News & Analysis as of

Mobile Devices Software

Array

This Week in eDiscovery: The Duty to Preserve Ephemeral App Data, Employee Compliance with Electronic Communication Rules

Array on

Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the week of July 8-14. Here’s what’s...more

ArentFox Schiff

US Government Throws “Kitchen Sink” Export Controls at Russia, Plus Sweeping EAR99 Software Controls, and IT and Software Services...

ArentFox Schiff on

Three US agencies – the US Department of Commerce, Bureau of Industry and Security (BIS), the US Department of the Treasury, Office of Foreign Assets Control (OFAC), and the US Department of State – took new actions on June...more

HaystackID

[Webcast Transcript] Solve the Digital Puzzle: Your Guide to Navigating Mobile Forensics’ Future

HaystackID on

Editor’s Note: In this insightful discussion between John Wilson, Chief Information Security Officer and President of Forensics at HaystackID, and Rene Novoa, Director of Forensics at HaystackID, we delve into the intricate...more

Bracewell LLP

Personal Devices and Messaging Platforms in the Workplace: Tips, Tactics and Best Practices for In-House Counsel

Bracewell LLP on

Federal regulators have cracked down on the use of texts messages and messaging platforms for business communications, using their broad authority to root out record retention violations, resulting in significant fines and...more

K2 Integrity

Cybersecurity Awareness Month: Installing Updates to Fix Bugs and Vulnerabilities

K2 Integrity on

This article is the third in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity has been providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more

K2 Integrity

Cybersecurity Awareness Month: Doubling Your Account Security With Multi-Factor Authentication

K2 Integrity on

This article is the second in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity will be providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more

A&O Shearman

Overcoming eDiscovery-related chat data challenges: Part 2 - prior to an investigation

A&O Shearman on

This post provides some tips from eDiscovery experts on what to consider ahead of any investigation commencing. Consider ease of compliance when procuring chat software The pandemic accelerated the adoption of chat and...more

J.S. Held

Litigation Surge From the Use of Tracking Technology & the Sharing of Healthcare and Personal Data

J.S. Held on

Introduction: Tracking Software in the Healthcare Industry - Privacy-related concerns have become increasingly prominent in recent years, especially with the widespread use of third-party tracking tools such as tracking...more

BakerHostetler

Latest FTC Health Privacy Case Sheds Light on Agency Health Privacy Approaches

BakerHostetler on

Health privacy has been a Federal Trade Commission (FTC) priority for decades, and indeed, one of its very first privacy cases, in the early 2000s, involved the inadvertent sharing of user health data. Fast-forward a few...more

Robinson+Cole Data Privacy + Security Insider

Apple Issues Patches: Apply Them Now and Alert Your Employees to Do the Same

Earlier this week, Apple issued another patch—this one is said to address a reported vulnerability that “an application may be able to execute arbitrary code with kernel privileges.” According to Apple, it “is aware of a...more

Hogan Lovells

Over-the-air software updates for IoT devices present companies with product liability and safety opportunities — and challenges

Hogan Lovells on

Mobile devices within the Internet of Things (IoT) are continuously benefitting from rapid technological advancements. And once those devices are sold to consumers, over-the-air (OTA) software updates ensure they can be...more

Robinson+Cole Data Privacy + Security Insider

HomeKit Vulnerability: One More Reason to Accept New iOS 11.2

Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more

Robinson+Cole Data Privacy + Security Insider

Privacy TIp #79 – Consumer Reports Will Help Us With Privacy + Security of Products

What a great idea! Trusty Consumer Reports has announced that it is collaborating with three cybersecurity firms to “create a new standard that safeguards consumers’ security and privacy—and we hope industry will use...more

Akin Gump Strauss Hauer & Feld LLP

IP Newsflash - October 2015 #3

DISTRICT COURT CASES - Mobile Device Data Monitoring Patent Not Directed to Abstract Idea Under § 101 - On October 26, 2015, Judge Sparks of the Western District of Texas denied defendant’s motion for summary...more

Polsinelli

Mobile Health Devices and Cybersecurity: Federal Guidance for Management of Threats in Medical Devices

Polsinelli on

New Technology = New Threats - With new technology comes new security concerns. But when that new technology is in the medical field, the cybersecurity vulnerabilities can be particularly devastating. The...more

Thomas Fox - Compliance Evangelist

Social Media Week Part IV – Telling a Story About Honey

I continue my exploration of the use of social media in doing compliance by taking a look at a very innovative social media solution to a difficult compliance issue around, of all things, honey. This example shows how...more

Morrison & Foerster LLP - Social Media

Mobile App Legal Terms & Conditions: Six Key Considerations

For corporations, the mobile app is today’s website. Back in the late 1990s, no self-respecting company, no matter how stodgy and old-fashioned, wanted to be without a website....more

McDonnell Boehnen Hulbert & Berghoff LLP

Eon Corp. IP Holdings LLC v. AT&T Mobility LLC (Fed. Cir. 2015)

On September 23, 2010, Eon filed suit against seventeen defendants in the District Court of the District of Delaware, alleging infringement of U.S. Patent No. 5,663,757. During the case, the '757 patent went through two...more

Robinson & Cole LLP

Security bug found in Samsung® smartphones

Robinson & Cole LLP on

Samsung recently announced that about more than 600 million Samsung mobile devices contained a factory installed third party software produced by SwiftKey that predicts the words you will types on your keyboards. The issue...more

Pillsbury Winthrop Shaw Pittman LLP

How to Fail in the Internet of Things

Innovation is prized in the growing space of the Internet of Things (IoT). But an innovative product design is not enough, and potential pitfalls abound. As demonstrated in a report published by the Federal Trade Commission...more

Latham & Watkins LLP

5 Compliance “Hot Spots” for Technology Companies Under Export Controls and Sanctions Laws

Latham & Watkins LLP on

Increasingly interconnected global businesses need to focus on how export controls and trade sanctions can affect their cross-border activities in unexpected ways. For decades, the US Government has used trade...more

Miller Canfield

Use Caution When Traveling With Encryption Software

Miller Canfield on

"If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device’s encryption software."...more

22 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide