SlideShare a Scribd company logo
Wherever You Go, There You Are
(With Your Mobile Device)
Legal and Practical Implications of a Cross-Border BYOD program
March 25, 2015
Melinda McLellan
BakerHostetler
Emily Fedeles
Shook, Hardy & Bacon
Moderated by: Jonathan E. Swerdloff, Driven, Inc.
Join Today! aceds.org/join
Exclusive News and Analysis
Monthly Members-Only Webcasts
Networking with CEDS, Members
On-Demand Training
Resources
Jobs Board
bits + bytes Newsletter
Affinity Partner Discounts
“ACEDS provides an excellent, much needed forum… to train, network and stay current on critical
information.”
Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
Jonathan is a consultant at Driven, Inc. Prior to joining
Driven, Jonathan was a litigation associate at Hughes,
Hubbard & Reed LLP with over 10 years experience that
included substantial eDiscovery experience managing
large discovery projects, analyzing enterprise data
systems, and investigations into nontraditional sources of
ESI.
Through his experience as a litigator and programmer,
Jonathan primarily focused on creative problem solving
with regard to all types of data. He analyzed and
produced complex structured data systems and developed
internal workflows for large litigations. His experience also
includes developing cost-saving legal processes,
managing legal budgets, and supervising legal personnel.
Speaker Bio
Jonathan Swerdloff
Consultant and Data Systems
Specialist
Driven, Inc.
jonathan.swerdloff@driven-inc.com
212-364-6385
Emily Fedeles is an associate in the Geneva office of Shook, Hardy & Bacon,
where her practice focuses on the defense of complex litigation in Europe,
West Africa, and the Middle East, including class actions, reimbursement
lawsuits, consumer protection claims, and individual product liability
claims. Emily's role includes working with other outside counsel to
coordinate defense strategies and develop supporting evidence. Emily
advises clients on litigation prevention strategies and legislative projects
that impact or alter civil liability risks - such as proposed legislation on class
actions and punitive damages - in Europe, Africa, and Asia-Pacific. As part
of that strategic advice, Emily evaluates client eDiscovery readiness
programs, advises on collection, review, and production considerations, and
considers the implications of mobile technologies, client information
technology platforms, and related social media use. Emily is an active
member of The Sedona Conference® Working Group Six. Prior to joining
the Geneva office, Emily practiced in the firm's Tampa office representing
product manufacturers against personal injury claims in both state and
federal courts in the United States.
Presenter
Emily Fedeles
Associate
Shook, Hardy & Bacon
efedeles@shb.com
+41.22.787.2000
Melinda McLellan is Counsel in the New York office of
BakerHostetler, where she advises clients on complex privacy,
cybersecurity, and information management issues as a member of
the firm’s national Privacy and Data Protection team. Melinda
regularly counsels companies across multiple industry sectors on a
broad range of privacy and security matters, including by advising
on how to respond to data security incidents and related regulatory
inquiries, creating and implementing internal privacy and security
policies and employee training programs, and working with
marketing teams to develop innovative and compliant new media
campaigns. Melinda is a 2005 graduate of Harvard Law School
where she served as Executive Editor of the Harvard International
Law Journal. New York Super Lawyers has selected Melinda as a
“Rising Star” for the past three years in a row.
Presenter
Melinda McLellan
Counsel
BakerHostetler
mmclellan@bakerlaw.com
212.589.4679
http://www.dataprivacymonitor.com/
• What is BYOD?
• Adoption rates
• Benefits to organizations
and individuals
• How does BYOD create risks
for organizations?
– The “number one e-
discovery challenge... for the
coming years”
BYOD Generally
7
• Tension between personal
privacy and professional needs
• Different countries, different
privacy expectations
– Employer expectations
– Employee expectations
• FTC mobile privacy guidance
(2013)
Privacy – Expectations and Guidance
8
• Regulation of BYOD in the EU
– Historical Backdrop
– Omnibus Data Protection Law
– Works Councils
– Examples: Germany, UK
• U.S. v. Odoni
Privacy – International Issues
9
• Electronic Communications Privacy Act (“ECPA”)
– Katz v. U.S., 389 U.S. 347 (1967)
– Stengart v. Loving Care Agency, Inc., 990 A.2d 650 (N.J. 2010)
• The Stored Communications Act (“SCA”)
– Theofel v. Farey-Jones, 359 F.3d 1066 (9th Cir. 2004)
– Quon v. Arch Wireless Operating Co., 529 F.3d 892 (9th Cir. 2008),
rev’d on other grounds sub nom. City of Ont. v. Quon, 130 S. Ct. 2619
(2010)
– Sunbelt Rentals, Inc. v. Victor No. C13-4240 SBA, 2014 WL 4274313
(N.D. Cal. Aug. 28, 2014)
• The Computer Fraud and Abuse Act (“CFAA”)
– Rajaee v. Design Tech Homes, Ltd., No. 4:13-cv-02517, 2014 WL
5878477 (S.D. Tex. Nov. 11, 2014)
Statutory and Common Law (U.S.)
10
• Security risks associated with BYOD
• The end node problem
• Securing mobile devices: EMMs and MDMs
• Remote wiping
Security
11
• Unique issues associated with BYOD
• Recent cases discussing BYOD
• Who has “control” of the device?
• Managing employee expectations
eDiscovery
12
• Device Basics
• Access and Use
• Designing BYOD Policies
• Privacy Concerns
Implementation Considerations
13
• How will the organization address employee separation and
device disposal issues?
• What types of devices will the organization support?
• If employees will be reimbursed for device purchases, how
will the reimbursement process work?
• What happens when a device is lost or stolen?
– If an employee wishes to trade in a device containing company
data, how will the organization ensure that all such data is
securely removed from the device?
– How can the organization ensure data security with respect to
company data on a personal device if an employee is terminated
or otherwise separates on bad terms?
– How will the organization recover company data if an employee
inadvertently (or intentionally) deletes it from a BYOD device?
Device Basics
14
• Who within the organization will be allowed to
participate in the BYOD program?
• Will the scope of employee participation differ
depending on job functions?
• What types of company data may employees
access using their devices?
• Who owns the data on the device when an
employee leaves?
• How should the organization restrict “risky”
employee behavior on the clock?
Access and Use
15
• What considerations go into the organization’s strategic
approach?
• How will the organization handle BYOD policy
violations?
• How will the organization address border crossing
security issues with respect to BYOD devices?
• What device security considerations are involved at the
strategic level?
• Which jurisdiction’s law will apply in various
scenarios?
• How will the organization integrate BYOD
considerations into other organizational policies?
Designing BYOD Policies
16
• Who within the organization is responsible for
monitoring legal developments concerning
BYOD?
• How will the organization provide notice of its
monitoring practices, and offer choices with
respect to monitoring where required?
• What additional factors should be considered
when the organization issues legal holds that
apply to BYOD devices?
Privacy Concerns
17

More Related Content

What's hot

The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
Dan Michaluk
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES.eu
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
Nor Ayuzi Deraman
 
Mis ethical social
Mis ethical socialMis ethical social
Mis ethical social
university of education,Lahore
 
170105 d link-complaint_and_exhibits
170105 d link-complaint_and_exhibits170105 d link-complaint_and_exhibits
170105 d link-complaint_and_exhibits
Andrey Apuhtin
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...William Tanenbaum
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)
Dr Dev Kambhampati
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
Trevor Fox
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
Duane Blackburn
 
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
Robert Ambrogi
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law Practice
Robert Ambrogi
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
Glenn E. Davis
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Financial Poise
 
Data ethics for developers
Data ethics for developersData ethics for developers
Data ethics for developers
anilramnanan
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
mkeane
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
Global Business Events - the Heart of your Network.
 
Who owns your data ans why should you care
Who owns your data ans why should you careWho owns your data ans why should you care
Who owns your data ans why should you care
Derek Keats
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 

What's hot (20)

The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
Mis ethical social
Mis ethical socialMis ethical social
Mis ethical social
 
170105 d link-complaint_and_exhibits
170105 d link-complaint_and_exhibits170105 d link-complaint_and_exhibits
170105 d link-complaint_and_exhibits
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
 
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law Practice
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Data ethics for developers
Data ethics for developersData ethics for developers
Data ethics for developers
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Who owns your data ans why should you care
Who owns your data ans why should you careWho owns your data ans why should you care
Who owns your data ans why should you care
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 

Viewers also liked

Controllo delle emissione di CO2 di siti di e-commerce (IT language)
Controllo delle emissione di CO2 di siti di e-commerce (IT language)Controllo delle emissione di CO2 di siti di e-commerce (IT language)
Controllo delle emissione di CO2 di siti di e-commerce (IT language)
Valerio Morfino
 
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
Logikcull.com
 
Tugas so2 fitriana bakar044
Tugas so2 fitriana bakar044Tugas so2 fitriana bakar044
Tugas so2 fitriana bakar044
charis_fit
 
Dracula 150331060816-conversion-gate01
Dracula 150331060816-conversion-gate01Dracula 150331060816-conversion-gate01
Dracula 150331060816-conversion-gate01
David Lunn
 
Evaluation question 1
Evaluation question 1 Evaluation question 1
Evaluation question 1
curtisfrench
 
Proyecto vocacional 2012 2014
Proyecto vocacional 2012 2014Proyecto vocacional 2012 2014
Proyecto vocacional 2012 2014
franfrater
 
How to inform your clients
How to inform your clients How to inform your clients
How to inform your clients
Xin Yi Zyx
 
Donofrio caine ppp
Donofrio caine pppDonofrio caine ppp
Donofrio caine ppp
cainesic
 
Three Tears for Jimmy Prophet
Three Tears for Jimmy Prophet Three Tears for Jimmy Prophet
Three Tears for Jimmy Prophet
rosiejanepenman
 
Genre research
Genre researchGenre research
Genre research
Emilia Waterhouse
 
презентація 1
презентація 1презентація 1
презентація 1
Natalya88
 
2014 2015 ieee dotnet projects lists
2014 2015 ieee dotnet projects lists2014 2015 ieee dotnet projects lists
2014 2015 ieee dotnet projects lists
IEEEJAVAPROJECTS
 
Ieee 2014 2015 matlab projects titles list globalsoft technologies
Ieee 2014 2015 matlab projects titles list globalsoft technologiesIeee 2014 2015 matlab projects titles list globalsoft technologies
Ieee 2014 2015 matlab projects titles list globalsoft technologies
IEEEMATLABPROJECTS
 
Romeo-Juliet Kelas Pekerja
Romeo-Juliet Kelas PekerjaRomeo-Juliet Kelas Pekerja
Romeo-Juliet Kelas Pekerja
Pindai Media
 
2.5.3 ppp slides
2.5.3 ppp slides2.5.3 ppp slides
2.5.3 ppp slides
Veronica Brownston
 
Turkvatandasligikanunu
TurkvatandasligikanunuTurkvatandasligikanunu
Turkvatandasligikanunugökhan durum
 
Research & planning - Recce
Research & planning - RecceResearch & planning - Recce
Research & planning - Recce
MattR298
 

Viewers also liked (17)

Controllo delle emissione di CO2 di siti di e-commerce (IT language)
Controllo delle emissione di CO2 di siti di e-commerce (IT language)Controllo delle emissione di CO2 di siti di e-commerce (IT language)
Controllo delle emissione di CO2 di siti di e-commerce (IT language)
 
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
 
Tugas so2 fitriana bakar044
Tugas so2 fitriana bakar044Tugas so2 fitriana bakar044
Tugas so2 fitriana bakar044
 
Dracula 150331060816-conversion-gate01
Dracula 150331060816-conversion-gate01Dracula 150331060816-conversion-gate01
Dracula 150331060816-conversion-gate01
 
Evaluation question 1
Evaluation question 1 Evaluation question 1
Evaluation question 1
 
Proyecto vocacional 2012 2014
Proyecto vocacional 2012 2014Proyecto vocacional 2012 2014
Proyecto vocacional 2012 2014
 
How to inform your clients
How to inform your clients How to inform your clients
How to inform your clients
 
Donofrio caine ppp
Donofrio caine pppDonofrio caine ppp
Donofrio caine ppp
 
Three Tears for Jimmy Prophet
Three Tears for Jimmy Prophet Three Tears for Jimmy Prophet
Three Tears for Jimmy Prophet
 
Genre research
Genre researchGenre research
Genre research
 
презентація 1
презентація 1презентація 1
презентація 1
 
2014 2015 ieee dotnet projects lists
2014 2015 ieee dotnet projects lists2014 2015 ieee dotnet projects lists
2014 2015 ieee dotnet projects lists
 
Ieee 2014 2015 matlab projects titles list globalsoft technologies
Ieee 2014 2015 matlab projects titles list globalsoft technologiesIeee 2014 2015 matlab projects titles list globalsoft technologies
Ieee 2014 2015 matlab projects titles list globalsoft technologies
 
Romeo-Juliet Kelas Pekerja
Romeo-Juliet Kelas PekerjaRomeo-Juliet Kelas Pekerja
Romeo-Juliet Kelas Pekerja
 
2.5.3 ppp slides
2.5.3 ppp slides2.5.3 ppp slides
2.5.3 ppp slides
 
Turkvatandasligikanunu
TurkvatandasligikanunuTurkvatandasligikanunu
Turkvatandasligikanunu
 
Research & planning - Recce
Research & planning - RecceResearch & planning - Recce
Research & planning - Recce
 

Similar to ACEDS-Driven March 2015 BYOD Webcast

Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Eric Vanderburg
 
What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?
Logikcull.com
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
asundaram1
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
Tom Walker
 
2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery2 7-2013-big data and e-discovery
2 7-2013-big data and e-discoveryExterro
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
DATAVERSITY
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
Erik Kokkonen
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
robkitchin
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
Joel Cardella
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
Jason Haislmaier
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Eric Vanderburg
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
Ravindra Babu
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
Eryk Budi Pratama
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
Arianto Muditomo
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Legal Services National Technology Assistance Project (LSNTAP)
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Joe Bartolo
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
Data-Set
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
Deloitte United States
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 

Similar to ACEDS-Driven March 2015 BYOD Webcast (20)

Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 

More from Logikcull.com

Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery?
Logikcull.com
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Logikcull.com
 
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleThe Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
Logikcull.com
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update
Logikcull.com
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
Logikcull.com
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull.com
 
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull.com
 
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull.com
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document Review
Logikcull.com
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
Logikcull.com
 
Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15
Logikcull.com
 
ACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 Webcast
Logikcull.com
 
ACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 Webcast
Logikcull.com
 
ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy
Logikcull.com
 
Understanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured DataUnderstanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured Data
Logikcull.com
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
Logikcull.com
 
Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity
Logikcull.com
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15
Logikcull.com
 
TRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesTRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast Slides
Logikcull.com
 
ACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 Webcast
Logikcull.com
 

More from Logikcull.com (20)

Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery?
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleThe Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama Papers
 
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document Review
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15
 
ACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 Webcast
 
ACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 Webcast
 
ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy
 
Understanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured DataUnderstanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured Data
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15
 
TRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesTRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast Slides
 
ACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 Webcast
 

Recently uploaded

Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
johncavitthouston
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 

Recently uploaded (20)

Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 

ACEDS-Driven March 2015 BYOD Webcast

  • 1. Wherever You Go, There You Are (With Your Mobile Device) Legal and Practical Implications of a Cross-Border BYOD program March 25, 2015 Melinda McLellan BakerHostetler Emily Fedeles Shook, Hardy & Bacon Moderated by: Jonathan E. Swerdloff, Driven, Inc.
  • 2. Join Today! aceds.org/join Exclusive News and Analysis Monthly Members-Only Webcasts Networking with CEDS, Members On-Demand Training Resources Jobs Board bits + bytes Newsletter Affinity Partner Discounts “ACEDS provides an excellent, much needed forum… to train, network and stay current on critical information.” Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
  • 3.
  • 4. Jonathan is a consultant at Driven, Inc. Prior to joining Driven, Jonathan was a litigation associate at Hughes, Hubbard & Reed LLP with over 10 years experience that included substantial eDiscovery experience managing large discovery projects, analyzing enterprise data systems, and investigations into nontraditional sources of ESI. Through his experience as a litigator and programmer, Jonathan primarily focused on creative problem solving with regard to all types of data. He analyzed and produced complex structured data systems and developed internal workflows for large litigations. His experience also includes developing cost-saving legal processes, managing legal budgets, and supervising legal personnel. Speaker Bio Jonathan Swerdloff Consultant and Data Systems Specialist Driven, Inc. jonathan.swerdloff@driven-inc.com 212-364-6385
  • 5. Emily Fedeles is an associate in the Geneva office of Shook, Hardy & Bacon, where her practice focuses on the defense of complex litigation in Europe, West Africa, and the Middle East, including class actions, reimbursement lawsuits, consumer protection claims, and individual product liability claims. Emily's role includes working with other outside counsel to coordinate defense strategies and develop supporting evidence. Emily advises clients on litigation prevention strategies and legislative projects that impact or alter civil liability risks - such as proposed legislation on class actions and punitive damages - in Europe, Africa, and Asia-Pacific. As part of that strategic advice, Emily evaluates client eDiscovery readiness programs, advises on collection, review, and production considerations, and considers the implications of mobile technologies, client information technology platforms, and related social media use. Emily is an active member of The Sedona Conference® Working Group Six. Prior to joining the Geneva office, Emily practiced in the firm's Tampa office representing product manufacturers against personal injury claims in both state and federal courts in the United States. Presenter Emily Fedeles Associate Shook, Hardy & Bacon efedeles@shb.com +41.22.787.2000
  • 6. Melinda McLellan is Counsel in the New York office of BakerHostetler, where she advises clients on complex privacy, cybersecurity, and information management issues as a member of the firm’s national Privacy and Data Protection team. Melinda regularly counsels companies across multiple industry sectors on a broad range of privacy and security matters, including by advising on how to respond to data security incidents and related regulatory inquiries, creating and implementing internal privacy and security policies and employee training programs, and working with marketing teams to develop innovative and compliant new media campaigns. Melinda is a 2005 graduate of Harvard Law School where she served as Executive Editor of the Harvard International Law Journal. New York Super Lawyers has selected Melinda as a “Rising Star” for the past three years in a row. Presenter Melinda McLellan Counsel BakerHostetler mmclellan@bakerlaw.com 212.589.4679 http://www.dataprivacymonitor.com/
  • 7. • What is BYOD? • Adoption rates • Benefits to organizations and individuals • How does BYOD create risks for organizations? – The “number one e- discovery challenge... for the coming years” BYOD Generally 7
  • 8. • Tension between personal privacy and professional needs • Different countries, different privacy expectations – Employer expectations – Employee expectations • FTC mobile privacy guidance (2013) Privacy – Expectations and Guidance 8
  • 9. • Regulation of BYOD in the EU – Historical Backdrop – Omnibus Data Protection Law – Works Councils – Examples: Germany, UK • U.S. v. Odoni Privacy – International Issues 9
  • 10. • Electronic Communications Privacy Act (“ECPA”) – Katz v. U.S., 389 U.S. 347 (1967) – Stengart v. Loving Care Agency, Inc., 990 A.2d 650 (N.J. 2010) • The Stored Communications Act (“SCA”) – Theofel v. Farey-Jones, 359 F.3d 1066 (9th Cir. 2004) – Quon v. Arch Wireless Operating Co., 529 F.3d 892 (9th Cir. 2008), rev’d on other grounds sub nom. City of Ont. v. Quon, 130 S. Ct. 2619 (2010) – Sunbelt Rentals, Inc. v. Victor No. C13-4240 SBA, 2014 WL 4274313 (N.D. Cal. Aug. 28, 2014) • The Computer Fraud and Abuse Act (“CFAA”) – Rajaee v. Design Tech Homes, Ltd., No. 4:13-cv-02517, 2014 WL 5878477 (S.D. Tex. Nov. 11, 2014) Statutory and Common Law (U.S.) 10
  • 11. • Security risks associated with BYOD • The end node problem • Securing mobile devices: EMMs and MDMs • Remote wiping Security 11
  • 12. • Unique issues associated with BYOD • Recent cases discussing BYOD • Who has “control” of the device? • Managing employee expectations eDiscovery 12
  • 13. • Device Basics • Access and Use • Designing BYOD Policies • Privacy Concerns Implementation Considerations 13
  • 14. • How will the organization address employee separation and device disposal issues? • What types of devices will the organization support? • If employees will be reimbursed for device purchases, how will the reimbursement process work? • What happens when a device is lost or stolen? – If an employee wishes to trade in a device containing company data, how will the organization ensure that all such data is securely removed from the device? – How can the organization ensure data security with respect to company data on a personal device if an employee is terminated or otherwise separates on bad terms? – How will the organization recover company data if an employee inadvertently (or intentionally) deletes it from a BYOD device? Device Basics 14
  • 15. • Who within the organization will be allowed to participate in the BYOD program? • Will the scope of employee participation differ depending on job functions? • What types of company data may employees access using their devices? • Who owns the data on the device when an employee leaves? • How should the organization restrict “risky” employee behavior on the clock? Access and Use 15
  • 16. • What considerations go into the organization’s strategic approach? • How will the organization handle BYOD policy violations? • How will the organization address border crossing security issues with respect to BYOD devices? • What device security considerations are involved at the strategic level? • Which jurisdiction’s law will apply in various scenarios? • How will the organization integrate BYOD considerations into other organizational policies? Designing BYOD Policies 16
  • 17. • Who within the organization is responsible for monitoring legal developments concerning BYOD? • How will the organization provide notice of its monitoring practices, and offer choices with respect to monitoring where required? • What additional factors should be considered when the organization issues legal holds that apply to BYOD devices? Privacy Concerns 17

Editor's Notes

  1. Hello and welcome to this ACEDS webcast, Wherever You Go, There You Are (With Your Mobile Device) – Legal and Practical Implications of a Cross-Border BYOD Program, presented by Driven. I’m your host Robert Hilson of ACEDS, and I’m joined today by three great experts, who I will introduce in a moment. But first I have two brief announcements.
  2. I’d like to especially welcome everyone on the call who is new to ACEDS. ACEDS is a membership association owned and managed by Barbri that is committed to promoting e-discovery skill and competence through training, education, and networking. We offer the Certified E-Discovery Specialist credential, which is held by more than a thousand practitioners in the US and globally. You can join today and start receiving a number of benefits exclusive to our members, including news content, members-only webcasts, our bits+bytes newsletter, a members directory, and special benefits from our affinity partners, which now include EDRM and Tru Staffing Partners.
  3. We will be holding our annual conference September 29 to 30 at the Gaylord National Resort in Washington, DC. A live certification prep course will precede the conference on the 28th. And we expect this to be our best show yet. We’ve announced a number of great speakers, including those you see on your screen. Earlier this month, we announced that retired US magistrate Judge Nan Nolan, who is now at JAMS, will be presenting, as well as Jeff Jacobson, the Director of the New Jersey Division of Law. They will join Judge Grimm, Judge Waxse and Judge Thomas Vanaskie among others. You can visit ediscoveryconference.com and learn more about the program and the topics we`ll cover, and if you feel so inclined, you can register to attend.
  4. Alright, let’s get started. Our moderator today is Jonathan Swerdloff, a consultant at Driven. Prior to joining Driven, he was a litigation associate at Hughes Hubbard and he has more than 10 years of experience managing large discovery projects, analyzing enterprise data systems and conducting investigations into nontraditional sources of ESI. Jonathan, thanks for joining us.
  5. Jonathan is joined by Emily Fedeles, an associate in the Geneva office of Shook Hardy, where her practice focuses on the defense of complex litigation in Europe, West Africa and the Middle East, including class actions, reimbursement lawsuits, consumer protection claims, and individual product liability claims. Emily, thanks for joining us today.
  6. By the way, all of this speakers have very impressive bios, and I encourage to go to ACEDS.org to read them all in full… Jonathan and Emily are joined by Melinda McLellan, an attorney in the New York office of Baker Hostetler. Melinda advises clients on complex privacy, cybersecurity and information management issues as a member of the firm’s national privacy and data protection team. New York Super Lawyers has selected her as a rising start three years in a row. Melinda, thanks for being here. Okay, before we get started, I want to encourage everyone on the call to ask questions by typing them into the questions box on the right of your screen. And we will get to them at the end of the presentation as time allows.