News & Analysis as of

Data Privacy Risk Management Mobile Devices

Womble Bond Dickinson

Crossing Borders with Electronics: Know Your Rights and Risks

Womble Bond Dickinson on

With increasing digitalization of our lives and businesses, privacy concerns from border searches of phones, laptops and tables are a growing concern for professionals, executives, and frequent international travelers. U.S....more

Woods Rogers

Heightened U.S. Border Scrutiny Poses Increased Digital Privacy Risk for Entrants to U.S.

Woods Rogers on

Foreign nationals visiting the United States, and even returning U.S. citizens and other legal residents (with valid visas), face increasing digital privacy risks and potential entry challenges when arriving at U.S. ports of...more

Association of Certified E-Discovery...

[Webinar] Remote Mobile Discovery: Your Secret Weapon Against Malicious Insiders - April 16th, 10:00 am PDT

Malicious insiders are the silent threats lurking within organizations—employees, contractors, or partners with privileged access who can cause devastating data breaches. With the rise of remote work and mobile-first business...more

WilmerHale

Why Depository Institutions, with or Without Affiliated Securities Firms, can and should Manage Employee Use of Personal Devices...

WilmerHale on

The purpose of this paper is to show how the failure to monitor for and prevent off-channel communications poses risk to traditional depository institutions that are not subject to the jurisdiction of securities-law...more

EDRM - Electronic Discovery Reference Model

[Webinar] Top Trends in Corporate Investigations and What to Expect in 2023 - December 15th, 1:00 pm ET

In the past two years, the scope and volume of data that needs to be collected has evolved quicker than ever before. Corporations are continuously looking for the most effective and efficient ways to stay on top of the...more

Perkins Coie

New DOJ Guidance on Personal Devices and Third-Party Messaging Applications Applies to Any Company DOJ May Scrutinize

Perkins Coie on

The U.S. Department of Justice (DOJ) recently released new guidance announcing several policy changes to further strengthen and clarify its approach to prosecuting corporate crime. The guidance, released through a memorandum...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #338 – Be Aware of Apps Infected with Malware

Like all technology, mobile apps can be infected with malicious code, or malware, that is intended to gain access to your mobile phone when you download the app. Although app stores try their best to not allow malicious apps...more

Foley Hoag LLP - Security, Privacy and the...

Key Considerations for Health App Developers from the FTC

If your company creates health-related apps, the Federal Trade Commission (FTC) has set out some key considerations: - Make accurate representations. Clearly explain how people’s information will be used and shared and then...more

Vinson & Elkins LLP

[Webinar] Navigating Privacy Rules in a Virtual World - June 17th, 10:00 am - 11:00 am PT

Vinson & Elkins LLP on

The transformation to a work from home/work from anywhere model has become the new normal and even after the pandemic ends, many expect that model to continue. This accelerated transition has forced companies to embrace...more

Hogan Lovells

SEC Releases Cybersecurity and Resiliency Observations: A Potentially Useful Guide for Businesses

Hogan Lovells on

In today’s connected world, businesses face constant pressure to improve their cybersecurity practices and to confirm that they are meeting industry standards. To continue helping businesses achieve those goals, the SEC...more

Foley & Lardner LLP

Dipping Your Toes into the Cool Waters of Consumer Devices? Complying with Key Personal Data Regulations Will Be Your Life Raft

Foley & Lardner LLP on

Connected devices, or what is referred to as the “consumer internet of things” is big business right now. Consumers want to “talk” to their devices throughout their home wherever they are, and some organizations’ business...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #128 – Basic Smartphone Settings to Thwart Hackers

When talking to colleagues and friends, it appears that folks do not understand how their smartphones work and the data that can be accessed through them. This prompted me to again give basic steps that can be used to protect...more

K2 Integrity

Cybersecurity Awareness: Limiting Your Exposure and Visibility

K2 Integrity on

We spend so much time on our mobile phones and on social media, yet often we don’t think of how these tools are broadcasting our lives as we work and play. With just a few steps, you can limit what you are digitally telling...more

13 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide