News & Analysis as of

Risk Management Mobile Devices Mobile Device Management

WilmerHale

Why Depository Institutions, with or Without Affiliated Securities Firms, can and should Manage Employee Use of Personal Devices...

WilmerHale on

The purpose of this paper is to show how the failure to monitor for and prevent off-channel communications poses risk to traditional depository institutions that are not subject to the jurisdiction of securities-law...more

Cimplifi

Going Mobile: Device Management Policies and Mobile Device Management (MDM) Solutions

Cimplifi on

When it comes to discovery of mobile devices, organizations today must consider being proactive regarding how mobile devices of their employees and contractors are managed and what rights they have regarding the storage and...more

Woods Rogers

What's the Tea in L&E? Employee Devices: What is #NSFW?

Woods Rogers on

What’s the Tea in L&E is a video series focused on the latest trends and updates in labor and employment law. In this short video, Woods Rogers L&E attorneys Leah Stiegler and Emily Kendall Chowhan discuss what content is...more

Kramer Levin Naftalis & Frankel LLP

Cybersecurity: the SEC Provides Guidance on Well-Known and Emerging Best Practices

At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more

Shook, Hardy & Bacon L.L.P.

Privacy and Data Security Alert | December 2019

SDNY Rejects Standing under “Increased Risk” Theory Where Data Not Targeted or Stolen - The Southern District of New York rejected a settlement that would have resolved a class action based on the unauthorized (and...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #219 – Holiday Shopping Tip for Internet-Connected Gifts

Holiday shopping is in full gear and everything seems to be an Internet of Things (IoT) device. It continues to amaze me how folks will buy IoT gadgets and plop them in their homes and have no idea that they include a speaker...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #213 – The Jumbo Privacy App

As most of you know, I rarely download an app. However, here’s one I just downloaded and here’s why. The Jumbo Privacy app, available in the Apple store, is all about providing consumers with a way to audit their privacy and...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #202 – Check the Privacy Settings on Your Phone Frequently

I once again had the pleasure of presenting Cybersecurity for Tax Professionals at the IRS Nationwide Tax Forum today. The conference is designed for tax professionals in small- to medium-sized businesses....more

Robinson+Cole Data Privacy + Security Insider

A Value Add to Employee Security Education: Mobile Apps

While we have been talking about the very important message of educating employees about data security, I find that giving employees tips about their personal data security keeps them interested and engaged during education...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - August 2018 #3

Robinson & Cole LLP on

The Federal Bureau of Investigation (FBI) released a Public Service Announcement on August 2, 2018, entitled “Cyber Actors Use Internet of Things Devices as Proxies for Anonymity and Pursuit of Malicious Cyber Activities,”...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #152 – Device Self-Defense

If you have bought a new cell phone recently, you will see that the technology of the newest smart phones is far more advanced than in the past, and have features on them that most people don’t understand or use....more

K2 Integrity

Border Searches: Risks to Electronic Devices and Your Data

K2 Integrity on

U.S. citizens who travel internationally, especially corporate executives and high-net-worth individuals, must consider and navigate data security risks when crossing a border—whether into the United States or another...more

Ballard Spahr LLP

OIG finds incomplete CFPB response to unaccounted-for-laptops

Ballard Spahr LLP on

The CFPB’s Office of Inspector General has issued a report indicating that, in performing an audit of the CFPB’s encryption of data on mobile devices issued to staff members, the OIG found the CFPB had not yet completed all...more

Robinson+Cole Data Privacy + Security Insider

“KRACK” WiFi Security Vulnerability Discovered

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide