What's the Tea in L&E? Employee Devices: What is #NSFW?
Podcast - Navigating the TikTok Ban: Implications for Government Contractors
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Does Your Company Personal Device Policy Comply with DOJ Guidance?
The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics
Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation
Sitting with the C-Suite: How Do Corporations Manage the Convergence of Data during Remote Work?
U.S. Department of Defense Awards Contract to Secure Sensitive Data With Blockchain
Digital Workplace Issues
Video | Tips for Managing the Preservation of Mobile Device Data
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
Ron Camhi Discusses the Importance of Mobile Advertising
Celina Kirchner Discusses Social Media Advertising Laws
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
New Jersey to consider allowing police to search cell phones to combat distracted driving
Unique Privacy Concerns for Mobile Apps
Unlocking Your Cell Phone Is Now Illegal, but Not for Long
Hot Trends in Federal Enforcement on the Web in 2013 from Ifrah Law Partners
Corporate Law Report: Global HR, Textual Harassment, Working Interviews, and Other Workplace Issues
E-Books Empower Lawyers to Publish on Specialized Subjects They Couldn’t Previously
I have the pleasure to present an advanced session on cybersecurity to tax preparers at the IRS’ National Tax Preparers Forum each year. The sessions are well attended, and I enjoy meeting attendees and talking about the...more
The world of workforce communication looks vastly different from 2020, including an increased blur between personal and business communications due to remote work environments and access to instant messaging and...more
Introduction: Tracking Software in the Healthcare Industry - Privacy-related concerns have become increasingly prominent in recent years, especially with the widespread use of third-party tracking tools such as tracking...more
Today, the cell phone has become ubiquitous. It likely goes where you go — to the office, to the grocery store, to the gym. Your favorite restaurant. Your doctor’s appointment. Your house of worship. While it’s almost always...more
Why don’t our new privacy laws really protect our privacy? Are we going about this the wrong way? The topic was raised in the recent Capital Forum of state and federal enforcement agencies by FTC Chair Lena Kahn, who...more
FOREWORD - On behalf of the new and expanding Goodwin London litigation team I am delighted to welcome you to our first ever ‘Litigation Insights’: a series of quarterly updates on important and interesting developments...more
The COVID-19 pandemic has pushed employees out of the workplace in a way never experienced before. The effect often has been indiscriminate and impacted employees who traditionally do not have access to work email while...more
Nearly half of all websites use cookies—small text files stored on internet users’ computers and mobile devices so web servers can track that user. Cookies come in a variety of flavors in terms of their purpose, the party...more
While the final CCPA regulations remain pending, written comments on the recently released proposed modifications are due by February 25, 2020. This article highlights some of the most notable changes to the proposed...more
SDNY Rejects Standing under “Increased Risk” Theory Where Data Not Targeted or Stolen - The Southern District of New York rejected a settlement that would have resolved a class action based on the unauthorized (and...more
On October 1, 2019, the European Union Court of Justice notably ruled on the type of consent required by a consumer in order to store cookies on their device. The case involved a promotional online lottery organized by...more
I once again had the pleasure of presenting Cybersecurity for Tax Professionals at the IRS Nationwide Tax Forum today. The conference is designed for tax professionals in small- to medium-sized businesses....more
While we have been talking about the very important message of educating employees about data security, I find that giving employees tips about their personal data security keeps them interested and engaged during education...more
Connected devices, or what is referred to as the “consumer internet of things” is big business right now. Consumers want to “talk” to their devices throughout their home wherever they are, and some organizations’ business...more
Historically focused on manually wading through large volumes of email and electronic documents, e-discovery is transforming in nuanced ways. Discovery of mobile devices, social media and other online applications raises...more
An amendment to New Jersey’s data breach notification requirements of the Consumer Fraud Act is currently awaiting signature by State Governor Phil Murphy. The bill, Assembly No. 3245, was recently passed by both the New...more
“What can you do to protect personal information when you collect data from a phone?” This is one of the most frequently asked questions of our forensics practice group....more
Last week’s Privacy Tip centered on how our cell phone geolocation data is being sold by the telephone companies Cell Phone Geolocation Data Being Sold. ...more
Smartphones, websites, and other connected devices (e.g., “wearables”) increasingly request that consumers provide their geo-location information. Geolocation information can refer to general information about a consumer’s...more
If you have bought a new cell phone recently, you will see that the technology of the newest smart phones is far more advanced than in the past, and have features on them that most people don’t understand or use....more
As technology continues to evolve, organizations are increasingly facing challenges concerning whether, and to what extent, they allow employees to utilize their own devices for work purposes. When employees use their own...more
In today’s world, where lots of sensitive data are stored electronically, prudent companies utilize sophisticated computer cyber security systems to prevent the hacking of such data. They likely also require employees to...more
Some of us may remember a time when companies were not as concerned about where their information was maintained, as most of it was kept in some form or fashion in file cabinets or individual desks, or perhaps stored offsite...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
With the proliferation of location-based app services like traffic alerts and ride-sharing programs, the collection of consumers’ location information has exploded in recent years. It comes as no surprise, therefore, that...more