What's the Tea in L&E? Employee Devices: What is #NSFW?
Hybrid Workforces and Compliance with Sheila Limmroth
Sitting with the C-Suite: How Do Corporations Manage the Convergence of Data during Remote Work?
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
The purpose of this paper is to show how the failure to monitor for and prevent off-channel communications poses risk to traditional depository institutions that are not subject to the jurisdiction of securities-law...more
When it comes to discovery of mobile devices, organizations today must consider being proactive regarding how mobile devices of their employees and contractors are managed and what rights they have regarding the storage and...more
What’s the Tea in L&E is a video series focused on the latest trends and updates in labor and employment law. In this short video, Woods Rogers L&E attorneys Leah Stiegler and Emily Kendall Chowhan discuss what content is...more
While romance might be viewed as a personal matter, an employee falling for a romance scam can have a direct impact on an organization’s bottom line. Not only could their performance suffer, but a criminal may try to steal...more
I have the pleasure to present an advanced session on cybersecurity to tax preparers at the IRS’ National Tax Preparers Forum each year. The sessions are well attended, and I enjoy meeting attendees and talking about the...more
Many organizations give employees the ability to work from anywhere, adding convenience and flexibility to work and personal schedules. However, with this flexibility comes responsibility—the responsibility to protect the...more
Google recently got in hot water over employees’ cavalier attitudes toward a litigation hold. The tech giant took a largely hands-off approach to preserving internal chats needed for discovery in a lawsuit. Google employees...more
Is it time to revisit your organization’s Bring Your Own Device (BYOD) policies? The answer to this question is subjective, but doing so can be beneficial as the workforce and productivity behaviors change. Having a BYOD...more
Previously, we analyzed the proper scope for discovery requests that asked for employee drug and alcohol test results. In this article, we analyze a far more potent discovery substance—cell phone data....more
Apple has issued new guidelines for apps that let people create accounts. The guidelines will require these apps to give people a way to delete their accounts. This requirement is broader than CCPA and GDPR deletion rights,...more
While smart toys can certainly be useful educational tools for children, they also present some potential privacy risks and could invade what is traditionally a private space. Think about it—the thought of your child’s toy...more
Many companies have implemented Bring Your Own Device (“BYOD”) policies. For some, it has been years since they were put in place. Has your policy withstood the test of time? Employees are using their devices differently than...more
Mandi Ross, the CEO of both Prism Litigation Technology and Insight Optix, has about 35 years of experience in the eDiscovery space. She started as a paralegal, and has worked as an expert and consultant. She previously...more
After a long quiet period, the second HIPAA settlement to be announced by the U.S. Department of Health and Human Services (HHS) in an orchestrated one-two punch was far more costly to the second violator. Lifespan Health...more
At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more
Part 1: California Laws Impacting Public Agencies for 2020 - How do the laws passed last year by California lawmakers impact how public agencies do business in the new year? In this annual Legal Alert series, Best Best &...more
SDNY Rejects Standing under “Increased Risk” Theory Where Data Not Targeted or Stolen - The Southern District of New York rejected a settlement that would have resolved a class action based on the unauthorized (and...more
Holiday shopping is in full gear and everything seems to be an Internet of Things (IoT) device. It continues to amaze me how folks will buy IoT gadgets and plop them in their homes and have no idea that they include a speaker...more
As most of you know, I rarely download an app. However, here’s one I just downloaded and here’s why. The Jumbo Privacy app, available in the Apple store, is all about providing consumers with a way to audit their privacy and...more
I once again had the pleasure of presenting Cybersecurity for Tax Professionals at the IRS Nationwide Tax Forum today. The conference is designed for tax professionals in small- to medium-sized businesses....more
While we have been talking about the very important message of educating employees about data security, I find that giving employees tips about their personal data security keeps them interested and engaged during education...more
If your organization embraces (or simply allows!) the use of mobile devices for the workplace, the natural tradeoff you’re making for increased productivity, efficiency and convenience is an increase in cybersecurity risks to...more
Last week’s Privacy Tip centered on how our cell phone geolocation data is being sold by the telephone companies Cell Phone Geolocation Data Being Sold. ...more
The Federal Bureau of Investigation (FBI) released a Public Service Announcement on August 2, 2018, entitled “Cyber Actors Use Internet of Things Devices as Proxies for Anonymity and Pursuit of Malicious Cyber Activities,”...more
If you have bought a new cell phone recently, you will see that the technology of the newest smart phones is far more advanced than in the past, and have features on them that most people don’t understand or use....more