This document summarizes a presentation on the legal and practical implications of bring your own device (BYOD) programs that allow employees to use personal mobile devices for work. The presentation discusses BYOD adoption rates and benefits, as well as privacy and security risks for organizations. It covers international privacy issues, relevant US statutes and case law, security considerations including mobile device management, and unique challenges for eDiscovery with BYOD. Implementation topics like device basics, access controls, policy design, and privacy are also summarized.
From the FinTech Webinar Series. Explores:
1. Storage and Processing of Data in “the Cloud”
2. Mobile Devices and Mobile Apps
3. “Big Data”
4. Security and Privacy Issues in Third-Party Contracts
5. Data Security and Corporate Governance
6. International Privacy and Data Security
7. Data Security as a National Security Concern: Legislation and Executive Initiatives
From the FinTech Webinar Series. Explores:
1. Recent Federal Cybersecurity Developments: Executive Order, NIST Standards, Information-Sharing, Legislation
2. Privacy and Security Issues in Cloud Computing Contracts
3. International Privacy and Transferring Data Across Borders
4. Mobile Devices and Mobile Apps
5. Workplace and Corporate Governance Developments
6. The FTC’s New Rules Concerning Children’s Privacy
Managing the Legal Concerns of Cloud ComputingAmy Larrimore
Presented at the 2013 Pennsylvania Bar Institute as an edition in an annual series on legal concerns around cloud computing ,. This one covers how technology overlaps and where the risk needs to be managed in between systems.
BCC (2012): Federal Panel Identifying Future Government NeedsDuane Blackburn
The federal government held its annual Biometric Consortium Conference 18-20 September 2012. MITRE hosted a workshop during this conference to highlight FFRDC support to the federal biometrics enterprise. One panel in this workshop focused on identifying priorities that the federal government will not be able to address and/or sponsor, and that should be considered for attention by non-federal entities. This paper summarizes the priorities identified during this panel.
From the FinTech Webinar Series. Explores:
1. Storage and Processing of Data in “the Cloud”
2. Mobile Devices and Mobile Apps
3. “Big Data”
4. Security and Privacy Issues in Third-Party Contracts
5. Data Security and Corporate Governance
6. International Privacy and Data Security
7. Data Security as a National Security Concern: Legislation and Executive Initiatives
From the FinTech Webinar Series. Explores:
1. Recent Federal Cybersecurity Developments: Executive Order, NIST Standards, Information-Sharing, Legislation
2. Privacy and Security Issues in Cloud Computing Contracts
3. International Privacy and Transferring Data Across Borders
4. Mobile Devices and Mobile Apps
5. Workplace and Corporate Governance Developments
6. The FTC’s New Rules Concerning Children’s Privacy
Managing the Legal Concerns of Cloud ComputingAmy Larrimore
Presented at the 2013 Pennsylvania Bar Institute as an edition in an annual series on legal concerns around cloud computing ,. This one covers how technology overlaps and where the risk needs to be managed in between systems.
BCC (2012): Federal Panel Identifying Future Government NeedsDuane Blackburn
The federal government held its annual Biometric Consortium Conference 18-20 September 2012. MITRE hosted a workshop during this conference to highlight FFRDC support to the federal biometrics enterprise. One panel in this workshop focused on identifying priorities that the federal government will not be able to address and/or sponsor, and that should be considered for attention by non-federal entities. This paper summarizes the priorities identified during this panel.
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES.eu
On June 28, the e-SIDES team members made a presentation of the project at the ICE/IEEE Conference 2017 in Madeira. The workshop "Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytic" welcomed a high-level international academic and government audience, such as professors and researchers, to present the initial analysis of the key challenges.
Ethical, Social, and Political Issues in E-commerceNor Ayuzi Deraman
Internet, like other technologies, can:
Enable new crimes
Affect environment
Threaten social values
Costs and benefits must be carefully considered, especially when there are no clear-cut legal or cultural guidelines
FTC Internet of Things Report
The report includes the following recommendations for companies developing Internet of Things devices:
build security into devices at the outset, rather than as an afterthought in the design process;
train employees about the importance of security, and ensure that security is managed at an appropriate level in the organization;
ensure that when outside service providers are hired, that those providers are capable of maintaining reasonable security, and provide reasonable oversight of the providers;
when a security risk is identified, consider a “defense-in-depth” strategy whereby multiple layers of security may be used to defend against a particular risk;
consider measures to keep unauthorized users from accessing a consumer’s device, data, or personal information stored on the network;
monitor connected devices throughout their expected life cycle, and where feasible, provide security patches to cover known risks.
What every product manager needs to know about online privacyTrevor Fox
This seminar will introduce the issue and describe the potential for new privacy laws in the US and in the EU that could affect the business model of social medial/Web 2.0/mobile app vendors.
Potential Opportunities for Common Federal Biometric ServicesDuane Blackburn
Looking long term, what could be done to alter the foundations that federal biometric systems are built upon, thus enabling advancements that may not be possible today? In other words: How could these systems evolve to be more adaptive and flexible, both individually and as a whole?
MITRE internally funded a quick analysis to develop initial strategic thoughts on this topic, based on its in-depth knowledge of the existing systems. It is important to note that this project did not perform a deep-dive analysis of various options, and it does not present detailed actionable recommendations. Rather, it capitalizes on existing knowledge and experiences to analyze numerous potential opportunities and to identify those that we feel hold the most promise. It is this latter set of opportunities that are presented in this presentation. In each case, MITRE recommends more thorough analysis and interagency discussion take place amongst federal departments, prior to any actionable decisions being made.
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...Robert Ambrogi
This was my keynote delivered to the Legal Services Corporation's 2018 Innovations in Tech Conference. Few would dispute that technology is one of the keys to addressing the justice gap. Yet at a time when technological innovation abounds, the justice gap grows only wider. The problem is not technology – it is the justice system’s failure to employ it. In this program, we’ll explore the impediments to broader use of technology and what can be done to overcome them.
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
The american workplace is in a period of unprecedented change as the combination of mobile technology and social media is changing the "who, what, when and where" of work.
Who owns your data ans why should you careDerek Keats
This is a video that was made from a webinar I did for Living in a connected world: Who owns my data, and why should I care? that was held by Nedbank, JCSE and EE Business Intelligence. My focus was on what ownership means.
Controllo delle emissione di CO2 di siti di e-commerce (IT language)Valerio Morfino
IT: L'utilizzo di Internet continua a crescere in modo molto significativo. Anche l'e-commerce sta iniziando a crescere in modo sensibile. Nella presentazione viene descritto un algoritmo per il calcolo delle emissioni di CO2 di un sito e-commerce. L'algoritmo prende in considerazione elementi hardware e software, ma anche aspetti non strettamente tecnici come Web Marketing e Web Design.
ENG: The use of the Internet has grown continuously in recent years and it is expected it still continues to grow significantly. The eCommerce applications are also growing significantly. In this work we describe an explicit reliable method for calculating the CO2 emissions of an eCommerce systen, using simple to find data. The methods use variables that are related to hardware and software factors, but also to elements which are not strictly technical such as Web Design and Web Marketing.
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES.eu
On June 28, the e-SIDES team members made a presentation of the project at the ICE/IEEE Conference 2017 in Madeira. The workshop "Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytic" welcomed a high-level international academic and government audience, such as professors and researchers, to present the initial analysis of the key challenges.
Ethical, Social, and Political Issues in E-commerceNor Ayuzi Deraman
Internet, like other technologies, can:
Enable new crimes
Affect environment
Threaten social values
Costs and benefits must be carefully considered, especially when there are no clear-cut legal or cultural guidelines
FTC Internet of Things Report
The report includes the following recommendations for companies developing Internet of Things devices:
build security into devices at the outset, rather than as an afterthought in the design process;
train employees about the importance of security, and ensure that security is managed at an appropriate level in the organization;
ensure that when outside service providers are hired, that those providers are capable of maintaining reasonable security, and provide reasonable oversight of the providers;
when a security risk is identified, consider a “defense-in-depth” strategy whereby multiple layers of security may be used to defend against a particular risk;
consider measures to keep unauthorized users from accessing a consumer’s device, data, or personal information stored on the network;
monitor connected devices throughout their expected life cycle, and where feasible, provide security patches to cover known risks.
What every product manager needs to know about online privacyTrevor Fox
This seminar will introduce the issue and describe the potential for new privacy laws in the US and in the EU that could affect the business model of social medial/Web 2.0/mobile app vendors.
Potential Opportunities for Common Federal Biometric ServicesDuane Blackburn
Looking long term, what could be done to alter the foundations that federal biometric systems are built upon, thus enabling advancements that may not be possible today? In other words: How could these systems evolve to be more adaptive and flexible, both individually and as a whole?
MITRE internally funded a quick analysis to develop initial strategic thoughts on this topic, based on its in-depth knowledge of the existing systems. It is important to note that this project did not perform a deep-dive analysis of various options, and it does not present detailed actionable recommendations. Rather, it capitalizes on existing knowledge and experiences to analyze numerous potential opportunities and to identify those that we feel hold the most promise. It is this latter set of opportunities that are presented in this presentation. In each case, MITRE recommends more thorough analysis and interagency discussion take place amongst federal departments, prior to any actionable decisions being made.
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...Robert Ambrogi
This was my keynote delivered to the Legal Services Corporation's 2018 Innovations in Tech Conference. Few would dispute that technology is one of the keys to addressing the justice gap. Yet at a time when technological innovation abounds, the justice gap grows only wider. The problem is not technology – it is the justice system’s failure to employ it. In this program, we’ll explore the impediments to broader use of technology and what can be done to overcome them.
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
The american workplace is in a period of unprecedented change as the combination of mobile technology and social media is changing the "who, what, when and where" of work.
Who owns your data ans why should you careDerek Keats
This is a video that was made from a webinar I did for Living in a connected world: Who owns my data, and why should I care? that was held by Nedbank, JCSE and EE Business Intelligence. My focus was on what ownership means.
Controllo delle emissione di CO2 di siti di e-commerce (IT language)Valerio Morfino
IT: L'utilizzo di Internet continua a crescere in modo molto significativo. Anche l'e-commerce sta iniziando a crescere in modo sensibile. Nella presentazione viene descritto un algoritmo per il calcolo delle emissioni di CO2 di un sito e-commerce. L'algoritmo prende in considerazione elementi hardware e software, ma anche aspetti non strettamente tecnici come Web Marketing e Web Design.
ENG: The use of the Internet has grown continuously in recent years and it is expected it still continues to grow significantly. The eCommerce applications are also growing significantly. In this work we describe an explicit reliable method for calculating the CO2 emissions of an eCommerce systen, using simple to find data. The methods use variables that are related to hardware and software factors, but also to elements which are not strictly technical such as Web Design and Web Marketing.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Ieee 2014 2015 matlab projects titles list globalsoft technologiesIEEEMATLABPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.globalsofttechnologies.org
Reaksi dari internal keluarga buruh dapat menghambat agenda politik serikat. Ini gejala rutin di kalangan gerakan buruh, sehingga penting bagi buruh yang aktif dalam serikat mendapat dukungan dari keluarga dan orang terdekat. Terkadang ia menuntut pengorbanan pribadi bahkan menghadapi kasus perceraian.
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
To do effective data governance, analysts should preview the amount of data their organization is collecting and consider if it is all necessary information to run the business or just “nice to have” data. Today companies are collecting a variety of Personally identifiable information (PII), combining it with location information, and using it to both personalize their own services and to sell to advertisers for behavioral marketing. Data brokers are tracking cell phone applications and insurance companies are installing devices to monitor driving habits. At the same time, however, hackers are embedding malicious software in company computers, opening a virtual door for criminals to rifle through an organization’s valuable personal and financial information.
This presentation explores:
•What company data should be tagged as “sensitive” data?
•Who within the company has access to personal data?
•Is the company breaking any privacy laws by storing PII data?
•Is the data secure from both internal and external hackers?
•What happens if there is an external data breech?
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
This paper was presented at the 'Towards a Magna Carta for Data' workshop at the RDS in Dublin, Sept 17th. It discusses how considerations of the ethics of big data consist of much more than the issues of privacy and security that it often gets boiled down to, and argues that the various ethical issues related to big data are multidimensional and contested; vary in nature across domains, and which ethical philosophy is adopted matters to the deliberation over data rights.
When Past Performance May Be Indicative of Future Results - The Legal Implica...Jason Haislmaier
Presentation to the ABA Cyberspace Law Committee 2014 Winter Meeting in Denver, CO. Bruce Antley and Jason Haislmaier. Covering legal issues in location based services and the use of predictive analytics.
This presentation is prepared by Author for Perbanas Institute as a part of Author Lecture Series. It is to be used for educational and non-commercial purposes only and is not to be changed, altered, or used for any commercial endeavor without the express written permission from Author and/or Perbanas Institute. Appropriate legal action may be taken against any person, organization, or entity attempting to misrepresent, charge, or profit from the educational materials contained here.
Authors are allowed to use their own articles without seeking permission from any person, organization, or entity.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
As the confluence of several mature and emerging technologies, the Internet of Things (IoT) is rapidly developing into a vibrant new marketplace. What are important considerations for technology, media, and telecom (TMT) companies as they compete for opportunities? This presentation covers:
• Questions TMT executives should be asking about impacts of IoT technologies, performance improvement opportunities, and where value can be generated.
• Building an IoT ecosystem where all players benefit – defining different players' roles and relationships, and already-successful tactics.
• Security and privacy challenges, including how data protection responsibility is assigned and monitored, and defining appropriate security and privacy standards.
Explore this quickly developing new opportunity for TMT companies.
Get more IoT insights: http://www.deloitte.com/us/iot_ecosystem
If you're a legal or security professional, the looming General Data Protection Regulation, or GDPR, is likely causing your blood pressure to rise. Expected to impose strict limitations on organizations that do business in the European Union, or otherwise collect the data of European citizens, the regulation is said to raise the stakes for privacy compliance as well as for transcontinental discovery. Organizations that don't meet its standards by May 2018 will be the subject of potentially business-rattling sanctions.
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Logikcull.com
In June, a massive cyberattack brought down one of the country's biggest law firms. DLA Piper, its systems ravaged by the Petya ransomware program, was forced to shut down its phones service, email, and internal computer network--potentially costing millions in lost income. Weeks later, the firm was still digging itself out.
Such attacks are increasingly an existential threat to firms of all sizes: the difference between being billing and nothingness. Join us as we discuss this urgent issue.
Join Logikcull and a panel of experts for lessons and best practices to be learned from the most important eDiscovery cases -- and debacles -- of the year. Seven cases will be featured. Come for the hardcore precedence. Stay for the surprise bonus lessons. Michael Simon and Timothy Lohse will host.
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull.com
Security experts have a favorite saying: data is most vulnerable when it's in motion. Discovery, unfortunately, is a process of motion, where information and documents are shared between client, counsel, third-party service providers and opposing parties. Often, this data is exchanged on physical media (i.e. hard drives, DVDs) or through insecure methods like unencyrpted email. It's a risky, time-consuming and expensive process.
And with ShareSafe from Logikcull, it has been eliminated.
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull.com
From privilege waivers to data breach, the threat of legal malpractice related to discovery and data handling is real and, despite relative silence on the issue, pervasive. Smart litigators who have a firm grasp of their discovery obligations can protect themselves, their practices, and their clients.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
1. Wherever You Go, There You Are
(With Your Mobile Device)
Legal and Practical Implications of a Cross-Border BYOD program
March 25, 2015
Melinda McLellan
BakerHostetler
Emily Fedeles
Shook, Hardy & Bacon
Moderated by: Jonathan E. Swerdloff, Driven, Inc.
2. Join Today! aceds.org/join
Exclusive News and Analysis
Monthly Members-Only Webcasts
Networking with CEDS, Members
On-Demand Training
Resources
Jobs Board
bits + bytes Newsletter
Affinity Partner Discounts
“ACEDS provides an excellent, much needed forum… to train, network and stay current on critical
information.”
Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
3.
4. Jonathan is a consultant at Driven, Inc. Prior to joining
Driven, Jonathan was a litigation associate at Hughes,
Hubbard & Reed LLP with over 10 years experience that
included substantial eDiscovery experience managing
large discovery projects, analyzing enterprise data
systems, and investigations into nontraditional sources of
ESI.
Through his experience as a litigator and programmer,
Jonathan primarily focused on creative problem solving
with regard to all types of data. He analyzed and
produced complex structured data systems and developed
internal workflows for large litigations. His experience also
includes developing cost-saving legal processes,
managing legal budgets, and supervising legal personnel.
Speaker Bio
Jonathan Swerdloff
Consultant and Data Systems
Specialist
Driven, Inc.
jonathan.swerdloff@driven-inc.com
212-364-6385
5. Emily Fedeles is an associate in the Geneva office of Shook, Hardy & Bacon,
where her practice focuses on the defense of complex litigation in Europe,
West Africa, and the Middle East, including class actions, reimbursement
lawsuits, consumer protection claims, and individual product liability
claims. Emily's role includes working with other outside counsel to
coordinate defense strategies and develop supporting evidence. Emily
advises clients on litigation prevention strategies and legislative projects
that impact or alter civil liability risks - such as proposed legislation on class
actions and punitive damages - in Europe, Africa, and Asia-Pacific. As part
of that strategic advice, Emily evaluates client eDiscovery readiness
programs, advises on collection, review, and production considerations, and
considers the implications of mobile technologies, client information
technology platforms, and related social media use. Emily is an active
member of The Sedona Conference® Working Group Six. Prior to joining
the Geneva office, Emily practiced in the firm's Tampa office representing
product manufacturers against personal injury claims in both state and
federal courts in the United States.
Presenter
Emily Fedeles
Associate
Shook, Hardy & Bacon
efedeles@shb.com
+41.22.787.2000
6. Melinda McLellan is Counsel in the New York office of
BakerHostetler, where she advises clients on complex privacy,
cybersecurity, and information management issues as a member of
the firm’s national Privacy and Data Protection team. Melinda
regularly counsels companies across multiple industry sectors on a
broad range of privacy and security matters, including by advising
on how to respond to data security incidents and related regulatory
inquiries, creating and implementing internal privacy and security
policies and employee training programs, and working with
marketing teams to develop innovative and compliant new media
campaigns. Melinda is a 2005 graduate of Harvard Law School
where she served as Executive Editor of the Harvard International
Law Journal. New York Super Lawyers has selected Melinda as a
“Rising Star” for the past three years in a row.
Presenter
Melinda McLellan
Counsel
BakerHostetler
mmclellan@bakerlaw.com
212.589.4679
http://www.dataprivacymonitor.com/
7. • What is BYOD?
• Adoption rates
• Benefits to organizations
and individuals
• How does BYOD create risks
for organizations?
– The “number one e-
discovery challenge... for the
coming years”
BYOD Generally
7
8. • Tension between personal
privacy and professional needs
• Different countries, different
privacy expectations
– Employer expectations
– Employee expectations
• FTC mobile privacy guidance
(2013)
Privacy – Expectations and Guidance
8
9. • Regulation of BYOD in the EU
– Historical Backdrop
– Omnibus Data Protection Law
– Works Councils
– Examples: Germany, UK
• U.S. v. Odoni
Privacy – International Issues
9
10. • Electronic Communications Privacy Act (“ECPA”)
– Katz v. U.S., 389 U.S. 347 (1967)
– Stengart v. Loving Care Agency, Inc., 990 A.2d 650 (N.J. 2010)
• The Stored Communications Act (“SCA”)
– Theofel v. Farey-Jones, 359 F.3d 1066 (9th Cir. 2004)
– Quon v. Arch Wireless Operating Co., 529 F.3d 892 (9th Cir. 2008),
rev’d on other grounds sub nom. City of Ont. v. Quon, 130 S. Ct. 2619
(2010)
– Sunbelt Rentals, Inc. v. Victor No. C13-4240 SBA, 2014 WL 4274313
(N.D. Cal. Aug. 28, 2014)
• The Computer Fraud and Abuse Act (“CFAA”)
– Rajaee v. Design Tech Homes, Ltd., No. 4:13-cv-02517, 2014 WL
5878477 (S.D. Tex. Nov. 11, 2014)
Statutory and Common Law (U.S.)
10
11. • Security risks associated with BYOD
• The end node problem
• Securing mobile devices: EMMs and MDMs
• Remote wiping
Security
11
12. • Unique issues associated with BYOD
• Recent cases discussing BYOD
• Who has “control” of the device?
• Managing employee expectations
eDiscovery
12
13. • Device Basics
• Access and Use
• Designing BYOD Policies
• Privacy Concerns
Implementation Considerations
13
14. • How will the organization address employee separation and
device disposal issues?
• What types of devices will the organization support?
• If employees will be reimbursed for device purchases, how
will the reimbursement process work?
• What happens when a device is lost or stolen?
– If an employee wishes to trade in a device containing company
data, how will the organization ensure that all such data is
securely removed from the device?
– How can the organization ensure data security with respect to
company data on a personal device if an employee is terminated
or otherwise separates on bad terms?
– How will the organization recover company data if an employee
inadvertently (or intentionally) deletes it from a BYOD device?
Device Basics
14
15. • Who within the organization will be allowed to
participate in the BYOD program?
• Will the scope of employee participation differ
depending on job functions?
• What types of company data may employees
access using their devices?
• Who owns the data on the device when an
employee leaves?
• How should the organization restrict “risky”
employee behavior on the clock?
Access and Use
15
16. • What considerations go into the organization’s strategic
approach?
• How will the organization handle BYOD policy
violations?
• How will the organization address border crossing
security issues with respect to BYOD devices?
• What device security considerations are involved at the
strategic level?
• Which jurisdiction’s law will apply in various
scenarios?
• How will the organization integrate BYOD
considerations into other organizational policies?
Designing BYOD Policies
16
17. • Who within the organization is responsible for
monitoring legal developments concerning
BYOD?
• How will the organization provide notice of its
monitoring practices, and offer choices with
respect to monitoring where required?
• What additional factors should be considered
when the organization issues legal holds that
apply to BYOD devices?
Privacy Concerns
17
Editor's Notes
Hello and welcome to this ACEDS webcast, Wherever You Go, There You Are (With Your Mobile Device) – Legal and Practical Implications of a Cross-Border BYOD Program, presented by Driven. I’m your host Robert Hilson of ACEDS, and I’m joined today by three great experts, who I will introduce in a moment. But first I have two brief announcements.
I’d like to especially welcome everyone on the call who is new to ACEDS. ACEDS is a membership association owned and managed by Barbri that is committed to promoting e-discovery skill and competence through training, education, and networking. We offer the Certified E-Discovery Specialist credential, which is held by more than a thousand practitioners in the US and globally. You can join today and start receiving a number of benefits exclusive to our members, including news content, members-only webcasts, our bits+bytes newsletter, a members directory, and special benefits from our affinity partners, which now include EDRM and Tru Staffing Partners.
We will be holding our annual conference September 29 to 30 at the Gaylord National Resort in Washington, DC. A live certification prep course will precede the conference on the 28th. And we expect this to be our best show yet. We’ve announced a number of great speakers, including those you see on your screen. Earlier this month, we announced that retired US magistrate Judge Nan Nolan, who is now at JAMS, will be presenting, as well as Jeff Jacobson, the Director of the New Jersey Division of Law. They will join Judge Grimm, Judge Waxse and Judge Thomas Vanaskie among others. You can visit ediscoveryconference.com and learn more about the program and the topics we`ll cover, and if you feel so inclined, you can register to attend.
Alright, let’s get started. Our moderator today is Jonathan Swerdloff, a consultant at Driven. Prior to joining Driven, he was a litigation associate at Hughes Hubbard and he has more than 10 years of experience managing large discovery projects, analyzing enterprise data systems and conducting investigations into nontraditional sources of ESI.
Jonathan, thanks for joining us.
Jonathan is joined by Emily Fedeles, an associate in the Geneva office of Shook Hardy, where her practice focuses on the defense of complex litigation in Europe, West Africa and the Middle East, including class actions, reimbursement lawsuits, consumer protection claims, and individual product liability claims. Emily, thanks for joining us today.
By the way, all of this speakers have very impressive bios, and I encourage to go to ACEDS.org to read them all in full… Jonathan and Emily are joined by Melinda McLellan, an attorney in the New York office of Baker Hostetler. Melinda advises clients on complex privacy, cybersecurity and information management issues as a member of the firm’s national privacy and data protection team. New York Super Lawyers has selected her as a rising start three years in a row.
Melinda, thanks for being here.
Okay, before we get started, I want to encourage everyone on the call to ask questions by typing them into the questions box on the right of your screen. And we will get to them at the end of the presentation as time allows.