News & Analysis as of

Bring Your Own Device (BYOD) Cyber Insurance

Pillsbury - Policyholder Pulse blog

Avoiding a Coverage Glitch: Closing Potential Gaps in Cyber Insurance Coverage

Over the past decade, technological innovations have quickly transformed how companies operate their IT infrastructure. Traditional on-site servers and hardware have often been replaced or supplemented by off-site solutions...more

Parker Poe Adams & Bernstein LLP

Mobile Device Privacy Considerations for Employers

The use of mobile devices in the workplace, including cell phones, tablets, and other devices, has generated significant risks for employers, both in terms of data security and of litigation strategy. Access to these devices...more

Cozen O'Connor

Feeling Cyber-Secure: Avoiding The Devastating Hacker

Cozen O'Connor on

Pro-actively drafting cybersecurity policies and protocols is like doing a will for yourself, or an employee manual for your company. The thought process is that there is nothing imminently pressing that requires me to think...more

BakerHostetler

Healthcare Organizations are Suffering from Serious Data Security Ills

BakerHostetler on

The diagnosis is in, and its not good. Unless an aggressive treatment plan is put in place, the prognosis will be just as bleak. On December 6, 2012, the Ponemon Institute issued its Third Annual Benchmark Study on...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide