News & Analysis as of

Smartphones Cell Phones Mobile Apps

EDRM - Electronic Discovery Reference Model

Revolutionary Smartphone Data Collection Technology Helps Corporations Enforce and Comply with Regulatory Rules

The use of smartphones in the workplace is commonplace. Smartphones can offer many benefits to employees and employers, such as increased productivity, communication, collaboration, and flexibility. Hence, many companies...more

Sheppard Mullin Richter & Hampton LLP

Time to Update Your Privacy Disclosure Creation Checklists? Google Will Add to Mobile Privacy Disclosure Requirements

Google recently announced that beginning next year it will require Android mobile apps to provide privacy disclosures. These disclosures will live in a new “safety section” in Google Play...more

Dorsey & Whitney LLP

Trump Administration Seeks to Ban Transactions Using Popular Chinese Mobile Apps

Dorsey & Whitney LLP on

With only two weeks left in its term in office, the Trump Administration issued yet another 11th hour Executive Order (“EO”) on January 5 that purports to create a new legal framework to ban transactions with certain Chinese...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #202 – Check the Privacy Settings on Your Phone Frequently

I once again had the pleasure of presenting Cybersecurity for Tax Professionals at the IRS Nationwide Tax Forum today. The conference is designed for tax professionals in small- to medium-sized businesses....more

Wilson Sonsini Goodrich & Rosati

New FTC Report Recommends Steps to Improve Mobile Security Updates

In February 2018, the Federal Trade Commission (FTC) released a report that explores the complexities of the mobile ecosystem and makes recommendations for industry to improve the mobile security update process for consumers....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #130 – Smartphones Targeted by Dark Caracal Attack

There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #128 – Basic Smartphone Settings to Thwart Hackers

When talking to colleagues and friends, it appears that folks do not understand how their smartphones work and the data that can be accessed through them. This prompted me to again give basic steps that can be used to protect...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #119 – Getting the Newest Smartphone as a Gift? Take Care When Downloading Apps

‘Tis the season for gift giving. Smartphones and mobile devices are a hot item during the holidays. The first thing many people do when they get a new phone or device is to start downloading apps. Since there will be a lot of...more

Robinson+Cole Data Privacy + Security Insider

Privacy TIp #86 - Android Users Vulnerable to Malware through Apps

University of Michigan researchers have discovered that hundreds of applications in Google Play turn Android phones into a server that allow the user to connect the phone directly to a PC and leave open insecure ports...more

Robinson+Cole Data Privacy + Security Insider

Indianapolis Colts Want Class Action on Recording Conversations Moved to Home Stadium

The Indianapolis Colts mobile app is alleged by a putative class to record fans’ private conversations. In the putative class action, the named plaintiff alleges that the mobile app secretly activates the smart phone’s...more

Seyfarth Shaw LLP

Cell Phones at the Workplace: Protecting Employee Safety

Seyfarth Shaw LLP on

Seyfarth Synopsis: As OSHA’s enforcement relating to employee cell phone use gains more notoriety, it can be expected that it will have a significant collateral impact on law enforcement at all levels to address this hazard....more

Robins Kaplan LLP

Mobile Location Analytics: Changing the Game for Brick and Mortar Retail

Robins Kaplan LLP on

For brick-and-mortar retailers, smart phones have taken on an entirely new role in customers’ shopping experiences. A technology known as "mobile location analytics" ("MLA") or sometimes, "indoor analytics," gives brick and...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #7 – Who is listening to your conversations through your smartphone microphone?

I’ve always known that my smartphone had a microphone. If nothing else, it obviously has to be used for the Shazam app so I can figure out the name of that great song. So that is the only time I use the microphone on my...more

Robinson+Cole Data Privacy + Security Insider

Weekly Privacy Tip #3 – Know how apps are accessing and using your constant location

Everyone loves their smartphone. Everyone loves the newest app. Angry Birds has lots of company now. But most people don’t know the back end of apps and how they are accessing, using and selling your data. Why? Because no one...more

BakerHostetler

Court Dismisses TCPA Claim Against WhisperText Where Text Messages Sent at App Users’ Direction

BakerHostetler on

Last week, in McKenna v. WhisperText et al., No. 5:14-CV-00424-PSG, 2015 WL 428728 (N.D. Cal. Sept. 9, 2015), the U.S. District Court for the Northern District of California dismissed a purported Telephone Consumer Protection...more

Robinson+Cole Data Privacy + Security Insider

Android smartphones Stagefright engine vulnerable

It is being reported that 95% of all Android smartphones are vulnerable to being hacked with a text message, which is being called the “heartbleed for mobile.” According to security experts, the vulnerability exploits the...more

Thomas Fox - Compliance Evangelist

Social Media Week Part V – Tools and Apps for the Compliance Practitioner

To conclude this week’s posts, I wanted to list some of the more prevalent social media tools, explain what they are and how you might use them in a compliance program. (As usual I got carried away so this series will...more

Thomas Fox - Compliance Evangelist

Social Media Week Part IV – Telling a Story About Honey

I continue my exploration of the use of social media in doing compliance by taking a look at a very innovative social media solution to a difficult compliance issue around, of all things, honey. This example shows how...more

18 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide