News & Analysis as of

Smartphones Data Protection

Faegre Drinker Biddle & Reath LLP

Newly-Discovered Vulnerability Highlights the Security Concerns Surrounding Bluetooth Technology

A recent report by researchers at the Helmholz Center for Information Security (CISPA), Singapore University of Technology and Design, and the University of Oxford has revealed that Bluetooth technology is vulnerable to a new...more

Davis Wright Tremaine LLP

Recent Developments in Cybersecurity….What You Don’t Know Will Hurt You

Criminal masterminds are constantly re-envisioning their weapon of choice. International cyberattacks perpetuated through the use of leaked nation-state cyber tools, shaped many security discussions in 2018, but a new year...more

Womble Bond Dickinson

Remember Good Data Hygiene: An Official Advisory from the US Government

Womble Bond Dickinson on

Our government is telling us that bringing home that new holiday iPhone® should be a more complicated process than most of us realize. New US Department of Homeland Security (DHS) guidance is appropriately timed to coincide...more

BCLP

GeoLocation Tracking

BCLP on

Smartphones, websites, and other connected devices (e.g., “wearables”) increasingly request that consumers provide their geo-location information. Geolocation information can refer to general information about a consumer’s...more

Proskauer - The Capital Commitment

WSJ Article on Geolocation Data Highlights Risks for Fund Managers

On Friday, the WSJ published an article detailing how companies are monetizing smartphone location data by selling it to hedge fund clients. The data vendor featured in the WSJ article obtains geolocation data from about...more

Hinshaw & Culbertson LLP

Your Mobile is Not Just a Phone — It's a Handheld Mini-Computer Subject to Attack

Hinshaw & Culbertson LLP on

Risk Management Question: We need to stop treating our mobile phones like they're just phones. They are mini-computers more powerful than the computers that guided the Apollo 11 spacecraft to the moon and back. What common...more

Clark Hill PLC

Crafting "Bring Your Own Device" ("BYOD") Policies to Protect Your Company Data and Ensure Compliance with the Law

Clark Hill PLC on

It’s hard to believe that just over a decade ago, the modern touchscreen smartphone was first introduced. Amidst the “oos” and “ahs” of the crowd, Steve Jobs unveiled the revolutionary Apple iPhone on June 29, 2007. The...more

Bass, Berry & Sims PLC

Privacy Perils: Beware the Perpetually Curious Shoulder Surfers

Bass, Berry & Sims PLC on

Given the volume of reporting on the data security risks posed by hackers and other bad actors online, it can be easy to overlook the "visual privacy" risks we encounter every day in the real world. As any "perpetually...more

Payne & Fears

Don’t Let Technology Run Away With Your Customer Information

Payne & Fears on

For many companies, customer information ranks among its most important assets. Yet these days, employees often keep this sensitive customer information in electronic locations that are not readily accessible to or controlled...more

Robinson+Cole Data Privacy + Security Insider

NYC Secure Gives New Yorkers Tool to Protect Their Smartphones

On the heels of the ransomware that had the City of Atlanta scrambling last week, Mayor Bill de Blasio announced the launch of “NYC Secure,” a free mobile app that will alert New York City residents of suspicious activity...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2018

Robinson & Cole LLP on

According to bloggers on techtarget.com, security risks around the internet of things (IoT) continue to be problematic, and a new free guide, “The Developer’s Guide to IoT” has been published specifically for IoT device...more

K2 Integrity

Border Searches: Risks to Electronic Devices and Your Data

K2 Integrity on

U.S. citizens who travel internationally, especially corporate executives and high-net-worth individuals, must consider and navigate data security risks when crossing a border—whether into the United States or another...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - January 2018 #4

Robinson & Cole LLP on

A new report issued by the World Economic Forum (WEF) called “Global Risks Report 2018,” lists the threat of cyber-warfare and cyber-attacks affecting the public as the world’s third greatest threat in 2018, only behind...more

Hogan Lovells

New York Regulators Lead the Charge to Fill Health Data Protection Gaps Left by Federal Law

Hogan Lovells on

New York AG Settles Data Protection Enforcement Against Mobile Health Apps - After a year-long investigation into mobile health apps claiming to be able to measure vital signs or health indicators through smartphone...more

Robinson+Cole Data Privacy + Security Insider

The Truth in Mac Security

For decades, it has been assumed that MacBook and iPhone devices are hack proof and virus free. Their advertisements and claims for being indestructible were never questioned. Yet, nothing is truly immune to intrusion....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #7 – Who is listening to your conversations through your smartphone microphone?

I’ve always known that my smartphone had a microphone. If nothing else, it obviously has to be used for the Shazam app so I can figure out the name of that great song. So that is the only time I use the microphone on my...more

Manatt, Phelps & Phillips, LLP

Advertising Law - October 2015 #4

Eleventh Circuit Rejects Application of VPPA to Free App - The latest decision interpreting the application of the Video Privacy Protection Act in the context of twenty-first century technology provides positive news for...more

King & Spalding

New California Law Expands Privacy Rights Applicable To Electronic Data

King & Spalding on

On October 8, 2015, California Governor Jerry Brown signed into law the California Electronic Communications Privacy Act (“CalECPA” or the “Act”), sponsored by Senator Mark Leno (D-San Francisco). The Act requires law...more

Goodwin

California Enacts CalECPA, Requiring a Search Warrant to Obtain or Access Users’ Electronic Information

Goodwin on

On Thursday, October 8, 2015, California Governor Jerry Brown signed into law the Electronic Communications Privacy Act (the “California ECPA”). This legislation, which takes effect on January 1, 2015, has been heralded by...more

Pillsbury - Global Sourcing Practice

Strange Bedfellows: Technology Issues in Real Estate Transactions, Part 1

Technology continues to infuse our homes, businesses, and places of employment. For example, the “Internet of Things” – as it is sometimes called – brings a lot of promise to a wide variety of industries and sectors,...more

McNees Wallace & Nurick LLC

Smartphones & Smart Employers: Device Policies Enable Businesses To Safely Embrace Technology

Employers who don’t think they need a bring-your-own-device policy should consider this: Nearly 70 percent of millennials and 31 percent of baby boomers surveyed last year by TrackVia admitted to using their own devices and...more

Zelle  LLP

HR Has More Important Things To Do

Zelle LLP on

On Tuesday, Salon published an article titled “5 Ways Corporate HR Departments Monitor Your Movements – Even When You’re Not Working.” Because we’re always interested in the subject of employee monitoring, we eagerly clicked...more

Poyner Spruill LLP

“Bring Your Own Device” To Work Programs: Regulatory and Legal Risks and How To Minimize Them

Poyner Spruill LLP on

If you’ve ever left your mobile phone on an airplane, in a restaurant, or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as your...more

Latham & Watkins LLP

Enforcement of the Personal Data Protection Act in Singapore

Latham & Watkins LLP on

The Personal Data Protection Commission (the “Commission’) was established in January 2013 to implement and enforce The Personal Data Protection Act 2012 (“PDPA”). The PDPA fully came into force on 2 July 2014. So far, the...more

Snell & Wilmer

What’s The “Internet of Things” and What Are Its Legal Challenges?

Snell & Wilmer on

The “Internet of Things” is the universe of smart devices that talk to the internet or to one another. The devices have unique identifiers and the ability to automatically transfer data over a network on their own, without...more

31 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide