News & Analysis as of

Mobile Devices Data Protection

To Travel With My Laptop …or Not!

Tricky decision to make if you are among the millions that travel for work…. how safe is it? Will the new “laptop travel ban” affect me? What airports am I connecting through that are of concern? Is public Wi-Fi secure? Did...more

Eight Keys to Securing Portable Devices

by Baker Donelson on

Securing physical worksites and workspaces is by now old hat. We all know file cabinets should be locked, worksites secured and personal access to information monitored. Securing portable devices, however, often receives less...more

The Truth in Mac Security

For decades, it has been assumed that MacBook and iPhone devices are hack proof and virus free. Their advertisements and claims for being indestructible were never questioned. Yet, nothing is truly immune to intrusion....more

WhatsApp security flaw, lawsuit in Germany

Tobias Boelter, a University of California Berkeley cryptography researcher claims that last year he found a security flaw in WhatsApp’s encrypted smart phone messaging application. The flaw, which relates to the unique...more

Data Privacy Day brings reminder that businesses should require encryption on laptops and mobile devices

Data Privacy Day was January 28th – the annual event, coordinated by the National Cyber Security Alliance, celebrates the signing in 1981 of the first international treaty addressing privacy and data protection. On...more

NIST Extends Deadline for Comments to Mobile Device Infrastructure Guidance

All enterprises are struggling with the security risks posed by the use of mobile devices by employees. Companies want their employees to have easy access to information so that they can perform their job functions in an...more

Bring Your Own Device (BYOD) – Be Smart

by LeClairRyan on

At the dawn of portable electronic devices, they were primarily work-related productivity tools. Often, employers would purchase (or lease) devices and distribute them to their need-to-have employee base. It’s not so long...more

Survey Shows Employees Top Security Risk for Companies

A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more

Privacy Tip #53 – Valuable Lesson: Don’t Write Down Passwords

I have been doing a lot of live employee training lately. I really enjoy it, and have been told that it is some of the most entertaining training around. The reason why I can get the audience to laugh is because I tell real...more

BYOD Risks under HIPAA – Does Your HIPAA Compliance Program Adequately Address the Ever Increasing Use of Portable Electronic...

by Dechert LLP on

Many U.S. employers are now allowing employees to use their own personal handheld devices and laptop computers for work-related purposes. As the age of employer-provided devices is coming to an end and “bring your own device”...more

Bad News for HIPAA Business Associates: HHS OCR Announces $650,000 Settlement for BA Breach

Catholic Health Care Services of the Archdiocese of Philadelphia (“CHCS”), a HIPAA business associate, has agreed to pay the Department of Health and Human Services Office of Civil Rights (“OCR”) $650,000 in connection with a...more

Safe or Good? We All Have Choices to Make

I planned to write about the inspired, better-than-sliced-bread security option of using fingerprint authentication to protect our mobile devices. That imploded. In 2014, and earlier this year, courts in Virginia and...more

2016 Mobile Data Privacy and Security Update and 2015 Review

by BakerHostetler on

To say that mobile device usage has reached a tipping point would be an understatement. There are now more mobile devices than people in the world, a staggering 7.9 billion mobile devices for 7.4 billion people on Earth. In...more

Mobile Location Analytics: Additional Considerations For Retailers

by Robins Kaplan LLP on

Since our first update on Mobile Location Analytics (MLA) for retailers, the International Working Group on Data Protection in Telecommunications ("the Group") has released a working paper raising additional considerations...more

Comment period for NIST guide “Model Device Security” coming to a close

The National Cybersecurity Center of Excellence (NCCoE) has announced that the comment period for the draft NIST Cybersecurity Practice Guide “Mobile Device Security: Cloud& Hybrid Builds” will close on January 8, 2016....more

Privacy Tip #15 – Protecting your privacy during holiday travel

The holiday season means traveling to see family and friends, and is a wonderful time of year. That travel includes planes, trains and automobiles. Although that movie was hilarious, travel can be hazardous to the protection...more

Online Trust Alliance releases smart device privacy + security checklist for consumers

Here’s a question: do you review each smart device’s policies and terms before you purchase the device? Probably not. However, when you pick out or receive a smart device, you really need to be aware of the privacy and...more

How to prevent data theft from lost devices

by Dentons on

Technology can be a blessing and a curse for attorneys. While technology enables attorneys to be able to conduct business on the go, it also puts client and firm data at risk. In the United States, someone loses a cellphone...more

HIPAA and Text Messaging

by LeClairRyan on

Text messaging is pervasive. Doctors and other health care providers, covered entities, and business associates currently use (and embrace) the technology. Texting is easy, fast and efficient. It doesn’t require a laptop...more

Video Privacy Protection Act Narrowed – App’s Transmission of Roku ID Not Disclosure of Personal Information

A New York district court opinion is the latest addition to our watch of ongoing VPPA-related disputes, a notable decision on the issue of what exactly is a disclosure of “personally identifiable information” (PII) under the...more

New California Law Expands Privacy Rights Applicable To Electronic Data

by King & Spalding on

On October 8, 2015, California Governor Jerry Brown signed into law the California Electronic Communications Privacy Act (“CalECPA” or the “Act”), sponsored by Senator Mark Leno (D-San Francisco). The Act requires law...more

Alphabet Soup and Data Security

In the span of two days, mobile device users learned of two data breaches that could compromise their personal data. In one, Experian (a credit reporting agency) reported that it was hacked, potentially putting 15 million...more

California Enacts CalECPA, Requiring a Search Warrant to Obtain or Access Users’ Electronic Information

by Goodwin on

On Thursday, October 8, 2015, California Governor Jerry Brown signed into law the Electronic Communications Privacy Act (the “California ECPA”). This legislation, which takes effect on January 1, 2015, has been heralded by...more

California Joins Other States with the Passage of CalECPA

by McDermott Will & Emery on

Law enforcement requests for electronic information, particularly from technology companies such as Google and Twitter, have skyrocketed in recent years. In response, several states—Maine and Texas in 2013, Utah in 2014 and...more

Is Your HIPAA Compliance Program Ready for the FTC?

Everyone in healthcare knows that the next round of HIPAA audits is coming. Covered entities and business associates have long been advised to review and update their HIPAA security risk analyses, have business associate...more

105 Results
|
View per page
Page: of 5
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.