News & Analysis as of

Mobile Devices

Your Definitive Guide to the ACA Int’l Ruling: The Top 10 Things Every TCPAlander Needs to Know Now

by Dorsey & Whitney LLP on

It’s here! It’s here! It’s finally here! At last, I no longer need to field the question of “when, oh when, is the D.C. Circuit Court of Appeals going to rule on the ACA Int’l appeal of the FCC’s TCPA Omnibus ruling from...more

Does BYOD Corporate Policies Provide an Unfair Protection?

BYOD — Bring Your Own Device - Should defendants be permitted to adopt a policy concerning employee use of personal computing devices in business that benefits the defendant and then hide behind that policy to its benefit...more

FTC Report Provides Recommendations to Businesses Providing Mobile and Connected Services On Security Updates

by Reed Smith on

The Federal Trade Commission (FTC) released a report summarizing the results of its investigation into improving mobile device security, particularly in regard to releasing security updates (i.e., patches) for devices in...more

Data Privacy + Cybersecurity Insider - March 2018 #3

by Robinson & Cole LLP on

Verizon's Protected Health Information Data Breach Report Concludes that Insiders Are Greatest Threat to Health Care Entities - Verizon recently issued its Protected Health Information Data Breach Report, which is always...more

TCPA FCC Petitions Tracker

by Kelley Drye & Warren LLP on

Kelley Drye’s Communications Practice Group presents this tracker of active Telephone Consumer Protection Act (“TCPA”) petitions before the Federal Communications Commission (“FCC”). With the recent increase in litigation...more

Privacy Tip #130 – Smartphones Targeted by Dark Caracal Attack

There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more

The future is calling: “Voice over Internet Protocol” and the TCPA

One of the many criticisms of the Telephone Consumer Protection Act (TCPA), enacted in 1991, is that it has not kept pace with developments in communications technology. Instead, the Federal Communications Commission (FCC),...more

Recycling Business Phones: Not Always Great For Your Environment

by Husch Blackwell LLP on

Recently, I counseled an employer regarding the termination of a high level HR employee. The termination wasn’t fun but the company’s termination process was followed. Unfortunately, that was the problem. The employer...more

Federal Trade Commission Publishes Report Regarding Mobile Security Updates

by King & Spalding on

In May 2016, the Federal Trade Commission (“FTC”) issued Orders to File Special Reports under section 6(b) of the Federal Trade Commission Act to the major mobile device manufacturers in an effort to address concerns that...more

Being Smart with Smartphone Data: Mobile Device Data and its Impact on Modern Discovery

Mobile devices are an integral part of our lives. In just over a decade, we went from the venerable flip phone (who didn’t love sending text messages on one of those?) to handheld computers with far more processing power...more

Welcomed Draft Commentary from the Sedona Conference on BYOD

by Murtha Cullina on

Many organizations struggle with whether to permit employees to use their own electronic devices (e.g., mobile phones, tablets, laptops) to conduct business on behalf of the organization. In addition to discovery challenges...more

Privacy Tip #128 – Basic Smartphone Settings to Thwart Hackers

When talking to colleagues and friends, it appears that folks do not understand how their smartphones work and the data that can be accessed through them. This prompted me to again give basic steps that can be used to protect...more

Pennsylvania Supreme Court: If You Want to Search a Cell Phone, Get a Warrant!

by Ballard Spahr LLP on

The Pennsylvania Supreme Court recently issued a sweeping ruling “that accessing any information from a cell phone without a warrant” violates the Fourth Amendment to the United States Constitution. ...more

Get Consent to Access Personal Devices Employees Use for Work

By now, most employers are familiar with “Bring Your Own Device to Work” policies. These policies allow employees to access company information through their own computers, smartphones, tablets, etc. ...more

The Numbers Do Lie: How Thieves Can Steal Your Cell Phone Number And Wreak Havoc On Your Life

by Dickinson Wright on

If you have an online account, you are familiar with the username/password method of user authentication. If you have been paying attention to recent news stories, however, you also recognize that this method of...more

Befuddled by BYOD? The Sedona Conference Has a New Set of Principles to Guide You: eDiscovery Best Practices

by CloudNine on

Many organizations are permitting (or even encouraging) their employees to use their own personal devices to access, create, and manage company related information – a practice commonly referred to as Bring Your Own Device...more

Border Searches: Risks to Electronic Devices and Your Data

U.S. citizens who travel internationally, especially corporate executives and high-net-worth individuals, must consider and navigate data security risks when crossing a border—whether into the United States or another...more

Privacy & Cybersecurity Update - January 2018

In this month's edition of our Privacy & Cybersecurity Update, we discuss Poland's potential exemptions from the new EU data law and the Office of the Comptroller of the Currency's recommendations for U.S. banks faced with...more

Be Aware Belgium January 2018

by DLA Piper on

In this issue - - Providing computers to employees: is this necessarily considered to be part of the remuneration and thus subject to social contributions? - Who bears the burden of proof in case of...more

OIG finds incomplete CFPB response to unaccounted-for-laptops

by Ballard Spahr LLP on

The CFPB’s Office of Inspector General has issued a report indicating that, in performing an audit of the CFPB’s encryption of data on mobile devices issued to staff members, the OIG found the CFPB had not yet completed all...more

Privacy Perils: Avoiding the Spectre of a Meltdown

by Bass, Berry & Sims PLC on

You recently may have heard news reports regarding new security threats known as "Meltdown" and "Spectre." Not to be mistaken for the latest Hollywood box-office offering, these new threats allow attackers to exploit a design...more

FCC Avoids Shutdown For Now, But Continued Threat Looms Over TMT Sector

by Hogan Lovells on

The federal government is open. But less than three weeks remain under the current reprieve and another shutdown seems possible. Although the Federal Communications Commission tapped on-hand fees to support uninterrupted...more

Data Privacy + Cybersecurity Insider - January 2018 #2

by Robinson & Cole LLP on

Health Care Organizations Saw an 89% Increase in Ransomware in 2017 - Our experience last year is consistent with the conclusion of a new report issued by Cryptonite in its 2017 Health Care Cyber Research Report—that the...more

Customs and Border Patrol Issue New Rules for Searching Devices at Borders

We previously reported that U.S. Customs and Border Patrol (CBP) have been stopping U.S. citizens at the borders of the United States and demanding passwords for access to mobile devices. According to CBP, 19,051 mobile...more

Bring Your Own Device (“BYOD”) Policies

by Bryan Cave on

Many companies permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

742 Results
View per page
Page: of 30

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.