Data Governance for the BYOD Age
Corporate Compliance and Enforcement Hot Topics with IBM VP, Una Dean
Digital Workplace Issues
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Safeguards against Data Security Breaches (Part One)
Corporate Law Report: Managing Cyber Risks, BYOD, Obama's NLRB Crisis, Iran Sanctions, and More
Let’s talk about something that doesn’t get enough attention: protecting your employees’ sensitive personal information. In today’s digital world, keeping your team’s data safe isn’t just a nice-to-have—it’s absolutely...more
Recently, we had interesting questions from a client that was implementing two-factor authentication for employees to access the company’s information systems. The process requires employees to install the authentication app...more
Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online. It is an opportunity to focus on four key behaviors...more
In Formal Opinion 498, issued on March 10, 2021, the American Bar Association’s Standing Committee on Ethics and Professional Responsibility has provided some guidance on the ethical obligations triggered when a lawyer...more
Report on Patient Privacy 18, no. 1 (January 2021) - Security threats to health care entities will continue to escalate in 2021, as bad actors with significant capabilities target pandemic-weary organizations still...more
Secureworks issues an annual Incident Response Report that is very helpful in obtaining information on what types of incidents are occurring in order to become more resistant to threats. The 2020 IR Report was recently...more
In our Quarterly Review, we bring you important UK developments relating to Business Crime, Investigations and Regulatory Enforcement from the last three months. Please contact us if you would like to discuss any of these...more
As the coronavirus (“COVID-19”) pandemic continues, cyber criminals have upped the intensity of their COVID-19-themed cyber-attacks designed to exploit the current crisis. With financial institutions representing primary...more
In a short span of time, we have gone from thinking about the virus as a distant concern to working remotely from home as we have been asked to help flatten the curve by social distancing. We are daily bombarded with news and...more
Malicious cyber actors have been exploiting the COVID-19 crisis, warn the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and the UK’s National Cyber Security Centre (NCSC) in a joint...more
With the spread of the novel coronavirus (COVID-19), cybersecurity criminals and scammers are ramping up their efforts to target vulnerable employers and workforces. The FTC announced today that since January they have...more
COVID-19 has forced many businesses to quickly accommodate a significant portion of their employees working remotely. Having an employee base working away from established offices creates security vulnerabilities that many...more
With cases of the Novel Coronavirus (COVID-19) emerging in nearly every state, many businesses are taking swift action in an effort to curb its spread. Teleworking, “remote working,” or simply “working from home,” is a...more
At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more
The more things change, the more things stay the same. As compliance matures as an industry, we sometimes forget the foundational best-practices that our programs are built upon. Every last Friday of the month, we revisit...more
• On December 14, the SEC’s OCIE issued a Risk Alert summarizing the findings of its limited-scope examination initiative relating to electronic messaging. • Noting a “pervasive use” of electronic messaging by adviser...more
Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more
The EU’s General Data Protection Regulation (GDPR), which went into effect in May 2018, requires companies to implement appropriate security measures when handling personal data....more
You’ve just been sued. Your first thought might not be about data, but your second or third one should be. Information is the lifeblood of the modern corporation, but it can also be its Achilles heel. Terabytes of business...more
Many retailers permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more
1: Accommodation in the Workplace - OVERVIEW - Employers have a duty to accommodate employees’ needs based on those grounds protected under federal and provincial human rights legislation. All employers are required...more
The Internet of Things (IoT) promises a societal transformation based on a virtuous circle of constantly improving connectivity, integration, data, intelligence, and automation. One important element of this transformation is...more
BYOD, or “Bring Your Own Device,” is an umbrella term for policies that employers have concerning your smart phone, tablet, or laptop. Essentially, the questions that BYOD policies seek to answer are these: (1) Who owns...more
Please join us for this complimentary presentation on cutting-edge employment law issues. California and federal employment laws are constantly developing and evolving so it is essential for human resource professionals and...more
A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more