SlideShare a Scribd company logo
1 of 20
The Accidental Cloud
                           Thirteenth Annual Institute on
                           Privacy and Data Security Law
                                  Practicing Law Institute


                     Presented by:
                  Margaret A. Keane
                Littler Mendelson, P.C.
                    MKeane@Littler.com
                      (415) 288-6303



June 19, 2012
The Accidental Cloud
• Wireless and Smartphone = Gateway to Cloud
• Think of Mobile Devices as “Cloud Access
  Tools”
• Your Employees are sending data to the Cloud
  24/7
                                  Tablets




                                                 2
Running Water, Electricity and Wi-Fi

• By 2015, the global mobile worker population will reach
  1.3 million, representing 37.2% of the global workforce
   −       IDC, Worldwide Mobile Worker Population 2011-2015
           Forecast, January 5, 2012
• IPASS Global Workforce Report for Q2 describes wireless
  access as a necessity of life
• Do you consider wireless access (3G, 4G and wi-fi) as
  important to your life as running water and electricity?
       −    Yes, it is that important to the way I live   – 59%
       −    No, but it is pretty close                    – 29%
   IPASS Global Mobile Workforce Report, Q2 2012, p. 5

                                                                  3
What Lives in the Accidental Cloud
•    Mobile devices send information to data storage, video, photography and social
     networking sites, and web-based email providers
•    Cloud services can replace thumb drives for storage
•    Cloud services also provide collaboration capabilities – may be used to circumvent
     IT restriction on sharing information outside the enterprise
•    Third party storage: Where is your data?
      –   iCloud
      –   Google Docs
      –   Dropbox.com
      –   Box.net
•    Generally, there is no reasonable expectation
     of privacy in data held by third parties
•    An employer rarely has any control over
     data stored by third party providers


                                                                                          4
Lingo: Dual Use Mobile Devices
                   and BYOD
•   Dual Use Mobile Device: Mobile device used to create, store and transmit both
    personal and work-related data
•   BYOD: Bring Your Own Device
     – A BYOD program includes:
          •   Policies that govern use of personal devices to
              access corporate services
          •   Policies attempt to manage risk associated with
              storage and transmittal of data using devices that
              may be outside of the employers control
          •   Policies address impact of mobile devices on existing
              workplace behavior
•   Some Other Considerations:
     − Regulatory issues, esp. FINRA – financial services, insurance,
       HIPPA
     − Federal Trade Commission
     − E-discovery implications


                                                                                    5
What is MDM – Mobile Device
              Management?
Mobile Device Management:
• Software that allows corporate IT to manage use of mobile
  devices. Component of BYOD programs. Features may allow
  an employee to:
   – Require users to register device as condition of network access
   – Lock down end user’s ability to use specific device features or
     apps, such cameras, Siri or iCloud
   – Enable remote locking or wipe of device
   – Enforce use of strong passwords
   – Implement anti-spam solutions – Siri,
     iCloud file sharing, blacklists
   – Prevent users from disabling or altering
     security settings on devices

                                                                       6
Policies Affected by BYOD
•   Data Privacy & Security
•   Harassment, Discrimination & EEO
•   Workplace Safety
•   Time Recording and Overtime
•   Acceptable Use of Technology
•   Compliance and Ethics
•   Records Management
•   Litigation Holds
•   Confidentiality & Trade Secret Protection
                                                7
The Perils of Mobile Devices
•   Lost or stolen devices
•   Malware
•   Friends & Family
•   Implications of a
    security breach




                                      8
Privacy & Dual Use Devices
1.   Remote wipes of lost devices – can be viewed as either pro-
     privacy or an intrusion. Participation in BYOD program may be
     conditioned upon consent to remote wipes.
2.   Litigation issues:
     – Identification of BYOD devices/information
     – Practical challenges of data collection
     – Does the employee “control” data on the devices?
     – Will employees be required to produce mobile devices to employer for
       inspection, preservation and production?
     – Will employees be required to allow access to other home devices such as
       storage devices, or Cloud-based storage accounts?


                                                                              9
Privacy & Dual Use Devices
3.   Accessing data stored with online services – What is a reasonable
     expectation of privacy? Be careful.
     – Pure Power Boot Camp, Inc. v. Warrior Fitness Boot Camp, LLC, 587 F. Supp. 2d 548 (S.D.N.Y.
       2008) (employee had reasonable expectation of privacy in password protected emails stored
       on hotmail and gmail servers, regardless of fact that she accessed them on a work computer)
     – Steingart v. Loving Care Agency, Inc., 201 N.J. 300 (NJ 2010) (employee had reasonable
       expectation of privacy in personal password protected web-based email sent through
       employer’s computer)
     – Pietrylo v. Hillstone Restaurant Group, No. 06-5754, 2008 U.S. Dist. LEXIS 108834, at *20
       (D.N.J. July 24, 2008) (question of whether employee had a reasonable expectation of privacy
       in My Space page is a question of fact)
     – Ehling v. Monmouth-Ocean Hospital Service Corp., Civ. No. 2:11-CV 033305 (WJM) (D.N.J. May
       30, 2012)(plaintiff may have reasonable expectation of privacy in Facebook posting where she
       restricted access to her Facebook page)
     – Doe v. City of San Francisco, No. C10-04700 THE (N.D. Cal. June 12, 2012)(employee had
       reasonable expectation of privacy in web-based emails viewed from a shared workplace
       computer designated for personal use by employees)

                                                                                                 10
Setting Up a BYOD Program
• Need to address challenges of dual use devices, REGARDLESS of
  whether you adopt a BYOD program
• If you implement BYOD, your policy should be part of an integrated
  Information Governance Plan
• Determine goals and objectives
   –   Economics – Not necessarily saving money
   –   Security
   –   E-Discovery compliance
   –   Risk Management concerns
   –   Privacy Considerations
        • Remote wipes
        • Containers
        • Backups
   – Pushing back the tide

                                                                   11
Setting Up a BYOD Program
• Who participates in program?
  – Limit to exempt employees.
  – If non-exempt employees are included, need to
    address overtime wage exposure.
  – Exclude contractors and contingent workers who
    may be working for other customers.
  – Consider excluding individuals in sensitive
    positions or involved in litigation or regulatory
    proceedings.
                                                        12
Setting Up a BYOD Program
• Who will pay and what devices are included?
  – Who pays for/owns device?
  – Who pays for service plan – employer selected
    options or reimbursement?
  – Options include technology allowances,
    reimbursement, standard devices issued by
    employer.



                                                    13
Setting Up a BYOD Program
• What conditions will be imposed on
  participants in the program?
• Address tradeoff of privacy for convenience
  – Participation in program is a privilege,
    not a right
  – Privacy tradeoff for convenience of
    remote access and device



                                                14
Setting Up a BYOD Program
Privacy Parameters
• Distinguish between data and device
• Device
   – May require return upon demand or inspection as part of investigation
   – May require return, with data intact, upon separation from employment
• Data
   – Determine whether employer will retain right to review all contents of
     device or will exclude categories such as music and photos
   – Require employee to provide access to cloud
     backups or home server?
   – Monitor/limit employee’s use of web-based
     applications? Example: Siri, Dropbox, iCloud, etc.
   – Set parameters for timing, terms and extent of remote
     wipes                                                                    15
Privacy: Monitoring as a
                   Moving Target
• 60 percent of corporations plan to implement formal programs for
  monitoring external social media security breaches and incidents by 2015
• Less than 10% of these organizations now use these techniques for
  security monitoring
    – Gartner Group, www.gartner.com/it/page/jsp?id=2-28215
• Tread carefully before engaging in collection and sharing of information,
  especially account passwords, from employee’s mobile devices
• Understand risks of monitoring personal activities
• Password issues. Require strong passwords
• If device is sending location-based information, disclose the practice.
  Tread carefully.
• Determine need for access to other personal computer devices, home
  storage and Cloud-based storage accounts

                                                                              16
Can Data in the Cloud Undermine Your
      Trade Secret Protection?
Trade Secrets Must Be:
1. Maintained in confidence
2. Have commercial value from not being generally known
3. Must not be readily ascertainable by proper means
Risk Areas:
1. LinkedIn – Customer lists in the public domain?
2. Sasqua Group, Inc. v. Cartney, No. CV 10-528, 2010 WL 36138855 (EDNY, August 2,
   2010)
     – Customer information not a trade secret where publicly available information
       “exceeded the amount and level of detail contained in the Sasqua database.”
     – Sasqua did not have password protected computers; did not require employee to sign
       confidentiality or non-solicitation agreement
3. LinkedIn contacts may violate non-solicit and non-compete restrictions (TEK
   Systems v. Hammernick, Civ. No. 10-CV-00819 (D. Minn. Mar. 16, 2010)

                                                                                            17
Protection of Trade Secret Information
             in the Cloud
• Take Reasonable
  Measures to Protect
  Trade Secrets in a BYOD
  Environment
• Use Confidentiality
  Agreements/Proprietary
  Information Assignment
  Agreements (“PIAA”)


                                     18
Questions?
The Accidental Cloud
Thirteenth Annual Institute on
Privacy and Data Security Law
    Practicing Law Institute

      June 19, 2012


Margaret A. Keane, Esq.
     Littler Mendelson, P.C.
      San Francisco Office
          (415) 288-6303
      mkeane@littler.com

More Related Content

What's hot

BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Wp byod
Wp byodWp byod
Wp byodJ
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark, CISSP, CISA
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcarePeter de Bruijn
 
The role and impact of IT in society
The role and impact of IT in societyThe role and impact of IT in society
The role and impact of IT in societyAnjan Mahanta
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineeringPeter Wood
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 

What's hot (18)

BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Wp byod
Wp byodWp byod
Wp byod
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers Miserable
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
 
IoT.ppt
IoT.pptIoT.ppt
IoT.ppt
 
The role and impact of IT in society
The role and impact of IT in societyThe role and impact of IT in society
The role and impact of IT in society
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Ch12
Ch12Ch12
Ch12
 

Viewers also liked

Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudChris Swan
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...North Texas Chapter of the ISSA
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsAntigone Peyton
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computingsaurabh soni
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computingragibhasan
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 

Viewers also liked (7)

Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloud
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy Implications
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 

Similar to The Accidental Cloud: Privacy and Security Issues in a BYOD World

Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device CooperTechnologiesInc
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMBitglass
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 
Data protection within development
Data protection within developmentData protection within development
Data protection within developmentowaspsuffolk
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 

Similar to The Accidental Cloud: Privacy and Security Issues in a BYOD World (20)

ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
Data protection within development
Data protection within developmentData protection within development
Data protection within development
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 

More from mkeane

Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacymkeane
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13mkeane
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplacemkeane
 
Social media, mobile computing and the cloud meet insurance regulation
Social media, mobile computing and the cloud meet insurance regulation  Social media, mobile computing and the cloud meet insurance regulation
Social media, mobile computing and the cloud meet insurance regulation mkeane
 
Employee use of mobile devices
Employee use of mobile devicesEmployee use of mobile devices
Employee use of mobile devicesmkeane
 

More from mkeane (6)

Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacy
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplace
 
Social media, mobile computing and the cloud meet insurance regulation
Social media, mobile computing and the cloud meet insurance regulation  Social media, mobile computing and the cloud meet insurance regulation
Social media, mobile computing and the cloud meet insurance regulation
 
Employee use of mobile devices
Employee use of mobile devicesEmployee use of mobile devices
Employee use of mobile devices
 

Recently uploaded

Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFOrient Homes
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCRsoniya singh
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherPerry Belcher
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756dollysharma2066
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 

Recently uploaded (20)

Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 

The Accidental Cloud: Privacy and Security Issues in a BYOD World

  • 1. The Accidental Cloud Thirteenth Annual Institute on Privacy and Data Security Law Practicing Law Institute Presented by: Margaret A. Keane Littler Mendelson, P.C. MKeane@Littler.com (415) 288-6303 June 19, 2012
  • 2. The Accidental Cloud • Wireless and Smartphone = Gateway to Cloud • Think of Mobile Devices as “Cloud Access Tools” • Your Employees are sending data to the Cloud 24/7 Tablets 2
  • 3. Running Water, Electricity and Wi-Fi • By 2015, the global mobile worker population will reach 1.3 million, representing 37.2% of the global workforce − IDC, Worldwide Mobile Worker Population 2011-2015 Forecast, January 5, 2012 • IPASS Global Workforce Report for Q2 describes wireless access as a necessity of life • Do you consider wireless access (3G, 4G and wi-fi) as important to your life as running water and electricity? − Yes, it is that important to the way I live – 59% − No, but it is pretty close – 29% IPASS Global Mobile Workforce Report, Q2 2012, p. 5 3
  • 4. What Lives in the Accidental Cloud • Mobile devices send information to data storage, video, photography and social networking sites, and web-based email providers • Cloud services can replace thumb drives for storage • Cloud services also provide collaboration capabilities – may be used to circumvent IT restriction on sharing information outside the enterprise • Third party storage: Where is your data? – iCloud – Google Docs – Dropbox.com – Box.net • Generally, there is no reasonable expectation of privacy in data held by third parties • An employer rarely has any control over data stored by third party providers 4
  • 5. Lingo: Dual Use Mobile Devices and BYOD • Dual Use Mobile Device: Mobile device used to create, store and transmit both personal and work-related data • BYOD: Bring Your Own Device – A BYOD program includes: • Policies that govern use of personal devices to access corporate services • Policies attempt to manage risk associated with storage and transmittal of data using devices that may be outside of the employers control • Policies address impact of mobile devices on existing workplace behavior • Some Other Considerations: − Regulatory issues, esp. FINRA – financial services, insurance, HIPPA − Federal Trade Commission − E-discovery implications 5
  • 6. What is MDM – Mobile Device Management? Mobile Device Management: • Software that allows corporate IT to manage use of mobile devices. Component of BYOD programs. Features may allow an employee to: – Require users to register device as condition of network access – Lock down end user’s ability to use specific device features or apps, such cameras, Siri or iCloud – Enable remote locking or wipe of device – Enforce use of strong passwords – Implement anti-spam solutions – Siri, iCloud file sharing, blacklists – Prevent users from disabling or altering security settings on devices 6
  • 7. Policies Affected by BYOD • Data Privacy & Security • Harassment, Discrimination & EEO • Workplace Safety • Time Recording and Overtime • Acceptable Use of Technology • Compliance and Ethics • Records Management • Litigation Holds • Confidentiality & Trade Secret Protection 7
  • 8. The Perils of Mobile Devices • Lost or stolen devices • Malware • Friends & Family • Implications of a security breach 8
  • 9. Privacy & Dual Use Devices 1. Remote wipes of lost devices – can be viewed as either pro- privacy or an intrusion. Participation in BYOD program may be conditioned upon consent to remote wipes. 2. Litigation issues: – Identification of BYOD devices/information – Practical challenges of data collection – Does the employee “control” data on the devices? – Will employees be required to produce mobile devices to employer for inspection, preservation and production? – Will employees be required to allow access to other home devices such as storage devices, or Cloud-based storage accounts? 9
  • 10. Privacy & Dual Use Devices 3. Accessing data stored with online services – What is a reasonable expectation of privacy? Be careful. – Pure Power Boot Camp, Inc. v. Warrior Fitness Boot Camp, LLC, 587 F. Supp. 2d 548 (S.D.N.Y. 2008) (employee had reasonable expectation of privacy in password protected emails stored on hotmail and gmail servers, regardless of fact that she accessed them on a work computer) – Steingart v. Loving Care Agency, Inc., 201 N.J. 300 (NJ 2010) (employee had reasonable expectation of privacy in personal password protected web-based email sent through employer’s computer) – Pietrylo v. Hillstone Restaurant Group, No. 06-5754, 2008 U.S. Dist. LEXIS 108834, at *20 (D.N.J. July 24, 2008) (question of whether employee had a reasonable expectation of privacy in My Space page is a question of fact) – Ehling v. Monmouth-Ocean Hospital Service Corp., Civ. No. 2:11-CV 033305 (WJM) (D.N.J. May 30, 2012)(plaintiff may have reasonable expectation of privacy in Facebook posting where she restricted access to her Facebook page) – Doe v. City of San Francisco, No. C10-04700 THE (N.D. Cal. June 12, 2012)(employee had reasonable expectation of privacy in web-based emails viewed from a shared workplace computer designated for personal use by employees) 10
  • 11. Setting Up a BYOD Program • Need to address challenges of dual use devices, REGARDLESS of whether you adopt a BYOD program • If you implement BYOD, your policy should be part of an integrated Information Governance Plan • Determine goals and objectives – Economics – Not necessarily saving money – Security – E-Discovery compliance – Risk Management concerns – Privacy Considerations • Remote wipes • Containers • Backups – Pushing back the tide 11
  • 12. Setting Up a BYOD Program • Who participates in program? – Limit to exempt employees. – If non-exempt employees are included, need to address overtime wage exposure. – Exclude contractors and contingent workers who may be working for other customers. – Consider excluding individuals in sensitive positions or involved in litigation or regulatory proceedings. 12
  • 13. Setting Up a BYOD Program • Who will pay and what devices are included? – Who pays for/owns device? – Who pays for service plan – employer selected options or reimbursement? – Options include technology allowances, reimbursement, standard devices issued by employer. 13
  • 14. Setting Up a BYOD Program • What conditions will be imposed on participants in the program? • Address tradeoff of privacy for convenience – Participation in program is a privilege, not a right – Privacy tradeoff for convenience of remote access and device 14
  • 15. Setting Up a BYOD Program Privacy Parameters • Distinguish between data and device • Device – May require return upon demand or inspection as part of investigation – May require return, with data intact, upon separation from employment • Data – Determine whether employer will retain right to review all contents of device or will exclude categories such as music and photos – Require employee to provide access to cloud backups or home server? – Monitor/limit employee’s use of web-based applications? Example: Siri, Dropbox, iCloud, etc. – Set parameters for timing, terms and extent of remote wipes 15
  • 16. Privacy: Monitoring as a Moving Target • 60 percent of corporations plan to implement formal programs for monitoring external social media security breaches and incidents by 2015 • Less than 10% of these organizations now use these techniques for security monitoring – Gartner Group, www.gartner.com/it/page/jsp?id=2-28215 • Tread carefully before engaging in collection and sharing of information, especially account passwords, from employee’s mobile devices • Understand risks of monitoring personal activities • Password issues. Require strong passwords • If device is sending location-based information, disclose the practice. Tread carefully. • Determine need for access to other personal computer devices, home storage and Cloud-based storage accounts 16
  • 17. Can Data in the Cloud Undermine Your Trade Secret Protection? Trade Secrets Must Be: 1. Maintained in confidence 2. Have commercial value from not being generally known 3. Must not be readily ascertainable by proper means Risk Areas: 1. LinkedIn – Customer lists in the public domain? 2. Sasqua Group, Inc. v. Cartney, No. CV 10-528, 2010 WL 36138855 (EDNY, August 2, 2010) – Customer information not a trade secret where publicly available information “exceeded the amount and level of detail contained in the Sasqua database.” – Sasqua did not have password protected computers; did not require employee to sign confidentiality or non-solicitation agreement 3. LinkedIn contacts may violate non-solicit and non-compete restrictions (TEK Systems v. Hammernick, Civ. No. 10-CV-00819 (D. Minn. Mar. 16, 2010) 17
  • 18. Protection of Trade Secret Information in the Cloud • Take Reasonable Measures to Protect Trade Secrets in a BYOD Environment • Use Confidentiality Agreements/Proprietary Information Assignment Agreements (“PIAA”) 18
  • 20. The Accidental Cloud Thirteenth Annual Institute on Privacy and Data Security Law Practicing Law Institute June 19, 2012 Margaret A. Keane, Esq. Littler Mendelson, P.C. San Francisco Office (415) 288-6303 mkeane@littler.com