News & Analysis as of

Cell Phones Data Protection

Sheppard Mullin Richter & Hampton LLP

Ring, Ring, it’s the FCC Calling- TracFone to Pay $16M to Settle FCC Investigation

TracFone, the pre-paid phone company, recently settled with the FCC over allegations that the company failed to protect customer information during three different data incidents. According to the FCC, in each of the...more

Robinson+Cole Data Privacy + Security Insider

Tracfone Settles FCC Investigation for $16 Million

This week, the Federal Communications Commission (FCC) announced a settlement with TracFone Wireless to resolve investigations into whether TracFone failed to reasonably protect its customers’ information from unauthorized...more

HaystackID

Ambient Light Sensors to Malware Threats: MIT Unveils Smartphone Privacy Risks Amid Market Turbulence

HaystackID on

Editor's Note: In a significant study from MIT's CSAIL, researchers have unveiled vulnerabilities in smartphone ambient light sensors, highlighting them as potential channels for privacy breaches. This discovery underscores...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #300 – Apple iPhone Users: Update Your iPhone iOS ASAP

We have noted before how important it is to update the operating system (OS) on your mobile phone as soon as you receive notice from the manufacturer. This week, Apple issued an update to the iOS that is considered urgent....more

Robinson+Cole Data Privacy + Security Insider

T-Mobile Clarifies Facts of Security Incident in Press Release

There has been a flurry of reporting in the past few days on the T-Mobile customer data compromise, with allegations that the compromise affected up to 100 million customers. ...more

Faegre Drinker Biddle & Reath LLP

Newly-Discovered Vulnerability Highlights the Security Concerns Surrounding Bluetooth Technology

A recent report by researchers at the Helmholz Center for Information Security (CISPA), Singapore University of Technology and Design, and the University of Oxford has revealed that Bluetooth technology is vulnerable to a new...more

Akerman LLP - HR Defense

Minimizing Risks of BYOD Use For Work

Employees seem permanently attached to their smart phones today, but allowing employees to use their personal devices to make work calls, and send and receive work emails can carry substantial risks. ...more

Hinshaw & Culbertson LLP

Protecting Your Cell Phone When a Hacker Gets Your Number

Risk Management Question - In haste, you mistakenly respond to a spoofed email that appears to be from a colleague before realizing you've just provided your cell phone number to a hacker. Or, you leave your cell phone in a...more

Gray Reed

An Employer’s Spooky Interpretation of its Bring Your Own Device (BYOD) Policy

Gray Reed on

Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - August 2018 #4

Robinson & Cole LLP on

A new ransomware, dubbed “Ryuk,” has surfaced in the last few weeks and is said to be targeting large organizations in the United States. The attackers behind Ryuk have reportedly made more than $640,000 in just two weeks,...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - May 2018 #4

Robinson & Cole LLP on

CYBERSECURITY - South Carolina Enacts Insurance Data Security Act - South Carolina Governor Henry McMaster signed the South Carolina Insurance Data Security Act into law on May 3, 2018. The law, parts of which become...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #135 – Cybersecurity Spring Cleaning Tips

Here’s a great idea offered by the National Cyber Security Alliance and the Better Business Bureau: while you are doing your spring cleaning, don’t forget to do a digital spring cleaning too—that is, your computer, cellphone...more

Husch Blackwell LLP

Recycling Business Phones: Not Always Great For Your Environment

Husch Blackwell LLP on

Recently, I counseled an employer regarding the termination of a high level HR employee. The termination wasn’t fun but the company’s termination process was followed. Unfortunately, that was the problem. The employer...more

Seyfarth Shaw LLP

Cybersecurity Best Practices

Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #7 – Who is listening to your conversations through your smartphone microphone?

I’ve always known that my smartphone had a microphone. If nothing else, it obviously has to be used for the Shazam app so I can figure out the name of that great song. So that is the only time I use the microphone on my...more

Latham & Watkins LLP

Enforcement of the Personal Data Protection Act in Singapore

Latham & Watkins LLP on

The Personal Data Protection Commission (the “Commission’) was established in January 2013 to implement and enforce The Personal Data Protection Act 2012 (“PDPA”). The PDPA fully came into force on 2 July 2014. So far, the...more

Morrison & Foerster LLP

Employment Law Commentary -- Volume 26, Issue 9, September 2014 -- California Court Warns Employers Trying To Pass The Buck...

California employers hoping to save money through a bring your-own device (BYOD) program should think twice about that objective, based on a recent California appellate decision. In Cochran v. Schwan’s Home Service, the...more

Fisher Phillips

Texting For Business On Personal Cell Phones

Fisher Phillips on

In the last few years, many industries and companies have been coming to grips with the problems posed by employees using their personal phones, tablets, or laptops for business uses. The recognition of the need to develop...more

Benesch

EXPANDED – BYOD: Where the Employee and the Enterprise Intersect

Benesch on

BYOD Yesterday And Today - The proliferation of bring your own device programs – or “BYOD” as it is commonly referred – has drastically changed today’s corporate workplace environment. Employees are availing themselves...more

Davis Wright Tremaine LLP

New Cellphone Promises Array of Built-in Privacy Features

Consumers will soon have access to a smartphone that automatically encrypts calls and texts, and provides anonymous web browsing, according to reports about the "Blackphone."...more

Mintz - Privacy & Cybersecurity Viewpoints

Privacy Monday: October 7, 2013

Despite the government shutdown, the Supreme Court is in for the 2013-2014 session. There are a couple of privacy cases on the agenda. U.S. v. Wurie and Riley v. California - At issue: Separate appeals over...more

Mintz - Privacy & Cybersecurity Viewpoints

NIST Issues Guidelines on Mobile Security

The National Institute of Standards and Technology (NIST) has issued guidelines to help federal agencies manage and secure mobile devices used by their employees for government business....more

Mintz - Privacy & Cybersecurity Viewpoints

FCC: Carriers Must Protect Certain Data Collected on Mobile Handsets

Aiming to “address the real privacy and security risks that consumers face when telecommunications carriers use their control of customers’ mobile devices to collect information about their customers’ use of the network,” the...more

23 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide