News & Analysis as of

Mobile Devices Risk Mitigation

BakerHostetler

Let’s Get Physical - OCR Issues Reminder that HIPAA Security Isn’t Just Technical

BakerHostetler on

While most entities that are subject to the HIPAA Security Rule spend considerable time and effort ensuring that they have implemented appropriate administrate and technical safeguards to protect the health information that...more

BakerHostetler

Viral Layoffs: Important Considerations for Employment Actions in the Digital Age

BakerHostetler on

Social media usage remains ubiquitous in 2024, and a recent trend sees the increased use of social media by employees to document their experiences with layoffs and disciplinary actions in the workplace. ...more

HaystackID

[Webinar] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and Teams -...

HaystackID on

The digital landscape is constantly evolving, and with it, the challenges faced by digital forensics and eDiscovery collections professionals. Join our expert panel as they discuss targeted remote collections for iOS and...more

Association of Certified E-Discovery...

[Webinar] Remote Mobile Collections for Corporate Investigations - October 5th, 1:00 pm - 1:30 pm EDT

95% of all corporate investigations include message and conversation data as key evidence. When gathering this crucial data from employees’ mobile phones, are you having to ship equipment or struggling with lengthy support...more

Vinson & Elkins LLP

[Webinar] Navigating Privacy Rules in a Virtual World - June 17th, 10:00 am - 11:00 am PT

Vinson & Elkins LLP on

The transformation to a work from home/work from anywhere model has become the new normal and even after the pandemic ends, many expect that model to continue. This accelerated transition has forced companies to embrace...more

Constangy, Brooks, Smith & Prophete, LLP

Digital Workplace Issues

Our increasingly connected world presents tremendous opportunities for employers as well as considerable confusion and risk. Should you Google a job applicant? Allowing employees to use their own mobile devices for work...more

Mitratech Holdings, Inc

Cyberattacks, Fraud and Getting to the Root of it All

Just how many counts of fraud attacks occurred in the first quarter of 2018? These results from ThreatMetrix uncovered some alarmingly high numbers, including...more

Snell & Wilmer

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Snell & Wilmer on

Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more

Bass, Berry & Sims PLC

Privacy Perils: Avoiding the Spectre of a Meltdown

Bass, Berry & Sims PLC on

You recently may have heard news reports regarding new security threats known as "Meltdown" and "Spectre." Not to be mistaken for the latest Hollywood box-office offering, these new threats allow attackers to exploit a design...more

Ruder Ware

Lessons from OCR HIPAA Settlements - Mobile Device Security Standards

Ruder Ware on

In the first known case involving a wireless provider, a cardiology service provider agreed to pay a $2.5 million settlement based on the impermissible disclosure of unsecured electronic protected health information (ePHI)....more

Patterson Belknap Webb & Tyler LLP

On the Move and At Risk: Safeguards for Mitigating Mobile Device Vulnerabilities While Traveling Overseas

Employees use their smartphones as a key tool for accessing information during a work day – especially when outside the office and traveling on business. While smartphones, tablets, laptops and other devices may increase...more

Bennett Jones LLP

Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs

Bennett Jones LLP on

An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more

Pillsbury Winthrop Shaw Pittman LLP

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

13 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide