Safeguards against Data Security Breaches (Part One)

Fenwick & West LLP
Contact
With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers, malware and other risks. Concerns about security, trust and PII, personally-identifiable information, are all taking center stage in this discussion. Following up on his video “Top 3 Concerns in Data Security,” Fenwick’s Robert Brownstone, a leader in electronic information security issues, says that encryption is See more +
With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers, malware and other risks. Concerns about security, trust and PII, personally-identifiable information, are all taking center stage in this discussion. Following up on his video “Top 3 Concerns in Data Security,” Fenwick’s Robert Brownstone, a leader in electronic information security issues, says that encryption is an important tool to safeguard against all kinds of breaches. See less -
Embed
Copy

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Fenwick & West LLP | Attorney Advertising

Written by:

Fenwick & West LLP
Contact
more
less

Fenwick & West LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.