What's the Tea in L&E? Employee Devices: What is #NSFW?
Hybrid Workforces and Compliance with Sheila Limmroth
Sitting with the C-Suite: How Do Corporations Manage the Convergence of Data during Remote Work?
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
The purpose of this paper is to show how the failure to monitor for and prevent off-channel communications poses risk to traditional depository institutions that are not subject to the jurisdiction of securities-law...more
Hybrid work is likely here to say, and, as Sheila Limmroth, privacy specialist at DCH Health System, and the author of the chapter Hybrid Work Environment in the Complete Healthcare Compliance Manual observes in this...more
Partner Reece Hirsch recently attended and spoke at the 2020 Health Datapalooza held in Washington, DC. This year, Health Datapalooza was co-located with the National Health Policy Conference, providing attendees with an...more
At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more
It has been reported by Troy Hunt, the security researcher who provides the "Have I Been Pwned" free breach notification service, that 1.4 million passwords and personal information of customers of GateHub, a cryptocurrency...more
Security researchers have warned municipalities repeatedly about how they are being targeted with ransomware, that they are at high risk, and the need to make data security a high priority. Please see full Publication blow...more
The European Telecommunications Standards Institute (ETSI) has published a new standard for cybersecurity in relation to consumer IoT products. The standard builds on the UK’s Code of Practice for Consumer IoT Security,...more
If your organization embraces (or simply allows!) the use of mobile devices for the workplace, the natural tradeoff you’re making for increased productivity, efficiency and convenience is an increase in cybersecurity risks to...more
The EU’s General Data Protection Regulation (GDPR), which went into effect in May 2018, requires companies to implement appropriate security measures when handling personal data....more
When was the last time your organization did an assessment of its cybersecurity preparedness? October was designated as Cybersecurity Awareness Month. Even though October is coming to a close, it is important to continue your...more
October is Cybersecurity awareness month. Now is a better time than ever to look at your current practices at the office and even at home. It is important to know that we all play a role in keeping our work and personal data...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more
Cybersecurity and protection of personal data are increasingly to the forefront of concerns for pension trustees. The European General Data Protection Regulation (GDPR), applicable in the UK from 2018, will impose additional...more
All enterprises are struggling with the security risks posed by the use of mobile devices by employees. Companies want their employees to have easy access to information so that they can perform their job functions in an...more
In the span of two days, mobile device users learned of two data breaches that could compromise their personal data. In one, Experian (a credit reporting agency) reported that it was hacked, potentially putting 15 million...more
The National Futures Association (“NFA”) submitted to the Commodity Futures Trading Commission (“CFTC”) on August 28, 2015 a proposed Interpretive Notice (“Proposed Guidance”) for CFTC’s approval, which provides guidance to...more
It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more
The National Institute of Standards and Technology (NIST) cybersecurity center released a draft guide last week for health IT professionals to use to bolster security for the use of mobile devices in the health care industry....more
A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more
So your employee wants to use his new iPhone5S to respond to work emails while on vacation. As an employer, you’re thrilled. You don’t have to pay for the technology (or the data plan), but your employee is now accessible...more
Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more