News & Analysis as of

Risk Management Bring Your Own Device (BYOD)

The Volkov Law Group

DOJ Outlines Compliance Expectations Relating to Preservation of Data from Messaging Applications (Part III of III)

The Volkov Law Group on

The Justice Department finally released its new policy to improve corporate preservation of data generated by executives and employees.  In this new technology era, companies have had significant gaps in collecting and...more

Paul Hastings LLP

DOJ's Approach to Ephemeral Messaging is Not Ephemeral: New Guidance on Messaging, Personal Devices

Paul Hastings LLP on

On March 3, 2023, Assistant Attorney General Kenneth A. Polite announced significant revisions to the Department of Justice (“DOJ”) Criminal Division’s Evaluation of Corporate Compliance Programs (“ECCP”) specifically focused...more

American Conference Institute (ACI)

Corporate Compliance and Enforcement Hot Topics with IBM VP, Una Dean

Una Dean sits down for an exclusive video interview for ACI Insights with Rebecca Hughes Parker, Editor-in-Chris of Anti-Corruption Report. Una speaks about the compliance challenges in today’s environment including,...more

Reveal

What is Shadow IT and Why Your Legal Team Should Be Concerned

Reveal on

Before the COVID-19 Pandemic, legal technology writers like myself, wrote about BYOD (an acronym for Bring Your Own Device) policies and how they affect the eDiscovery process. But since March 2020 and the great migration...more

Association of Certified E-Discovery...

[Webinar] Dealing with the Growing Risks of the ‘Shadow IT’ Environment - August 11th, 1:00 pm - 2:00 pm BST

The ever-expanding information technology environment is one of the biggest challenges for IT, e-discovery and digital forensics practitioners today. It takes just seconds for anyone to open a webpage and download a new tool...more

Pullman & Comley, LLC

ABA Ethics Committee Weighs in on Practicing Law Virtually

Pullman & Comley, LLC on

In  Formal Opinion 498, issued on March 10, 2021, the American Bar Association’s Standing Committee on Ethics and Professional Responsibility has provided some guidance on the ethical obligations triggered when a lawyer...more

Robinson+Cole Data Privacy + Security Insider

Secureworks 2020 Incident Response Report Confirms Increased Vulnerabilities with At Home Workers During Pandemic

Secureworks issues an annual Incident Response Report that is very helpful in obtaining information on what types of incidents are occurring in order to become more resistant to threats. The 2020 IR Report was recently...more

Seyfarth Shaw LLP

Belonging, Connection, and Inclusion Amid COVID-19

Seyfarth Shaw LLP on

In a short span of time, we have gone from thinking about the virus as a distant concern to working remotely from home as we have been asked to help flatten the curve by social distancing. We are daily bombarded with news and...more

Foley Hoag LLP - Security, Privacy and the...

Beware of COVID-19-Based Cyber Attacks, Say US and UK Agencies

Malicious cyber actors have been exploiting the COVID-19 crisis, warn the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and the UK’s National Cyber Security Centre (NCSC) in a joint...more

Proskauer on Privacy

FTC Ramps up COVID-19 Activity After Improving its Data Security Enforcement Orders

Proskauer on Privacy on

With the spread of the novel coronavirus (COVID-19), cybersecurity criminals and scammers are ramping up their efforts to target vulnerable employers and workforces. The FTC announced today that since January they have...more

K&L Gates LLP

COVID-19: System Security With a Remote Workforce

K&L Gates LLP on

COVID-19 has forced many businesses to quickly accommodate a significant portion of their employees working remotely. Having an employee base working away from established offices creates security vulnerabilities that many...more

BakerHostetler

Key COVID-19 Considerations for U.S. Discovery and Information Governance

BakerHostetler on

Many businesses have remote work and bring-your-own-device policies that cover access to company systems and information from personal devices. ...more

Mintz - Privacy & Cybersecurity Viewpoints

Coronavirus (COVID-19): Managing Cyber Security Risks of Remote Work

With cases of the Novel Coronavirus (COVID-19) emerging in nearly every state, many businesses are taking swift action in an effort to curb its spread. Teleworking, “remote working,” or simply “working from home,” is a...more

Kramer Levin Naftalis & Frankel LLP

Cybersecurity: the SEC Provides Guidance on Well-Known and Emerging Best Practices

At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more

Miles & Stockbridge P.C.

Employees Are a Gatekeeper to Effective Data Security

Data security and privacy concerns have become one of the top issues keeping business leaders up at night. According to the Ponemon Institute’s 2018 study regarding the cost of data breaches, data breaches are increasingly...more

Robinson+Cole Data Privacy + Security Insider

A Value Add to Employee Security Education: Mobile Apps

While we have been talking about the very important message of educating employees about data security, I find that giving employees tips about their personal data security keeps them interested and engaged during education...more

Cozen O'Connor

Protecting Your Trade Secrets: Implementing an Effective Exit Protocol

Cozen O'Connor on

We have previously posted on HR Headaches about the practical steps employers can take to protect their company’s trade secrets. ...more

Hogan Lovells

The UK Cyber Essentials Requirements for IT Infrastructure provides a window into GDPR expectations for data security requirements

Hogan Lovells on

The EU’s General Data Protection Regulation (GDPR), which went into effect in May 2018, requires companies to implement appropriate security measures when handling personal data....more

Payne & Fears

Don’t Let Technology Run Away With Your Customer Information

Payne & Fears on

For many companies, customer information ranks among its most important assets. Yet these days, employees often keep this sensitive customer information in electronic locations that are not readily accessible to or controlled...more

Association of Certified E-Discovery...

Growing Business Use of “Chat Apps” Poses Information Risk for Corporate Legal Departments

A 2017 survey of business professionals worldwide found that the average business professional uses 9.4 software apps for work purposes. Nearly half of the respondents said they use apps that are not sanctioned by their...more

Searcy Denney Scarola Barnhart & Shipley

BYOD – Another reasonable basis for discovery about discovery

I still remember typewriters. Heck, I still remember carbon paper, mimeographs and bag phones. Would a company, “back in the day”, have ever asked an employee, “hey, we need you to bring your own typewriter, desk,...more

Robinson+Cole Data Privacy + Security Insider

Survey Shows Employees Top Security Risk for Companies

A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more

Fisher Phillips

Pokémon, No!

Fisher Phillips on

There is something a little bit different about going back to school this year: your school is filled with Pokémon, awaiting capture by your students, employees, and visitors. By now, you are probably familiar with Pokémon...more

NAVEX

Seven Training Imperatives to Address Your Biggest Cyber Security Risk: Employee Behavior

NAVEX on

One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more

24 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide