News & Analysis as of

Bring Your Own Device (BYOD) Mobile Devices

K2 Integrity

Cybersecurity Awareness Month: Installing Updates to Fix Bugs and Vulnerabilities

K2 Integrity on

Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online. It is an opportunity to focus on four key behaviors...more

CloudNine

Efficient Text and Chat Data Discovery Starts with Information Governance (IG)

CloudNine on

When it comes to ensuring that data is preserved and available for litigation, investigations, or government inquiries, it all starts with establishing and codifying clear data governance policies and procedures....more

ArentFox Schiff

Bring Your Own Device Policies: A Strategic Guide for Regulated Industries

ArentFox Schiff on

In the era of technology-driven workplaces, Bring Your Own Device (BYOD) policies have emerged as a significant trend. A BYOD policy allows employees to use their personal devices, such as smartphones, for work purposes,...more

The Volkov Law Group

Practical Steps to Mitigate Electronics Communications Risks: “This is the Way” (Part III of III)

The Volkov Law Group on

I always welcome any chance to use references to The Mandalorian series on Disney (or Ashoka for that matter) in the compliance arena.  My take on the issue of electronic communications and ephemeral messaging is rooted in...more

A&O Shearman

Overcoming eDiscovery-related chat data challenges: Part 3: during an investigation

A&O Shearman on

This post provides tips from our eDiscovery experts on the identification and preservation of chat data during an investigation - Chat data will inevitably need to be collected for review if an investigation or dispute...more

A&O Shearman

Overcoming eDiscovery-related chat data challenges: Part 2 - prior to an investigation

A&O Shearman on

This post provides some tips from eDiscovery experts on what to consider ahead of any investigation commencing. Consider ease of compliance when procuring chat software The pandemic accelerated the adoption of chat and...more

Holland & Knight LLP

New TikTok Ban Doesn't Reach All Contractor IT or Employees' Personal Devices

Holland & Knight LLP on

Effective June 2, 2023, all federal contracts and solicitations are required to include a new Federal Acquisition Regulation (FAR) clause: FAR 52.204-27, Prohibition on a ByteDance Covered Application. This clause implements...more

Holland & Knight LLP

Contractors: Direct Employees to Remove TikTok from Personal Cell Phones, Other Devices

Holland & Knight LLP on

Holland & Knight previously noted an Office of Management and Budget (OMB) memorandum prohibiting the use of TikTok on information technology used by federal agencies and contractors. (See Holland & Knight's previous blog...more

Epiq

BYOD in 2023: Regular Evaluation Can Help Reduce Risk

Epiq on

Is it time to revisit your organization’s Bring Your Own Device (BYOD) policies? The answer to this question is subjective, but doing so can be beneficial as the workforce and productivity behaviors change. Having a BYOD...more

Willcox & Savage

BYOD Policies: A Great Idea When Properly Executed

Willcox & Savage on

In today’s highly connected, tech-obsessed world, personal electronic devices (“devices”), including tablet computers and mobile phones, are seemingly ubiquitous. Increasingly, employers are capitalizing on this phenomenon by...more

Alston & Bird

SEC and CFTC Crackdown on Use of Personal Messaging Platforms Raises Compliance Concerns – and Opportunities

Alston & Bird on

Using personal devices and messaging platforms may be convenient (and ubiquitous), but it may run afoul of federal records retention rules. Our Investment Management, Trading & Markets and White Collar, Government & Internal...more

Butler Snow LLP

Has Your Company's BYOD Policy Withstood to the Test of Time?

Butler Snow LLP on

Many companies have implemented Bring Your Own Device (“BYOD”) policies. For some, it has been years since they were put in place. Has your policy withstood the test of time? Employees are using their devices differently than...more

Reveal

3 Challenges Corporate Legal Teams Face With BYOD

Reveal on

Today’s eDiscovery Blues comic highlights several challenges In-House legal teams might face when working with data in the face of litigation, starting with the sinking feeling that comes when you ask yourself, “Is the I.T....more

Constangy, Brooks, Smith & Prophete, LLP

Digital Workplace Issues

Our increasingly connected world presents tremendous opportunities for employers as well as considerable confusion and risk. Should you Google a job applicant? Allowing employees to use their own mobile devices for work...more

Kramer Levin Naftalis & Frankel LLP

Cybersecurity: the SEC Provides Guidance on Well-Known and Emerging Best Practices

At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more

Akerman LLP - HR Defense

Minimizing Risks of BYOD Use For Work

Employees seem permanently attached to their smart phones today, but allowing employees to use their personal devices to make work calls, and send and receive work emails can carry substantial risks. ...more

Robinson+Cole Data Privacy + Security Insider

A Value Add to Employee Security Education: Mobile Apps

While we have been talking about the very important message of educating employees about data security, I find that giving employees tips about their personal data security keeps them interested and engaged during education...more

Epiq

BYOD Challenges

Epiq on

If you are like most, you probably have 4-5 different chat applications on your phone to talk to friends and family members.  Dad only likes to text via SMS, brother Peter only uses Facebook Messenger, Aunty Bridgette can...more

Association of Certified E-Discovery...

Hold My Phone: Part 1 – Preservation and Collection of Mobile Device Data

Mobile devices, especially smartphones, have become home to all manner of data about what we do. That means they should be seems as a key potential source of potentially relevant electronically stored information....more

Jackson Lewis P.C.

Cost And Benefit Analysis Of Bring Your Own Device Programs

Jackson Lewis P.C. on

An increasing number of companies have adopted Bring Your Own Device (“BYOD”) programs. Under a BYOD program, companies permit employees to connect their personal devices (e.g. laptops, smartphones, and tablets) to the...more

Gray Reed

An Employer’s Spooky Interpretation of its Bring Your Own Device (BYOD) Policy

Gray Reed on

Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more

Clark Hill PLC

Crafting "Bring Your Own Device" ("BYOD") Policies to Protect Your Company Data and Ensure Compliance with the Law

Clark Hill PLC on

It’s hard to believe that just over a decade ago, the modern touchscreen smartphone was first introduced. Amidst the “oos” and “ahs” of the crowd, Steve Jobs unveiled the revolutionary Apple iPhone on June 29, 2007. The...more

Epiq

Mobile Device Discovery

Epiq on

The importance of mobile device data in legal discovery, investigations, and other proceedings is ubiquitous and virtually indisputable. Mobile devices such as cellphones, smartphones, e-readers, and tablets pose a...more

Epiq

eDiscovery and BYOD

Epiq on

As technology advances, businesses and employees are embracing “bring your own” opportunities beyond “bring your own device,” or BYOD – which refers to when employers allow or even mandate employees to bring their own...more

Jackson Lewis P.C.

New FTC Report Makes Security Recommendations To The Mobile Device Industry

Jackson Lewis P.C. on

Securing data held by mobile devices is largely reliant upon technology, and a recent report by the Federal Trade Commission (“FTC”) takes aim at how that technology can be both improved and better utilized. The report,...more

80 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide