Data Governance for the BYOD Age
Corporate Compliance and Enforcement Hot Topics with IBM VP, Una Dean
Digital Workplace Issues
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Safeguards against Data Security Breaches (Part One)
Corporate Law Report: Managing Cyber Risks, BYOD, Obama's NLRB Crisis, Iran Sanctions, and More
Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online. It is an opportunity to focus on four key behaviors...more
When it comes to ensuring that data is preserved and available for litigation, investigations, or government inquiries, it all starts with establishing and codifying clear data governance policies and procedures....more
In the era of technology-driven workplaces, Bring Your Own Device (BYOD) policies have emerged as a significant trend. A BYOD policy allows employees to use their personal devices, such as smartphones, for work purposes,...more
I always welcome any chance to use references to The Mandalorian series on Disney (or Ashoka for that matter) in the compliance arena. My take on the issue of electronic communications and ephemeral messaging is rooted in...more
This post provides tips from our eDiscovery experts on the identification and preservation of chat data during an investigation - Chat data will inevitably need to be collected for review if an investigation or dispute...more
This post provides some tips from eDiscovery experts on what to consider ahead of any investigation commencing. Consider ease of compliance when procuring chat software The pandemic accelerated the adoption of chat and...more
Effective June 2, 2023, all federal contracts and solicitations are required to include a new Federal Acquisition Regulation (FAR) clause: FAR 52.204-27, Prohibition on a ByteDance Covered Application. This clause implements...more
Holland & Knight previously noted an Office of Management and Budget (OMB) memorandum prohibiting the use of TikTok on information technology used by federal agencies and contractors. (See Holland & Knight's previous blog...more
Is it time to revisit your organization’s Bring Your Own Device (BYOD) policies? The answer to this question is subjective, but doing so can be beneficial as the workforce and productivity behaviors change. Having a BYOD...more
In today’s highly connected, tech-obsessed world, personal electronic devices (“devices”), including tablet computers and mobile phones, are seemingly ubiquitous. Increasingly, employers are capitalizing on this phenomenon by...more
Using personal devices and messaging platforms may be convenient (and ubiquitous), but it may run afoul of federal records retention rules. Our Investment Management, Trading & Markets and White Collar, Government & Internal...more
Many companies have implemented Bring Your Own Device (“BYOD”) policies. For some, it has been years since they were put in place. Has your policy withstood the test of time? Employees are using their devices differently than...more
Today’s eDiscovery Blues comic highlights several challenges In-House legal teams might face when working with data in the face of litigation, starting with the sinking feeling that comes when you ask yourself, “Is the I.T....more
Our increasingly connected world presents tremendous opportunities for employers as well as considerable confusion and risk. Should you Google a job applicant? Allowing employees to use their own mobile devices for work...more
At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more
Employees seem permanently attached to their smart phones today, but allowing employees to use their personal devices to make work calls, and send and receive work emails can carry substantial risks. ...more
While we have been talking about the very important message of educating employees about data security, I find that giving employees tips about their personal data security keeps them interested and engaged during education...more
If you are like most, you probably have 4-5 different chat applications on your phone to talk to friends and family members. Dad only likes to text via SMS, brother Peter only uses Facebook Messenger, Aunty Bridgette can...more
Mobile devices, especially smartphones, have become home to all manner of data about what we do. That means they should be seems as a key potential source of potentially relevant electronically stored information....more
An increasing number of companies have adopted Bring Your Own Device (“BYOD”) programs. Under a BYOD program, companies permit employees to connect their personal devices (e.g. laptops, smartphones, and tablets) to the...more
Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more
It’s hard to believe that just over a decade ago, the modern touchscreen smartphone was first introduced. Amidst the “oos” and “ahs” of the crowd, Steve Jobs unveiled the revolutionary Apple iPhone on June 29, 2007. The...more
The importance of mobile device data in legal discovery, investigations, and other proceedings is ubiquitous and virtually indisputable. Mobile devices such as cellphones, smartphones, e-readers, and tablets pose a...more
As technology advances, businesses and employees are embracing “bring your own” opportunities beyond “bring your own device,” or BYOD – which refers to when employers allow or even mandate employees to bring their own...more
Securing data held by mobile devices is largely reliant upon technology, and a recent report by the Federal Trade Commission (“FTC”) takes aim at how that technology can be both improved and better utilized. The report,...more