News & Analysis as of

Bring Your Own Device (BYOD)

10 Data Security Management Tips to Prevent a Data Breach

by Revision Legal on

You may never suffer a data breach, but that doesn’t mean you shouldn’t know how to prevent one. With the number and severity of data breaches rising every year, it is clear that all of us, from the biggest to the...more

BYOD (Bring Your Own Device) Policies and Best Practices

Some of us may remember a time when companies were not as concerned about where their information was maintained, as most of it was kept in some form or fashion in file cabinets or individual desks, or perhaps stored offsite...more

Keys to the Kingdom: How Confidentiality Agreements Are Key to Keeping Business Information Secret

by Payne & Fears on

In today’s business environment, greater employee mobility and technological advances underscore the need to protect a company’s confidential information and trade secrets. Stories of employees departing with confidential...more

Tame the Data Monster with a Prioritized Threat List

by NAVEX Global on

You’ve just been sued. Your first thought might not be about data, but your second or third one should be. Information is the lifeblood of the modern corporation, but it can also be its Achilles heel. Terabytes of business...more

Employee monitoring – avoiding pitfalls in a changing landscape

by White & Case LLP on

Recent developments in case law and regulatory guidance have emphasised the need for employers to be cautious when implementing systems to monitor employees....more

EU Retail News - September 2017

by Bryan Cave on

UK Competition Authority Warns Creative Sector About Price Fixing and Information Sharing - On 12th September 2017 the UK Competition Authority,the Competition and Markets Authority ("CMA") sent an open letter to...more

Three Card Monte and E-Discovery: Ask the custodians

“But, your honor, we conducted a search and collection from all sources we deemed appropriate and where we believed responsive and relevant information was located…I mean, honest judge.”...more

Retailers Should Be Aware of Data Privacy Concerns With Bring Your Own Device Policies

by Bryan Cave on

Many retailers permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

Bring Your Own Device (“BYOD”) Policies

by Bryan Cave on

Many companies permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

Data Processing at Work: New Challenges towards Compliance

by Alston & Bird on

The Article 29 Working Party (“WP29”) recently issued an opinion that discusses the processing of employee personal information (Opinion 02/2017). WP29 focuses on the use of new technologies by employers and assesses...more

Top 10 Employment & Labour Issues for Employers

1: Accommodation in the Workplace - OVERVIEW - Employers have a duty to accommodate employees’ needs based on those grounds protected under federal and provincial human rights legislation. All employers are required...more

“Opening Clauses” and the GDPR – It Might Not Be As Easy As We Thought

by Seyfarth Shaw LLP on

The General Data Protection Regulation is coming, and along with it, a significant expectation of increased harmonization in the privacy rules across the EU. Considering the 60-plus articles which directly impose obligations...more

Health Update - June 2017

HIPAA and Emerging Technologies - Editor’s Note: According to a HIMSS Mobile Technology Survey of healthcare provider employees, about 90% say they are using mobile devices to engage patients in their healthcare—and 36%...more

Navigating the IoT Workplace Quagmire

by Morgan Lewis on

The Internet of Things (IoT) promises a societal transformation based on a virtuous circle of constantly improving connectivity, integration, data, intelligence, and automation. One important element of this transformation is...more

Cybersecurity, A-Z: B is for BYOD

BYOD, or “Bring Your Own Device,” is an umbrella term for policies that employers have concerning your smart phone, tablet, or laptop. Essentially, the questions that BYOD policies seek to answer are these: (1) Who owns...more

Your Employee is Leaving…. How Do You Safeguard Your Company’s IP?

by Kelley Drye & Warren LLP on

It is a fact: employees leave. According to the Bureau of Labor Statistics, the average worker currently holds ten different jobs before age forty. Because employee transitions are inevitable, businesses must prepare to...more

The right to disconnect: a new right for French employees?

A new law, called El Khomri law, passed on August 8th, 2016 in France providing a right to disconnect for employees. Such right is entered into force on January 1st, 2017 - According to the law, it belongs to the...more

[Event] Stay Ahead: Nossaman's 2017 Emerging Employment Issues Seminar - Feb 8th, 9th,15th & 16th - Four California Locations

by Nossaman LLP on

Please join us for this complimentary presentation on cutting-edge employment law issues. California and federal employment laws are constantly developing and evolving so it is essential for human resource professionals and...more

BYOD – Another reasonable basis for discovery about discovery

I still remember typewriters. Heck, I still remember carbon paper, mimeographs and bag phones. Would a company, “back in the day”, have ever asked an employee, “hey, we need you to bring your own typewriter, desk,...more

Top 10 Issues for Employers, Issue #6: Balancing BYOD Programs with Expectations of Privacy at Work

This is the sixth instalment in our Top 10 Issues for Employers series. OVERVIEW - The workplace practice of bring your own device (BYOD) has hit the mainstream as more and more employees use their own mobile...more

Understanding the DNS Attacks: Convenience v Security

How Did This Attack Happen? While the attack is still under investigation, initial reports indicate that it was part of a genre of DDoS that infects Internet of Things (IoT) devices, such as webcams, DVRs, routers, smart TVs,...more

Cell Phones at the Workplace: Protecting Employee Safety

by Seyfarth Shaw LLP on

Seyfarth Synopsis: As OSHA’s enforcement relating to employee cell phone use gains more notoriety, it can be expected that it will have a significant collateral impact on law enforcement at all levels to address this hazard....more

Worker Privacy and Security in an Internet of Things

by Foley & Lardner LLP on

The Internet of Things (IoT) refers to the phenomenon of everyday objects like phones, refrigerators, and cars connecting to the internet in order to send and receive data. While the IoT promises a future of convenience and...more

Bring Your Own Device (BYOD) – Be Smart

by LeClairRyan on

At the dawn of portable electronic devices, they were primarily work-related productivity tools. Often, employers would purchase (or lease) devices and distribute them to their need-to-have employee base. It’s not so long...more

Survey Shows Employees Top Security Risk for Companies

A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more

175 Results
|
View per page
Page: of 7
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.