News & Analysis as of

Laptop Computers Mobile Devices

EDRM - Electronic Discovery Reference Model

[Webinar] Important eDiscovery Case Law Decisions for August 2023 - August 30th, 1:00 pm - 2:00 pm ET

It’s not a heat wave, it’s a wave of hot eDiscovery case law disputes! Our August 2023 monthly webinar of cases covered by the eDiscovery Today blog discusses six disputes including a motion to compel a forensic examination...more

Fox Rothschild LLP

The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics

Fox Rothschild LLP on

Cell phones, tablets, laptops… your digital fingerprint can be more extensive than you realize. Dive deep into computer forensics as Lacey Walker, Jr., President of the Computer Forensics Practice LLC, and Matthew Adams,...more

Faegre Drinker Biddle & Reath LLP

Proposal to Include the Right to Disconnect to the Luxembourg Labor Code

On April 30, 2021, the Luxembourg Economic and Social Council (Conseil économique et social, “CES”) issued an opinion on the right to disconnect. In its opinion, the CES recommended that a new provision, L. 312-9, entitled...more

Holland & Hart - Health Law Blog

Encrypt Your Devices or Face HIPAA Penalties

This week, the Office for Civil Rights (“OCR”) announced a $3,000,000 HIPAA settlement arising from a medical center’s loss of an unencrypted laptop and flash drive. This is simply the latest of many HIPAA settlements based...more

Jackson Lewis P.C.

Cost And Benefit Analysis Of Bring Your Own Device Programs

Jackson Lewis P.C. on

An increasing number of companies have adopted Bring Your Own Device (“BYOD”) programs. Under a BYOD program, companies permit employees to connect their personal devices (e.g. laptops, smartphones, and tablets) to the...more

BakerHostetler

Best Cybersecurity Practices for Healthcare Organizations – Loss or Theft of Devices

BakerHostetler on

This article is part of a series of blog posts exploring the recommendations and guidance Health & Human Services (HHS) provides to healthcare organizations in its Cybersecurity Best Practices report. The report on...more

Ballard Spahr LLP

OIG finds incomplete CFPB response to unaccounted-for-laptops

Ballard Spahr LLP on

The CFPB’s Office of Inspector General has issued a report indicating that, in performing an audit of the CFPB’s encryption of data on mobile devices issued to staff members, the OIG found the CFPB had not yet completed all...more

Butler Snow LLP

Update for International Travelers: Flying with Computers and Smartphones (this week)

Butler Snow LLP on

So the landscape—like dunes—shifts yet again…at least regarding what you can and can’t carry onto international flights…well, some of them anyway. Just last week, and driven by DHS’s own acknowledgement that the measure was...more

Robinson+Cole Data Privacy + Security Insider

To Travel With My Laptop …or Not!

Tricky decision to make if you are among the millions that travel for work…. how safe is it? Will the new “laptop travel ban” affect me? What airports am I connecting through that are of concern? Is public Wi-Fi secure? Did...more

Perkins Coie

Another HIPAA Settlement: Stolen Laptop Costs $2.5 Million Plus Encryption Requirement

Perkins Coie on

The U.S. Department of Health and Human Services (HHS) recently announced yet another HIPAA privacy and security settlement involving Protected Health Information (PHI) on a stolen laptop. Although this might be seen as just...more

Ruder Ware

Lessons from OCR HIPAA Settlements - Mobile Device Security Standards

Ruder Ware on

In the first known case involving a wireless provider, a cardiology service provider agreed to pay a $2.5 million settlement based on the impermissible disclosure of unsecured electronic protected health information (ePHI)....more

Baker Donelson

Eight Keys to Securing Portable Devices

Baker Donelson on

Securing physical worksites and workspaces is by now old hat. We all know file cabinets should be locked, worksites secured and personal access to information monitored. Securing portable devices, however, often receives less...more

Robinson+Cole Data Privacy + Security Insider

The Truth in Mac Security

For decades, it has been assumed that MacBook and iPhone devices are hack proof and virus free. Their advertisements and claims for being indestructible were never questioned. Yet, nothing is truly immune to intrusion....more

McNees Wallace & Nurick LLC

Data Privacy Day brings reminder that businesses should require encryption on laptops and mobile devices

Data Privacy Day was January 28th – the annual event, coordinated by the National Cyber Security Alliance, celebrates the signing in 1981 of the first international treaty addressing privacy and data protection. On...more

Orrick, Herrington & Sutcliffe LLP

When Employees Leave With Your Secrets

Recently I shared the podium with an FBI agent who was asked what frustrated him the most when trying to help businesses with trade secret theft. His answer was a surprise: they fire the guy too fast! He explained that when...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #53 – Valuable Lesson: Don’t Write Down Passwords

I have been doing a lot of live employee training lately. I really enjoy it, and have been told that it is some of the most entertaining training around. The reason why I can get the audience to laugh is because I tell real...more

Robinson+Cole Data Privacy + Security Insider

Oregon Health & Science University pays $2.7M penalty for data breaches

Oregon Health & Science University (OHSU) has agreed to settle alleged HIPAA violations involving two separate data breaches with the Office for Civil Rights (OCR) for $2.7 million. In the span of three months in 2013,...more

King & Spalding

New California Law Expands Privacy Rights Applicable To Electronic Data

King & Spalding on

On October 8, 2015, California Governor Jerry Brown signed into law the California Electronic Communications Privacy Act (“CalECPA” or the “Act”), sponsored by Senator Mark Leno (D-San Francisco). The Act requires law...more

18 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide