David Horrigan, Esq., 451 Research

Size: px
Start display at page:

Download "David Horrigan, Esq., 451 Research"

Transcription

1 University of Texas Mobility Monday Series BRING YOUR OWN DEVICE (BYOD): The Legal E Discovery, Regulatory, IT and HR Implications August 4, 2014 David Horrigan, Esq., 451 Research

2 451 Research Global research analyst firm New York based division of The 451 Group 451 founded in 1999 Daily qualitative & quantitative research 1,000+ clients served Publications, analyst advice, global events

3 David Horrigan Analyst and Counsel, Content Compliance & Legal Technologies, at 451 Research Licensed to practice law in Washington, D.C. Prior experience as in house counsel on technology and media issues and as a reporter for The National Law Journal and Law Technology News

4 BYOD: The Legal E Discovery, Regulatory, HR, IT Implications BYOD and the Changing Workplace BYOD in E Discovery and Case Law BYOD in Regulatory Actions and International Issues BYOD Best Practices

5 BYOD and the Changing Workplace BYO is More Than Just Devices BYOA: Bring Your Own Application BYOC: Bring Your Own Cloud BYOP: Bring Your Own Process

6 BYOD and the Changing Workplace Big Data The world created 23 exabytes of data in 2002 We now create that much data every seven days 90 percent of all data created since the beginning of time was created in the past two years

7 BYOD and the Changing Workplace

8 BYOD and the Changing Workplace BYOD and IT Penny Wise, but Pound Foolish?

9 BYOD and the Changing Workplace 451 Research Data Overall Percentage of Respondents Believing Information Governance is Very Important at Their Organizations 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% The Snowden Effect or Lack Thereof Dec (42%) Snowden June 2013 Dec (42%)

10 BYOD and the Changing Workplace 451 Research Data Importance of Information Governance and Size of Company 80% 70% 60% 50% 40% 30% Dec Dec % 10% 0% Over 1000 Employees Employees Emloyees 1 10 Employees

11 BYOD and the Changing Workplace 451 Research Data Importance of Information Governance and Job Function 60% 50% 40% 30% 20% Dec Dec % 0% IT/Engineering Scientific Staff Mid Level Management Senior Management

12 BYOD in E Discovery and Case Law Definition of Discovery The pre trial devices that can be used by one party to obtain facts and information about the case from another party in order to assist the party s preparation for trial. See also Deposition; Fishing trip or expedition Source: Black s Law Dictionary (6th Ed.) Note: The current edition (9th) is more diplomatic.

13 BYOD in E Discovery and Case Law Breakdown of E Discovery Costs Review 73% Processing 19% Collection 8% Source: Rand Corporation

14 BYOD in E Discovery and Case Law BYOD Case Law: City of Ontario v. Quon U.S. Supreme Court (2010) Quasi BYOD : Employer Owner Pager with Personal Use Employer Reserved Right to Monitor Activity Formal Computer Usage, Internet and E Mail Policy

15 BYOD in E Discovery and Case Law BYOD Case Law: Riley v. California (See also United States v. Wurie) U.S. Supreme Court (2014)

16 BYOD in E Discovery and Case Law BYOD Case Law: Employer Liability Distracted Driving: Clo White Co. v. Lattimore Mobile Devices, Commuting, and Scope of Employment Data Breaches: Resnick v. AvMed, Inc. Liability for Data on Stolen Laptops

17 BYOD in E Discovery and Case Law An Employer s Right to Control Device Use In re Guard Publishing Co. (Register-Guard), NLRB (2007) Employers can prohibit use of company system for non-work activities if policy is facially neutral on Section 7 rights. In re Purple Communications, Inc., NLRB (2014) NLRB invites briefs on whether Register-Guard should be overturned NLRB asks whether employee personal electronic devices affect the balance between employers rights to prohibit nonwork activities and employees Section 7 rights

18 BYOD in E Discovery and Case Law BYOD Case Law: Social Media No Reasonable Expectation of Privacy in Many Forms of Social Media See State v. Harris However, No Fishing Expeditions See Mailhoit v. Home Depot, USA, Inc. Follow Labor Law when Setting Social Media Policies See In re Hispanics United of Buffalo, Inc. Your Lawyer Can t Clean Up Facebook Posts See Lester v. Allied Concrete Co.

19 BYOD: Regulatory Issues FTC v. Wyndham Worldwide Corp.

20 BYOD: International Issues Negotiations on the Future of the Safe Harbor

21 BYOD Best Practices Policies and Procedures Limited Support of Personal Devices Remote Wiping and Locking Education and Training

22 Thanks for Attending. David Horrigan

Bring Your Own Device Security and Privacy Legal Risks

Bring Your Own Device Security and Privacy Legal Risks Bring Your Own Device Security and Privacy Legal Risks Introduction Information Law Group, LLP National boutique firm with focus on information law Experienced, nationally-recognized privacy, technology,

More information

Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers

Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use

More information

Intermountain ediscovery Conference 2012

Intermountain ediscovery Conference 2012 Intermountain ediscovery Conference 2012 From Technology Assisted Review to Twi6er: What Clients, Law Firms, and Vendors Need to Know David Horrigan, 451 Research 451 Research Global research analyst firm

More information

OUTLINE AND OBJECTIVES

OUTLINE AND OBJECTIVES BYOD in the Federal Workplace: Privacy Considerations and Case Studies Moderator: Alex Tang, Attorney, Office of General Counsel, Federal Trade Commission (FTC) Panelists: Kimberly Hancher, Chief Information

More information

Going Mobile: Are Your Company s Electronic Communications Policies Ready to Travel?

Going Mobile: Are Your Company s Electronic Communications Policies Ready to Travel? Going Mobile: Are Your Company s Electronic Communications Policies Ready to Travel? By Kathleen M. Porter Computers have dotted office desks for decades, and the Internet and e-mail have been common workplace

More information

THE ACC, MID-AMERICA CHAPTER Mutual of Omaha Insurance Co. Omaha, NE

THE ACC, MID-AMERICA CHAPTER Mutual of Omaha Insurance Co. Omaha, NE 1 1 WEDNESDAY May 18 THE ACC, MID-AMERICA CHAPTER Mutual of Omaha Insurance Co. Omaha, NE 12:00 PM LAURA CLARK FEY, Esq., CIPP/US, CIPP/E, CIPM Fey LLC, Leawood, KS Agenda 2 BYOD Stats Legal Risks Associated

More information

Protecting Employee and Customer Privacy in an Era of Big Data Monitoring

Protecting Employee and Customer Privacy in an Era of Big Data Monitoring FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Protecting Employee and Customer Privacy in an Era of Big Data Monitoring This program addresses the challenges associated with protecting employee and customer

More information

Practical Legal Aspects of BYOD

Practical Legal Aspects of BYOD Practical Legal Aspects of BYOD SESSION ID: LAW-F01 Lawrence Dietz General Counsel & Managing Director TalGlobal Corporation ldietz@talglobal.net +1 408 993 1300 http://psyopregiment.blogspot.com Francoise

More information

USE AND ABUSE OF SOCIAL MEDIA IN THE WORKPLACE. Presented by Total Compliance Connection, LLC Vicki Worster Human Resource Consultant

USE AND ABUSE OF SOCIAL MEDIA IN THE WORKPLACE. Presented by Total Compliance Connection, LLC Vicki Worster Human Resource Consultant USE AND ABUSE OF SOCIAL MEDIA IN THE WORKPLACE Presented by Total Compliance Connection, LLC Vicki Worster Human Resource Consultant Employee Misuse of Social Media Employees Misuse Social Media By: Disclosing

More information

Want To Be My Friend? Social Networking & Ediscovery

Want To Be My Friend? Social Networking & Ediscovery Want To Be My Friend? Social Networking & Ediscovery Michael A. Avalos, Esq., Assistant General Counsel, AIG Jonathan E. Sachs, Esq., Senior Account Executive, Kroll Ontrack July 23, 2014 Discussion Overview

More information

E-DISCOVERY AND E-DISCLOSURE 2013 The Ongoing Journey From Reactive E-Discovery to Proactive Information Governance

E-DISCOVERY AND E-DISCLOSURE 2013 The Ongoing Journey From Reactive E-Discovery to Proactive Information Governance E-DISCOVERY AND E-DISCLOSURE 2013 The Ongoing Journey From Reactive E-Discovery to Proactive Information Governance Evolving technologies are expanding the need for effective electronic discovery in legal

More information

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Data Privacy: What your nonprofit needs to know Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Overview 2 Data privacy versus data security Privacy polices and best practices Data security

More information

Security, privacy, and incident response issues are often

Security, privacy, and incident response issues are often ISSA DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLOBALLY The Legal Implications of BYOD: Preparing Personal Device Use Policies By David Navetta, Esq. ISSA member, Denver, USA Chapter This article

More information

BYOD: BRING YOUR OWN DEVICE

BYOD: BRING YOUR OWN DEVICE BYOD: BRING YOUR OWN DEVICE PART 5 OF THE LAW PRACTICE MANAGEMENT SERIES Sarah Banola Cooper, White & Cooper LLP James Y. Wu Law Office of James Y. Wu Bring Your Own Device (BYOD)Trend Increased use of

More information

Questions And Answers. Electron ic Monitoring in the Workplace

Questions And Answers. Electron ic Monitoring in the Workplace Questions And Answers Electron ic Monitoring in the Workplace Kevin J. Smith and Rachel J. Tischler Employers and employment attorneys alike have been concerned about the legal limits of electronic monitoring

More information

BYOD Privacy and Security in Europe

BYOD Privacy and Security in Europe BYOD Privacy and Security in Europe BYOD: Overview 2 BYOD Overview 38% of companies expect to stop providing electronic devices to their employees by 2016 (1) According to a 2013 survey conducted by Cisco,

More information

Employment Law Issues in Social Media

Employment Law Issues in Social Media Employment Law Issues in Social Media John Nadolenco Partner, Los Angeles Andrew Rosenman Partner, Chicago (213) 229-5173 (312) 701-8744 jnadolenco@mayerbrown.com arosenman@mayerbrown.com Mayer Brown is

More information

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS Damian Bach AirWatch Session ID: SPO-T038 Session Classification: Intermediate Current & Future Mobile Landscape Number of mobile

More information

Legal Environment for Federal BYOD

Legal Environment for Federal BYOD Legal Environment for Federal BYOD AMARC Workshop: Developing a BYOD Framework Federal Mobile Computing Summit (Washington, DC) Thursday, March 6, 2014, 9am-12pm Alex Tang, Attorney Office of General Counsel,

More information

Social Media In the Food Industry

Social Media In the Food Industry Social Media In the Food Industry Managing legal risk to avoid getting bitten Carolyn Elefant, LawOfficesofCarolynElefant.com February 5, 2013 Why social media in regulated industries is like alcohol at

More information

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) 1. Introduction Introduction This document outlines the considerations that the Council needs to consider in relation to its decision whether or not to adopt the current trend (arising from the consumerisation

More information

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work FEATURED FACULTY: Michael P. Elkon, Attorney at Law, Fisher & Phillips LLP (404) 240-5849 melkon@laborlawyers.com

More information

Michael J. McGuire. Focus Areas. Overview

Michael J. McGuire. Focus Areas. Overview Chief Information Security Officer Shareholder 1300 IDS Center 80 South 8th Street Minneapolis, MN 55402 main: (612) 630-1000 direct: (612) 313-7612 fax: (612) 630-9626 mmcguire@littler.com Focus Areas

More information

Use of Mobile Apps in the Workplace:

Use of Mobile Apps in the Workplace: Use of Mobile Apps in the Workplace: PRIVACY & SECURITY ADAM D.H. GRANT AGRANT@ALPERTBARR.COM Cell Phone & Tablet Ownership 91% of American adults own a cell phone 56% have smartphones Of Americans aged

More information

Social Media - The New Frontier

Social Media - The New Frontier The New Frontier: Social Media and Employment Law PowerPoint Presentation by: Frank E. Melton, Rutter Hobbs & Davidoff Incorporated Los Angeles, CA David M. Villadolid, Burch & Cracchiolo, P.A. Phoenix,

More information

BYOD/T? BYOD/T. Social Media and Challenges in the Virtualized Workplace. Jason Boulette

BYOD/T? BYOD/T. Social Media and Challenges in the Virtualized Workplace. Jason Boulette Social Media and Challenges in the Virtualized Workplace Jason Boulette BYOD/T? http://youtu.be/osrqlphz6y8 BYOD/T Here It Comes 60% of companies offer it now 1 90% will offer it by 2014 1 Standard plat:

More information

Bring your own device - Legal Whitepaper

Bring your own device - Legal Whitepaper A Legal Whitepaper from the Technology Group Bring your own device - Legal Whitepaper The consumerisation of IT is the latest technology trend posing challenges to Australian businesses. As workplaces

More information

A Bring Your Own Device (BYOD) Overview

A Bring Your Own Device (BYOD) Overview A Bring Your Own Device (BYOD) Overview As Presented At AMARC Workshop: Developing A BYOD Framework March 6, 2014 All copyrightable text and graphics, the selection, arrangement, and presentation of all

More information

BYOD Policies: A Litigation Perspective

BYOD Policies: A Litigation Perspective General Counsel Panel Reveals the Real Deal BYOD Policies: A Litigation Perspective By Andrew Hinkes Reprinted with Permission BYOD Policies: A Litigation Perspective By Andrew Hinkes Bring-your-own-device

More information

BYOD: Bring Your Own Device Advantage, Liability or Both?

BYOD: Bring Your Own Device Advantage, Liability or Both? BYOD: Bring Your Own Device Advantage, Liability or Both? S S Scott Summers Laura B. Grubbs Dinsmore & Shohl Louisville, KY The BYOD to Work Movement Dual-Use Devices: used for both personal and company

More information

Mobility Impact on the Enterprise

Mobility Impact on the Enterprise BYOD Managing and Securing the Mobile Enterprise November 21, 2013 by Rick McCharles Bring Your Own Device (BYOD), Bring Your Own Cloud (BYOC), Bring Your Own Technology (BYOT), Choose Your Own Device

More information

Future Proof Your ediscovery Practices

Future Proof Your ediscovery Practices FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Patrick Collins, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting

More information

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) CHARLES LUCE S LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) A. Cloud Computing Defined: n. A loosely defined term for any system providing access

More information

ISM-473: Computing Ethics and Society. Unit 6 Work

ISM-473: Computing Ethics and Society. Unit 6 Work ISM-473: Computing Ethics and Society Unit 6 Work AGift of Fire Fourth edition Sara Baase Chapter 6: Work Lecture 18 What We Will Cover Employee Communications and Monitoring Book NO: 293-296 Learning

More information

Setting BYOD Policy: A New Partnership for IT and HR

Setting BYOD Policy: A New Partnership for IT and HR Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70

More information

NLRB Holds That Employees Have the Right to Use Company Email Systems for Union Organizing Union and Non-Union Employers Are All Affected

NLRB Holds That Employees Have the Right to Use Company Email Systems for Union Organizing Union and Non-Union Employers Are All Affected NLRB Holds That Employees Have the Right to Use Company Email Systems for Union Organizing Union and Non-Union Employers Are All Affected By Steven M. Swirsky December 12, 2014 In its Purple Communications,

More information

BYOD BEST PRACTICES GUIDE

BYOD BEST PRACTICES GUIDE BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create

More information

HAP 750 Legal Issues in Health Administration Summer 2014

HAP 750 Legal Issues in Health Administration Summer 2014 College of Health and Human Services HAP 750 Legal Issues in Health Administration Summer 2014 Syllabus information placement Instructor HAP 750 Legal Issues in Health Administration Mondays from 7:20pm

More information

Nancy L. Abell. Los Angeles. Practice Areas. Admissions. Education. Partner, Employment Law Department nancyabell@paulhastings.com

Nancy L. Abell. Los Angeles. Practice Areas. Admissions. Education. Partner, Employment Law Department nancyabell@paulhastings.com Nancy L. Abell Partner, Employment Law Department nancyabell@paulhastings.com Nancy Abell is a partner in the Employment Law Department of Paul Hastings. She previously served as the global chair of the

More information

Setting BYOD Policy: A New Partnership for IT and HR

Setting BYOD Policy: A New Partnership for IT and HR Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70

More information

A 4- Letter Acronym Sending CIOs Running Scared - BYOD

A 4- Letter Acronym Sending CIOs Running Scared - BYOD A 4- Letter Acronym Sending CIOs Running Scared - BYOD What This Means for the other 4- Letter Acronym - ITSM Karen Ferris ABSTRACT Bring Your Own Device (BYOD) or Bring Your Own Computing (BYOC) is being

More information

Hot Topics in Employment Law

Hot Topics in Employment Law Fisher & Phillips LLP ATTORNEYS AT LAW Solutions at Work Top 10 Employment Law Developments SCMA 2014 Conference Presented by: Fred Manning Phone: (803) 255-0000 Email: fmanning@laborlawyers.com www.laborlawyers.com

More information

Business or Pleasure: The Challenges of Bring Your Own Device Policies in the Workplace

Business or Pleasure: The Challenges of Bring Your Own Device Policies in the Workplace Business or Pleasure: The Challenges of Bring Your Own Device Policies in the Workplace Presented by: Gavin Appleby, Littler, Atlanta Dionysia Johnson-Massie, Littler, Atlanta What Is BYOD? In the past:

More information

Julie A. Totten. Some of Julie s more notable engagements include the following:

Julie A. Totten. Some of Julie s more notable engagements include the following: Partner, Employment Law Sacramento (916) 329-4908 jatotten@orrick.com Julie Totten is the partner in charge of Orrick s Sacramento Office. She is also the partner in charge of the Sacramento Employment

More information

Data Security in a Mobile, Cloud-Based World

Data Security in a Mobile, Cloud-Based World Data Security in a Mobile, Cloud-Based World Jacob Buckley-Fortin CEO ehana What we ll cover Trends Risks Recommendations 1 Trends Mobile Has Taken Over Trend #1 2 3 450 million users worldwide Adopted

More information

About Us. Experienced Attorneys

About Us. Experienced Attorneys About Us The Farrington Law Firm was founded in 2003 to provide a unique alternative in legal services for employers facing workplace challenges and compliance issues. We regularly represent large and

More information

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

PRELIMINARY STATEMENT. The Employers Association of New Jersey ("EANJ")^ respectfully submits this Letter Brief

PRELIMINARY STATEMENT. The Employers Association of New Jersey (EANJ)^ respectfully submits this Letter Brief EANJ Employers Association of New Jersey A nonprofit association serving employers since 1916 PRELIMINARY STATEMENT The Employers Association of New Jersey ("EANJ")^ respectfully submits this Letter Brief

More information

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

Overview. NLRA Rights Of Unrepresented Workers. Overview FINAL 1510205.1. Fisher & Phillips LLP

Overview. NLRA Rights Of Unrepresented Workers. Overview FINAL 1510205.1. Fisher & Phillips LLP Solutions at Work NLRA Rights Of Unrepresented Workers Presented by: D. Albert Brannen 404.240.4235 NLRB publications Overview Statutory basis of rights Concerted activity Protected activity Examples of

More information

SOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE

SOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE New Jersey League of Municipalities SOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE Presented by: BRIAN W. KRONICK, ESQ. Genova, Burns & Giantomasi (973) 533-0777 November

More information

"Bring Your Own Device" Brings its Own Challenges

Bring Your Own Device Brings its Own Challenges 6 June 2012 "Bring Your Own Device" Brings its Own Challenges By Susan McLean and Alistair Maughan The consumerisation of IT is the growing trend for information technology to emerge first in the consumer

More information

Mobile Devices in the Workplace: What Every Employer Needs to Know

Mobile Devices in the Workplace: What Every Employer Needs to Know Mobile Devices in the Workplace: What Every Employer Needs to Know Presented by: Shannon Huygens Paliotta Senior Associate, Littler Mendelson, P.C. spaliotta@littler.com (412) 201-7631 Marcy McGovern Knowledge

More information

Robert F. Millman. Focus Areas. Overview

Robert F. Millman. Focus Areas. Overview Shareholder 2049 Century Park East 5th Floor Los Angeles, CA 90067 main: (310) 553-0308 direct: (310) 772-7206 fax: (310) 553-5583 rfmillman@littler.com Focus Areas Labor Management Relations Healthcare

More information

Friending and Tweeting in the Workplace: The Impact of Social Media on Corporate America

Friending and Tweeting in the Workplace: The Impact of Social Media on Corporate America Friending and Tweeting in the Workplace: The Impact of Social Media on Corporate America Presented by Mark A. Pihart (612) 604-6623 mpihart@winthrop.com Potential Legal Exposure Due to Employee Use of

More information

Social Media In the Workplace

Social Media In the Workplace Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

The High Price of Medical Identity Theft and Fraud

The High Price of Medical Identity Theft and Fraud The High Price of Medical Identity Theft and Fraud Some Quick Facts 3 times more likely to be ID fraud victim if credit/debit card breached 1 New ID fraud victim every 2 seconds 2 Few adults are familiar

More information

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

Social Networking Issues in the Workplace

Social Networking Issues in the Workplace Social Networking Issues in the Workplace Presented By: David Flotten, JD, SPHR HR Consultant/Benefits Technical Advisor Disclaimers Technology is moving faster than the legal system can keep pace. Accordingly,

More information

A Legal Update for Debt Settlement Companies and Service Providers

A Legal Update for Debt Settlement Companies and Service Providers A Legal Update for Debt Settlement Companies and Service Providers United States Organization for Bankruptcy Alternatives (USOBA) 2008 Summer Conference June 23, 2008,1:30 2:30 pm Harbor Beach Marriott,

More information

Data Breach Law and Litigation

Data Breach Law and Litigation Technological Evolution The Impact of Social Media, Big Data and Privacy on Business Data Security: Before and After a Breach Occurs Archis A. Parasharami Partner Mayer Brown LLP David Hale Chief Privacy

More information

Harry D. Jones. Focus Areas. Overview

Harry D. Jones. Focus Areas. Overview Shareholder 2001 Ross Avenue Suite 1500, Lock Box 116 75201 main: (214) 880-8100 direct: (214) 880-8111 fax: (214) 880-0181 hdjones@littler.com Focus Areas Discrimination and Harassment Unfair Competition

More information

What Managers Need to Know About Social Media: Top 10 Tips for Mitigating the Risks of Social Media in the Workplace FEATURED FACULTY:

What Managers Need to Know About Social Media: Top 10 Tips for Mitigating the Risks of Social Media in the Workplace FEATURED FACULTY: What Managers Need to Know About Social Media: Top 10 Tips for Mitigating the Risks of Social Media in the Workplace FEATURED FACULTY: Spencer Hamer, Partner, Michelman & Robinson 714.557.7990 shamer@mrllp.com

More information

THE AMERICAN LAW INSTITUTE Continuing Legal Education

THE AMERICAN LAW INSTITUTE Continuing Legal Education 47 THE AMERICAN LAW INSTITUTE Continuing Legal Education Preventing Employee Data Leaks: Policies, Procedures, and Practical Advice May 20, 2014 Telephone Seminar/Audio Webcast Is your mobile workforce

More information

LANDSCAPE ANALYSIS - BRING YOUR OWN DEVICE

LANDSCAPE ANALYSIS - BRING YOUR OWN DEVICE IIPRD LANDSCAPE ANALYSIS - BRING YOUR OWN DEVICE P a g e 2 PATENT LANDSCAPE ANALYSIS ON BYOD- BRING YOUR OWN DEVICE Contents Executive Summary... 3 Introduction... 4 Benefits of bring your own device (BYOD)...

More information

Large Law Firm structure

Large Law Firm structure Large Law Firm structure Senior Partners ultimate control over the firm Junior Partners all the partners own the firm together Although, how they divide profits depends on their agreement, which factors

More information

Service Terms and Conditions of a Health & Business Loan

Service Terms and Conditions of a Health & Business Loan 1. SUBJECT 1.1 The present terms and conditions (T&C) set the rules and conditions for using the services provided by SOHO - SOFIA HOLISTIC COWORKING COMPANY LTD ( SOHO ) to natural and legal persons,

More information

The Hottest Topics for the Hottest Topics for Bar Leaders

The Hottest Topics for the Hottest Topics for Bar Leaders The Hottest Topics for the Hottest Topics for Bar Leaders Toronto NCBP Meeting, August 2011 Don t Fall Down Where Technology is Concerned 6 hot tips in 18 minutes! 1. Don t give me no SAAS 2. What is that

More information

Future Proof Your ediscovery Practices

Future Proof Your ediscovery Practices FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Barak Cohen, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting Jessica

More information

Questions And Answers

Questions And Answers Questions And Answers Bring Your Own Device Challenges and Solutions for the Mobile Workplace Kevin J. Smith and Shira Forman Technological advances in the workplace often introduce new levels of convenience

More information

Bring Your Own Device (BYOD) and Mobile Device Management

Bring Your Own Device (BYOD) and Mobile Device Management Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel todd.bertoson@dentons.com

More information

Don t Let BYOD Mean Bring Your Office Disaster. Southeastern Business Law Institute October 24-25, 2013 Cumberland School of Law Samford University

Don t Let BYOD Mean Bring Your Office Disaster. Southeastern Business Law Institute October 24-25, 2013 Cumberland School of Law Samford University Don t Let BYOD Mean Bring Your Office Disaster Southeastern Business Law Institute October 24-25, 2013 Cumberland School of Law Samford University Richard C. Balough BALOUGH LAW OFFICES, LLC 1 N. LaSalle

More information

BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com

BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com BYOD Bring Your Own Device - Mobile Device Management www.prooncall.com Bring Your Own Device (BYOD) Mobile Device Management People are starting to expect the ability to connect to public networks and

More information

Rowing Ireland. Training Boat Loan Agreement Form

Rowing Ireland. Training Boat Loan Agreement Form Rowing Ireland Training Boat Loan Agreement Form Terms and Conditions 1. No equipment will be released until the following have been done: The loan agreement form has been signed A deposit of 100 has been

More information

Mobile App Developer Agreements

Mobile App Developer Agreements Mobile App Developer Agreements By Alan L. Friel Many companies that have had disputes with developers have been surprised to discover that the agreements signed, often without input from legal, failed

More information

Monitor All Employee Activity Across PCs, Laptops & the Internet

Monitor All Employee Activity Across PCs, Laptops & the Internet Monitor All Employee Activity Across PCs, Laptops & the Internet Paul Down, Director EMEA. SpectorSoft Corp. 24 October 2012 Agenda Introductions About SpectorSoft Prominent business challenges How you

More information

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Inside ü Tips for deploying or expanding BYOD programs while remaining

More information

UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION ON

UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION ON UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION ON 04 20 2011 ) In the Matter of ) ) POM WONDERFUL LLC and, ) ROLL GLOBAL LLC, ) as successor in interest to ) Roll International Corporation,

More information

ESS, LLC Cloud Sync White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync

ESS, LLC Cloud Sync White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync ESS, LLC Cloud Sync White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync July 2015 Copyright 2015 Eagle Secure Solutions, LLC Introduction The rapid adoption of consumer-grade

More information

A 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from

A 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from A 5-STEP PLAN TO PREPARE FOR BYOD IN HEALTHCARE A Complimentary White Paper from A 5-step plan to prepare for BYOD in health care A Complimentary White Paper from Healthcare Business & Technology Nearly

More information

September 29, 2015. Facing The Challenges of Bring Your Own Device (BYOD) Policies in the Workplace

September 29, 2015. Facing The Challenges of Bring Your Own Device (BYOD) Policies in the Workplace September 29, 2015 Facing The Challenges of Bring Your Own Device (BYOD) Policies in the Workplace Presented By: Angela B. Cummings, Shareholder Littler Mendelson, P.C. 704.972.7005 acummings@littler.com

More information

CLOUD SECURITY LAW MICHAEL KEELING, PE, ESQ. KEELING LAW OFFICES, PC PHOENIX AND CORONADO

CLOUD SECURITY LAW MICHAEL KEELING, PE, ESQ. KEELING LAW OFFICES, PC PHOENIX AND CORONADO CLOUD SECURITY LAW MICHAEL KEELING, PE, ESQ. KEELING LAW OFFICES, PC PHOENIX AND CORONADO NOTE: Information contained in this presentation is intended for informational purposes ONLY. It is not intended

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP

More information

Data Privacy and Cybersecurity Task Force

Data Privacy and Cybersecurity Task Force Data Privacy and Cybersecurity Task Force key contact Josephine Cicchetti Shareholder T: 202.965.8162 F: 202.965.8104 email We provide clients across industries with comprehensive counsel on complex, evolving,

More information

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor The Matrix Reloaded: Cybersecurity and Data Protection for Employers Jodi D. Taylor Why Talk About This Now? Landscape is changing Enforcement by federal and state governments on the rise Legislation on

More information

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley swilley@cosgravelaw.com (503)276-6074

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley swilley@cosgravelaw.com (503)276-6074 BYOD At Your Own Risk Working in the BYOD Era Shane Swilley swilley@cosgravelaw.com (503)276-6074 Remember when mobile technology was more Hollywood fantasy than reality The original Smart Phone By the

More information

MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT

MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT The Fourth Amendment Guarantees a Right to Privacy and Protects Against Unreasonable Searches and Seizures; If Your Fourth

More information

Information Governance: How to Assess Your Status

Information Governance: How to Assess Your Status Information Governance: How to Assess Your Status Jay Yelton, III and Mark Oudersluys December 3, 2015 WNJ.com Agenda What is Information Governance? Why is IG Increasingly Important? Strategic Focus:

More information

Business Court 2012 Annual Report

Business Court 2012 Annual Report 2012 2012 Annual Report Fulton County Superior Court 1 Governing Rules On June 3, 2005, the Supreme Court of Georgia promulgated Atlanta Judicial Circuit Rule 100 governing the procedures of the, as amended

More information

Social Networking Websites and the People Limiter

Social Networking Websites and the People Limiter How to Use Social Networking Sites for Investigative Research: The What, Why and How By Carole Levitt, JD MLS & Mark Rosch Internet For Lawyers Why Bother with Social Media Research Social networking sites

More information

TECHNOLOGY & CLOUD SERVICES

TECHNOLOGY & CLOUD SERVICES General Counsel Services Internet & Online Business Transactions Strategic Transactions & Capital Financings Technology & Cloud Services Start-Ups & Emerging Companies TECHNOLOGY & CLOUD SERVICES WHEN

More information

Emerging Social Media Risks. Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium

Emerging Social Media Risks. Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium Emerging Social Media Risks Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium How is social media changing? New categories, new providers, an expanding group

More information

Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World

Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World Every Cloud Has A Silver Lining Protecting Privilege Data In A Hosted World May 7, 2014 Introduction Lindsay Stevens Director of Software Development Liquid Litigation Management, Inc. lstevens@llminc.com

More information

Data Breach and Senior Living Communities May 29, 2015

Data Breach and Senior Living Communities May 29, 2015 Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs

More information

How To Make Bring Your Own Device A Plus, Not A Risk

How To Make Bring Your Own Device A Plus, Not A Risk FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES BYOD: Bring your own device How to make BYOD a PLUS, not a RISK

More information

Social Media and Records Management. ½ Day Seminar Priscilla Emery President e Nterprise Advisors

Social Media and Records Management. ½ Day Seminar Priscilla Emery President e Nterprise Advisors Social Media and Records Management ½ Day Seminar Priscilla Emery President e Nterprise Advisors Course Objectives At the end of this Seminar you will be able to: Have a solid understanding of the nature

More information

LOJACK CORP FORM 8-K. (Current report filing) Filed 10/19/12 for the Period Ending 10/18/12

LOJACK CORP FORM 8-K. (Current report filing) Filed 10/19/12 for the Period Ending 10/18/12 LOJACK CORP FORM 8-K (Current report filing) Filed 10/19/12 for the Period Ending 10/18/12 Address 40 PEQUOT WAY CANTON, MA 02021 Telephone 781-302-4200 CIK 0000355777 Symbol LOJN SIC Code 3669 - Communications

More information