Data Governance for the BYOD Age
Corporate Compliance and Enforcement Hot Topics with IBM VP, Una Dean
Digital Workplace Issues
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Safeguards against Data Security Breaches (Part One)
Corporate Law Report: Managing Cyber Risks, BYOD, Obama's NLRB Crisis, Iran Sanctions, and More
When it comes to discovery of mobile devices, organizations today must consider being proactive regarding how mobile devices of their employees and contractors are managed and what rights they have regarding the storage and...more
Over the past decade, technological innovations have quickly transformed how companies operate their IT infrastructure. Traditional on-site servers and hardware have often been replaced or supplemented by off-site solutions...more
When it comes to ensuring that data is preserved and available for litigation, investigations, or government inquiries, it all starts with establishing and codifying clear data governance policies and procedures....more
This post provides some tips from eDiscovery experts on what to consider ahead of any investigation commencing. Consider ease of compliance when procuring chat software The pandemic accelerated the adoption of chat and...more
Holland & Knight previously noted an Office of Management and Budget (OMB) memorandum prohibiting the use of TikTok on information technology used by federal agencies and contractors. (See Holland & Knight's previous blog...more
In the extensive chatter since the Federal Acquisition Regulatory Council (“FAR Council”) published an interim rule on the new Federal Acquisition Regulation (FAR) 52.204-27, “Prohibition on a ByteDance Covered Application,”...more
WHAT: The Federal Acquisition Regulation (FAR) Council published an interim rule implementing the No TikTok on Government Devices Act that was included in the Consolidated Appropriations Act, 2023 (Pub. L. No. 117-328) and...more
Before the COVID-19 Pandemic, legal technology writers like myself, wrote about BYOD (an acronym for Bring Your Own Device) policies and how they affect the eDiscovery process. But since March 2020 and the great migration...more
The ever-expanding information technology environment is one of the biggest challenges for IT, e-discovery and digital forensics practitioners today. It takes just seconds for anyone to open a webpage and download a new tool...more
Report on Patient Privacy 18, no. 1 (January 2021) - Security threats to health care entities will continue to escalate in 2021, as bad actors with significant capabilities target pandemic-weary organizations still...more
Humor isn’t necessary in eDiscovery, but it sure helps. Which is why Ipro has created our own comic strip, eDiscovery Blues™ and included them with articles highlighting insights and best-practices across the legal technology...more
Secureworks issues an annual Incident Response Report that is very helpful in obtaining information on what types of incidents are occurring in order to become more resistant to threats. The 2020 IR Report was recently...more
Today’s eDiscovery Blues comic highlights several challenges In-House legal teams might face when working with data in the face of litigation, starting with the sinking feeling that comes when you ask yourself, “Is the I.T....more
COVID-19 has forced many businesses to quickly accommodate a significant portion of their employees working remotely. Having an employee base working away from established offices creates security vulnerabilities that many...more
While we have been talking about the very important message of educating employees about data security, I find that giving employees tips about their personal data security keeps them interested and engaged during education...more
The EU’s General Data Protection Regulation (GDPR), which went into effect in May 2018, requires companies to implement appropriate security measures when handling personal data....more
It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more
Employers who don’t think they need a bring-your-own-device policy should consider this: Nearly 70 percent of millennials and 31 percent of baby boomers surveyed last year by TrackVia admitted to using their own devices and...more