News & Analysis as of

Smartphones Email

StoneTurn

Avoiding Pitfalls in Internal Investigations

StoneTurn on

Internal investigations play a critical role in mitigating insider risks, and technology is making the job of investigators easier. Nevertheless, organizations can make missteps that jeopardize the effectiveness of...more

Davis Wright Tremaine LLP

Recent Developments in Cybersecurity….What You Don’t Know Will Hurt You

Criminal masterminds are constantly re-envisioning their weapon of choice. International cyberattacks perpetuated through the use of leaked nation-state cyber tools, shaped many security discussions in 2018, but a new year...more

Womble Bond Dickinson

Yahoo!: Third Circuit Court of Appeal Holds Random or Sequential Number Generation Is Needed–Rejects Hansen/Snyder Expert Reports–...

Womble Bond Dickinson on

Photo by Pixabay on Pexels.com I won’t bury the lead here–in the Third Circuit a dialer that calls from a list of numbers “individually and manually inputted into its system by a user” is not an ATDS unless it has the present...more

Mintz - Employment Viewpoints

Employer’s Accessing of Employee’s Personal Email Account from Company Mobile Phone May Have Violated Stored Communications Act

In Levin v. ImpactOffice LLC, the federal court in Maryland ruled that a former employee’s claim survived a motion to dismiss where she alleged that her former employer violated the Stored Communications Act (“SCA”) when it...more

Miles & Stockbridge P.C.

Phishing Moves to SMiShing

Phishing, the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information (such as passwords and credit card numbers) is something that we have...more

Burns & Levinson LLP

Check Your Password and Touch ID If You’re Divorcing

Burns & Levinson LLP on

Generally speaking, when you’re involved in marital conflict (divorce, separation, etc.), you should immediately change the password to your email, work computer, tablet and of course your phone. We also discussed this in...more

Robinson+Cole Data Privacy + Security Insider

California Electronic Communications Privacy Act signed by Governor

Last Thursday, Governor Jerry Brown signed the California Electronic Communications Privacy Act (CalECPA) into law, which requires law enforcement to obtain a warrant before accessing or searching individuals’ digital...more

Goodwin

California Enacts CalECPA, Requiring a Search Warrant to Obtain or Access Users’ Electronic Information

Goodwin on

On Thursday, October 8, 2015, California Governor Jerry Brown signed into law the Electronic Communications Privacy Act (the “California ECPA”). This legislation, which takes effect on January 1, 2015, has been heralded by...more

McNees Wallace & Nurick LLC

Next on DOL’s Agenda: Mobile Device Use Outside Work Hours

It appears that the U.S. Department of Labor intends to remain busy through the rest of the summer. After releasing in June a Notice of Proposed Rulemaking seeking public comment on proposed changes to the Fair Labor...more

Ballard Spahr LLP

Ohio Federal Court Addresses Privacy Rights around Employee Smartphones

Ballard Spahr LLP on

A recent Ohio federal court decision serves as a reminder that companies need to review their Bring Your Own Devices (BYOD) policies to ensure that employees are adequately informed about the communications that corporate...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide