose function is to turn Android phones into a server that allows the user to connect their phone directly to...more

697 Results
|
View per page
Page: of 28
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.