News & Analysis as of

Mobile Devices Risk Management

Womble Bond Dickinson

Crossing Borders with Electronics: Know Your Rights and Risks

Womble Bond Dickinson on

With increasing digitalization of our lives and businesses, privacy concerns from border searches of phones, laptops and tables are a growing concern for professionals, executives, and frequent international travelers. U.S....more

Woods Rogers

Heightened U.S. Border Scrutiny Poses Increased Digital Privacy Risk for Entrants to U.S.

Woods Rogers on

Foreign nationals visiting the United States, and even returning U.S. citizens and other legal residents (with valid visas), face increasing digital privacy risks and potential entry challenges when arriving at U.S. ports of...more

Womble Bond Dickinson

More States Ban Foreign AI Tools on Government Devices

Womble Bond Dickinson on

Alabama and Oklahoma have become the latest states to ban from state-owned devices and networks certain AI tools with links to foreign governments. ...more

Association of Certified E-Discovery...

[Webinar] Remote Mobile Discovery: Your Secret Weapon Against Malicious Insiders - April 16th, 10:00 am PDT

Malicious insiders are the silent threats lurking within organizations—employees, contractors, or partners with privileged access who can cause devastating data breaches. With the rise of remote work and mobile-first business...more

WilmerHale

Why Depository Institutions, with or Without Affiliated Securities Firms, can and should Manage Employee Use of Personal Devices...

WilmerHale on

The purpose of this paper is to show how the failure to monitor for and prevent off-channel communications poses risk to traditional depository institutions that are not subject to the jurisdiction of securities-law...more

Ropes & Gray LLP

New Year, New Threats: Practical Tips for Secure Communications after Salt Typhoon

Ropes & Gray LLP on

As a recent DataPhiles post explored, the threat to telecommunications infrastructure and private call records posed by foreign threat actors only continues to grow. In fact, at least one U.S. government agency has urged...more

Cimplifi

Going Mobile: Device Management Policies and Mobile Device Management (MDM) Solutions

Cimplifi on

When it comes to discovery of mobile devices, organizations today must consider being proactive regarding how mobile devices of their employees and contractors are managed and what rights they have regarding the storage and...more

Woods Rogers

What's the Tea in L&E? Employee Devices: What is #NSFW?

Woods Rogers on

What’s the Tea in L&E is a video series focused on the latest trends and updates in labor and employment law. In this short video, Woods Rogers L&E attorneys Leah Stiegler and Emily Kendall Chowhan discuss what content is...more

EDRM - Electronic Discovery Reference Model

Revolutionary Smartphone Data Collection Technology Helps Corporations Enforce and Comply with Regulatory Rules

The use of smartphones in the workplace is commonplace. Smartphones can offer many benefits to employees and employers, such as increased productivity, communication, collaboration, and flexibility. Hence, many companies...more

Nelson Mullins Riley & Scarborough LLP

Beware of Scams that Hijack Cellphone Accounts: The Importance of Authentication for Businesses and Consumers: Privacy Day...

Consumers use cell phone numbers to authenticate their identities across a variety of accounts, such as those held with wireless providers, financial institutions, healthcare providers, and retail websites. One common example...more

Sheppard Mullin Richter & Hampton LLP

2024 Top-of-Mind Issues for Life Sciences Companies

As we reflect on 2023 and make predictions for 2024, it is remarkable the number of significant events occurring this past year that will be impactful for the activities of the life sciences industry going forward. Although...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #367 – Update your Apple Operating System to 16.6 NOW

On Monday, July 24, 2023, Apple issued a security update to address vulnerabilities that have been linked to a spyware campaign. iOS 16.6 fixes 25 iPhone security flaws, several of which are being exploited by threat actors...more

Guidepost Solutions LLC

Compliance Experts Discuss Off-Channel Communications and Mobile Surveillance Policies

Roundtable Discussion: Off-Channel Communications and Mobile Surveillance Policies - Surveillance, monitoring, escalation, and reporting are critical components to regulatory compliance and risk management. So is...more

Perkins Coie

DOJ Issues New Guidance on Use of Personal Devices and Third-Party Messaging Applications

Perkins Coie on

The U.S. Department of Justice (DOJ) announced significant new guidance on March 3, 2023, regarding the use of personal devices and the retention of corporate communications. The DOJ’s concern regarding the use of personal...more

EDRM - Electronic Discovery Reference Model

[Webinar] Top Trends in Corporate Investigations and What to Expect in 2023 - December 15th, 1:00 pm ET

In the past two years, the scope and volume of data that needs to be collected has evolved quicker than ever before. Corporations are continuously looking for the most effective and efficient ways to stay on top of the...more

Perkins Coie

New DOJ Guidance on Personal Devices and Third-Party Messaging Applications Applies to Any Company DOJ May Scrutinize

Perkins Coie on

The U.S. Department of Justice (DOJ) recently released new guidance announcing several policy changes to further strengthen and clarify its approach to prosecuting corporate crime. The guidance, released through a memorandum...more

K&L Gates LLP

Where the United States Goes, the FCA Will Inevitably Follow: Regulatory Action Against the Use of Personal Mobile Devices

K&L Gates LLP on

The ability to maintain effective and accurate recordkeeping, a key method of ensuring market integrity, has been tested in recent years. The widespread use of personal mobile devices, instant messaging services, and general...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #338 – Be Aware of Apps Infected with Malware

Like all technology, mobile apps can be infected with malicious code, or malware, that is intended to gain access to your mobile phone when you download the app. Although app stores try their best to not allow malicious apps...more

Foley Hoag LLP - Security, Privacy and the...

Key Considerations for Health App Developers from the FTC

If your company creates health-related apps, the Federal Trade Commission (FTC) has set out some key considerations: - Make accurate representations. Clearly explain how people’s information will be used and shared and then...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #308 – Keep the Holiday Shopping Season Cyber Safe

As we enter the holiday shopping season, cyber criminals are sharpening their cyber-scam strategies. We like to remind our readers about the enhanced risk during the holidays. There has been an increase in online shopping...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #300 – Apple iPhone Users: Update Your iPhone iOS ASAP

We have noted before how important it is to update the operating system (OS) on your mobile phone as soon as you receive notice from the manufacturer. This week, Apple issued an update to the iOS that is considered urgent....more

Robinson+Cole Data Privacy + Security Insider

Apple Issues Patches: Apply Them Now and Alert Your Employees to Do the Same

Earlier this week, Apple issued another patch—this one is said to address a reported vulnerability that “an application may be able to execute arbitrary code with kernel privileges.” According to Apple, it “is aware of a...more

Vinson & Elkins LLP

[Webinar] Navigating Privacy Rules in a Virtual World - June 17th, 10:00 am - 11:00 am PT

Vinson & Elkins LLP on

The transformation to a work from home/work from anywhere model has become the new normal and even after the pandemic ends, many expect that model to continue. This accelerated transition has forced companies to embrace...more

Hogan Lovells

UK Government calls for feedback on regulation of IoT device security

Hogan Lovells on

Following the UK Government's announcement in January 2020 that it would be moving forwards with regulation on consumer IoT device security, the Government has now published its legislative proposals and is seeking feedback...more

Kramer Levin Naftalis & Frankel LLP

Cybersecurity: the SEC Provides Guidance on Well-Known and Emerging Best Practices

At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more

62 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide