News & Analysis as of

Mobile Devices

Data Privacy + Cybersecurity Insider - January 2018 #2

by Robinson & Cole LLP on

Health Care Organizations Saw an 89% Increase in Ransomware in 2017 - Our experience last year is consistent with the conclusion of a new report issued by Cryptonite in its 2017 Health Care Cyber Research Report—that the...more

Customs and Border Patrol Issue New Rules for Searching Devices at Borders

We previously reported that U.S. Customs and Border Patrol (CBP) have been stopping U.S. citizens at the borders of the United States and demanding passwords for access to mobile devices. According to CBP, 19,051 mobile...more

Bring Your Own Device (“BYOD”) Policies

by Bryan Cave on

Many companies permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

Privacy Tip #119 – Getting the Newest Smartphone as a Gift? Take Care When Downloading Apps

‘Tis the season for gift giving. Smartphones and mobile devices are a hot item during the holidays. The first thing many people do when they get a new phone or device is to start downloading apps. Since there will be a lot of...more

Rosebud Asserts Growing Patent Portfolio Against Salesforce’s Quip

by Shook, Hardy & Bacon L.L.P. on

In November 2017, Rosebud filed a patent lawsuit against Salesforce asserting that Salesforce’s Quip product allegedly infringes two of Rosebud’s patents. Quip is a popular cloud-based collaborative software suite built for...more

Data Privacy + Cybersecurity Insider - December 2017 #3

by Robinson & Cole LLP on

Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more

HomeKit Vulnerability: One More Reason to Accept New iOS 11.2

Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more

Text Messages: Preservation Lessons for Mobile E-Discovery

There was a time when the only data you needed to collect in response to a discovery request was corporate email. Even if you received or sent work emails from your phone, this data would be located on a corporate server and...more

Call Waiting? Challengers Continue to Await Ruling in Appeal of 2015 TCPA Order

We continue to await a ruling from the US Court of Appeals for the DC Circuit in the appeal of the Federal Communications Commission’s (FCC) July 2015 Omnibus Telephone Consumer Protection Act (TCPA) Declaratory Ruling and...more

How Employers Can Become Experts at Data Breaches: Lost Laptops and USBs

by Bryan Cave on

A large portion of the data breaches that occur each year involve human resource related information. Bryan Cave has put together a multi-part series to help human resource managers understand, prepare for, and react to, a...more

A Holiday Gift for Employers: NLRB Hands Down New Book for Employee Handbooks

by Faegre Baker Daniels on

In a 3-2 decision in The Boeing Company, 365 NLRB No. 154 (Dec. 14, 2017), the National Labor Relations Board (Board) backed away from 13 years of employee-friendly precedent concerning rules, policies and handbooks by...more

The Data Report: Data Security for Travelers

by Bilzin Sumberg on

This week on The Data Report, Litigation attorney Jay Ward discusses data security for travelers. He highlights tips for maintaining your privacy while on the road, including using a VPN and only accessing webmail from a...more

Ninth Circuit Rejects VPPA Claims of Roku Channel User, Declining to Adopt Broad Definition of PII

In a decision that clarified aspects of the video privacy landscape, the Ninth Circuit affirmed the dismissal of an action alleging a violation of the Video Privacy Protection Act (VPPA) based on an assertion that ESPN’s...more

Internet of Things Issues Guide

by Hogan Lovells on

Devices that formerly existed in only the physical world are now entering the digital world, and as a result, the Internet of Things (IOT) is here. Both familiar and unfamiliar objects are part of the IOT: toothbrushes...more

Is Your Company Car Exposing Sensitive Data To Hackers?

by Fisher Phillips on

In today’s world, where lots of sensitive data are stored electronically, prudent companies utilize sophisticated computer cyber security systems to prevent the hacking of such data. They likely also require employees to...more

The Rise of Smartphone-Fueled, Social-Media-Addicted Smartphone Zombies

by Shipman & Goodwin LLP on

Yesterday, I had the opportunity to speak to the IASA Northeastern Conference on a favorite topic of mine of late — Privacy and Data Breaches in the workplace. Of course, that sounds kinda of boring....more

BYOD (Bring Your Own Device) Policies and Best Practices

Some of us may remember a time when companies were not as concerned about where their information was maintained, as most of it was kept in some form or fashion in file cabinets or individual desks, or perhaps stored offsite...more

Companies today need to routinely assess their wireless network connectivity options related to their products and overall...

by Hogan Lovells on

In this hoganlovells.com interview, Hogan Lovells partner Trey Hanbury talks about the need for wireless carriers to broaden their offerings to meet the demands of an increasing number of niche markets. At the same time,...more

Latest OCR Cybersecurity Newsletter Tackles Mobile Devices

The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) released its October Cybersecurity Newsletter last week with a focus on mobile devices. Given the amount of work conducted on mobile devices...more

Top 10 Tips for Cybersecurity Employee Training

by Bennett Jones LLP on

Any system is only as strong as its weakest link. If your employees aren’t up to date on their cybersecurity hygiene, then it doesn’t matter how much money you spend on technological defences—there’s a gap in your protection....more

Protecting Kids' Information Under the COPPA Cabana

In August 2017, Disney and three of its software developer vendors were sued in a class action in California in which it was alleged that Disney collected children’s information in violation of the Children's Online Privacy...more

Behavioral Advertising Company That Dropped “Zombie” Cookies Can’t Use Verizon’s Arbitration Clause To Avoid Class Action Lawsuit

The 9th Circuit Court of Appeals ruled that a non-party online behavioral advertising firm could not benefit from the arbitration clause in the agreement between Verizon and its customers because it was not a party to that...more

Data Privacy + Cybersecurity Insider - October 2017 #3

by Robinson & Cole LLP on

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more

“KRACK” WiFi Security Vulnerability Discovered

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more

ALJ Finds Violation in Mobile Device Holders Investigation

by Jones Day on

ALJ Pender’s initial determination in Certain Mobile Device Holders and Components Thereof, Inv. No. 337-TA-1028 (Sept. 12, 2017), finding a violation of Section 337, provides important guidance on what investments count...more

720 Results
|
View per page
Page: of 29
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.