News & Analysis as of

Mobile Devices Risk Assessment

Woods Rogers

What's the Tea in L&E? Employee Devices: What is #NSFW?

Woods Rogers on

What’s the Tea in L&E is a video series focused on the latest trends and updates in labor and employment law. In this short video, Woods Rogers L&E attorneys Leah Stiegler and Emily Kendall Chowhan discuss what content is...more

Array

This Week in eDiscovery: The Duty to Preserve Ephemeral App Data, Employee Compliance with Electronic Communication Rules

Array on

Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the week of July 8-14. Here’s what’s...more

Pullman & Comley, LLC

ALERT - CT Legislative Update

Pullman & Comley, LLC on

The 2018 Regular Session of the Connecticut General Assembly passed bills that, among other things: (1) revise the Student Data Privacy Act; (2) address budgetary issues stemming from attempts at reducing and rescinding...more

Ruder Ware

Lessons from OCR HIPAA Settlements - Mobile Device Security Standards

Ruder Ware on

In the first known case involving a wireless provider, a cardiology service provider agreed to pay a $2.5 million settlement based on the impermissible disclosure of unsecured electronic protected health information (ePHI)....more

Sherman & Howard L.L.C.

Healthcare Advisory: HHS Announces First Settlement with a Wireless Health Services Provider

On April 24, 2017, the Department of Health and Human Services, Office of Civil Rights (“OCR”), announced its first settlement with a wireless health services provider, CardioNet, Inc., for alleged violations of the Health...more

NAVEX

Real Answers to Common Questions on Cybersecurity

NAVEX on

Q: In my company, the IT directors see cybersecurity as an IT and software issue to be solved with software and hardware. How do I convince the team that employees need to also be trained on risky behavior – something that...more

Robinson+Cole Data Privacy + Security Insider

Survey Shows Employees Top Security Risk for Companies

A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more

Davis Wright Tremaine LLP

Time for a HIPAA Security Check-Up!

The 2015 HIPAA Security conference held by the National Institute of Standards and Technology (“NIST”) and the U.S. Department of Health and Human Services, Office for Civil Rights (“OCR”) kicked off last week with OCR’s...more

Bennett Jones LLP

Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs

Bennett Jones LLP on

An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more

Pillsbury Winthrop Shaw Pittman LLP

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

NAVEX

Seven Training Imperatives to Address Your Biggest Cyber Security Risk: Employee Behavior

NAVEX on

One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more

Locke Lord LLP

Federal Trade Commission Guidance on the Internet of Things

Locke Lord LLP on

On January 27, 2015, the FTC released its Staff Report on the so-called “Internet of Things” (IoT) – the ability of everyday objects (from refrigerators to wearable devices) to connect to the Internet and send and receive...more

Davis Wright Tremaine LLP

Mobile Application: Security Best Practices

The industry for mobile applications is growing rapidly. As companies and independent developers look to gain—or strengthen—footholds in this competitive space, the Federal Trade Commission (FTC) asks, “… is security keeping...more

13 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide