News & Analysis as of

Mobile Devices

The Data Report: Data Security for Travelers

by Bilzin Sumberg on

This week on The Data Report, Litigation attorney Jay Ward discusses data security for travelers. He highlights tips for maintaining your privacy while on the road, including using a VPN and only accessing webmail from a...more

Ninth Circuit Rejects VPPA Claims of Roku Channel User, Declining to Adopt Broad Definition of PII

In a decision that clarified aspects of the video privacy landscape, the Ninth Circuit affirmed the dismissal of an action alleging a violation of the Video Privacy Protection Act (VPPA) based on an assertion that ESPN’s...more

Internet of Things Issues Guide

by Hogan Lovells on

Devices that formerly existed in only the physical world are now entering the digital world, and as a result, the Internet of Things (IOT) is here. Both familiar and unfamiliar objects are part of the IOT: toothbrushes...more

Is Your Company Car Exposing Sensitive Data To Hackers?

by Fisher Phillips on

In today’s world, where lots of sensitive data are stored electronically, prudent companies utilize sophisticated computer cyber security systems to prevent the hacking of such data. They likely also require employees to...more

The Rise of Smartphone-Fueled, Social-Media-Addicted Smartphone Zombies

by Shipman & Goodwin LLP on

Yesterday, I had the opportunity to speak to the IASA Northeastern Conference on a favorite topic of mine of late — Privacy and Data Breaches in the workplace. Of course, that sounds kinda of boring....more

BYOD (Bring Your Own Device) Policies and Best Practices

Some of us may remember a time when companies were not as concerned about where their information was maintained, as most of it was kept in some form or fashion in file cabinets or individual desks, or perhaps stored offsite...more

Companies today need to routinely assess their wireless network connectivity options related to their products and overall...

by Hogan Lovells on

In this hoganlovells.com interview, Hogan Lovells partner Trey Hanbury talks about the need for wireless carriers to broaden their offerings to meet the demands of an increasing number of niche markets. At the same time,...more

Latest OCR Cybersecurity Newsletter Tackles Mobile Devices

The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) released its October Cybersecurity Newsletter last week with a focus on mobile devices. Given the amount of work conducted on mobile devices...more

Protecting Kids' Information Under the COPPA Cabana

In August 2017, Disney and three of its software developer vendors were sued in a class action in California in which it was alleged that Disney collected children’s information in violation of the Children's Online Privacy...more

Behavioral Advertising Company That Dropped “Zombie” Cookies Can’t Use Verizon’s Arbitration Clause To Avoid Class Action Lawsuit

The 9th Circuit Court of Appeals ruled that a non-party online behavioral advertising firm could not benefit from the arbitration clause in the agreement between Verizon and its customers because it was not a party to that...more

Data Privacy + Cybersecurity Insider - October 2017 #3

by Robinson & Cole LLP on

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more

“KRACK” WiFi Security Vulnerability Discovered

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more

ALJ Finds Violation in Mobile Device Holders Investigation

by Jones Day on

ALJ Pender’s initial determination in Certain Mobile Device Holders and Components Thereof, Inv. No. 337-TA-1028 (Sept. 12, 2017), finding a violation of Section 337, provides important guidance on what investments count...more

Cybersecurity Awareness: Limiting Your Exposure and Visibility

We spend so much time on our mobile phones and on social media, yet often we don’t think of how these tools are broadcasting our lives as we work and play. With just a few steps, you can limit what you are digitally telling...more

Recording Conversations with Your Cellphone: with Great Power Comes Potential Legal Liability

by Varnum LLP on

In the cellphone age, nearly everyone walks around with a multi-tasking recording device in their pocket or purse, and it comes in handy for many of our modern problems: Your dog suddenly started doing something adorable?...more

Cybersecurity Best Practices

by Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

Third Parties Fail To Force Arbitration in Three Circuits

The “Summer of Arbitration” draws to a close today, if you can believe it. (On the first day of fall, it is supposed to be 91 degrees in Minnesota. Yikes.) But before I close that chapter, let’s take a look at a theme that...more

Web Exclusive: Should Employees Receive Compensation For Off-The-Clock Cell Phone Use?

by Fisher Phillips on

You might hate to admit it, but it’s true: mobile devices are the adult version of a toddler’s teddy bear. They give us comfort and a sense of belonging. We carry them everywhere and traveling without them makes us feel like...more

Distracted Driving Increases Number of California Car Accidents

California is cracking down on distracted driving, especially in the form of texting and driving. If you are behind the wheel in California, you are now no longer able to hold your cell phone in your hand for any reason. This...more

Second Circuit Upholds Uber’s Mobile Contracting Process, Establishing Template for Mobile Online Contracting

In recent years, courts have issued varying rulings as to whether online or mobile users adequately consented to user agreements or terms of service when completing an online purchase or registering for a service. In each...more

Retailers Should Be Aware of Data Privacy Concerns With Bring Your Own Device Policies

by Bryan Cave on

Many retailers permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

Privacy Tip #103 – Smartphone Replacement Parts Subject to Hacking

You drop your smartphone and now there are a million cracks and you can hardly read your texts. Getting the screen replaced by the manufacturer of the phone is usually expensive and sometimes it is so expensive that it makes...more

Bring Your Own Device (“BYOD”) Policies

by Bryan Cave on

Many companies permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

Privacy Perils: Weather Apps Tracking more than Weather Patterns

by Bass, Berry & Sims PLC on

If you're like millions of Americans, you use the AccuWeather app for iOS to keep up to date about whether the weekend's forecast means fun in the sun or hiding out from the rain. It turns out that AccuWeather may have been...more

Another Federal Appeals Court Rejects Workplace Recording Bans

by Fisher Phillips on

The 5th Circuit Court of Appeals recently became the second federal appeals court this year to hold that an employer’s rule prohibiting recording in the workplace violates the National Labor Relations Act (NLRA). In a July 25...more

708 Results
|
View per page
Page: of 29
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.