News & Analysis as of

Mobile Devices Stored Communications Act

Cozen O'Connor

Notice of Appeal - Spring 2020

Cozen O'Connor on

Background - A Company received a grand jury subpoena under the Stored Communications Act (“SCA”) seeking information about an employee of one of the Company’s customers, who was the target of a criminal investigation. The...more

Foley & Lardner LLP

Resist the Urge to Access: the Impact of the Stored Communications Act on Employer Self-Help Tactics

Foley & Lardner LLP on

As an employer or manager, have you ever collected a resigning employee’s employer-owned laptop or cellphone and discovered that the employee left a personal email account automatically logged in? Did you have the urge to...more

Skadden, Arps, Slate, Meagher & Flom LLP

How Social Media, Technology and Privacy Laws Are Changing the E-Discovery Landscape

Historically focused on manually wading through large volumes of email and electronic documents, e-discovery is transforming in nuanced ways. Discovery of mobile devices, social media and other online applications raises...more

Clark Hill PLC

Crafting "Bring Your Own Device" ("BYOD") Policies to Protect Your Company Data and Ensure Compliance with the Law

Clark Hill PLC on

It’s hard to believe that just over a decade ago, the modern touchscreen smartphone was first introduced. Amidst the “oos” and “ahs” of the crowd, Steve Jobs unveiled the revolutionary Apple iPhone on June 29, 2007. The...more

Dorsey & Whitney LLP

The Supreme Court - June 22, 2018

Dorsey & Whitney LLP on

The Supreme Court of the United States issued six decisions today: WesternGeco LLC v. ION Geophysical Corp., No. 16-1011: Petitioner WesternGeco LLC owns patents relating to a system for surveying the ocean floor. ...more

Parker Poe Adams & Bernstein LLP

Get Consent to Access Personal Devices Employees Use for Work

By now, most employers are familiar with “Bring Your Own Device to Work” policies. These policies allow employees to access company information through their own computers, smartphones, tablets, etc. ...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2017 #3

Robinson & Cole LLP on

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more

McGuireWoods LLP

E-Discovery Update: When Personal and Work Data Collide

McGuireWoods LLP on

In the modern world, employees routinely receive work-related data on personal mobile devices, such as smartphones and tablets, and access personal data on work-owned devices. ...more

Troutman Pepper

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

Troutman Pepper on

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

Troutman Pepper

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately

Troutman Pepper on

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

Snell & Wilmer

Policies on Personal Use of Company-Issued Electronic Communication Devices

Snell & Wilmer on

Many employers permit their employees to access personal accounts from company-issued electronic communications devices. They also permit employees to use their personal devices for work. Those rules are both convenient for...more

Troutman Pepper

Liability Lessons From Lazette Case For Employers With BYOD Policies

Troutman Pepper on

On June 5, a U.S. District Court for the Northern District of Ohio, in Lazette v. Kulmatycki, held that a supervisor, using a company-owned BlackBerry mobile device to access a former employee’s personal e-mail, was not...more

Zelle  LLP

A Hurdle To Obtaining Electronic Evidence

Zelle LLP on

While many cases focus on electronic evidence available on employee laptops and behind corporate firewalls, massive volumes of electronic evidence can be found on the servers of companies that provide electronic processing...more

Fenwick & West LLP

Unique Privacy Concerns for Mobile Apps

Fenwick & West LLP on

With the rise of BaaS (or Backend as a service) platforms, it is easier than ever to create a mobile app on the fly. But Fenwick privacy co-chair Tyler Newby advises that companies should be aware of some important privacy...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide