+ All Categories
Home > Documents > © 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq. 303-299-8240...

© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq. 303-299-8240...

Date post: 16-Dec-2015
Category:
Upload: jasper-scaife
View: 213 times
Download: 0 times
Share this document with a friend
19
© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq. 303-299-8240 [email protected]
Transcript

© 2015 Sherman & Howard L.L.C.

TO B OR NOT TO B YOD

Emily Keimig, Esq.303-299-8240

[email protected]

© 2015 Sherman & Howard L.L.C.

BYOD: ITS BENEFITS AND RISKS

© 2015 Sherman & Howard L.L.C.

BENEFITS

• Save on the cost of devices• Employee comfort level• Employee productivity• Employee convenience• Efficiency of communication• Simple reimbursement polices

© 2015 Sherman & Howard L.L.C.

RISKS

• Your Whole Company– Intellectual Property– Financial Records– Trade Secrets– Business Plans– Building and Construction Plans– Employee PII– Third Party PII– Statutory Requirements

• Remediation, Reporting and Clean Up Efforts

© 2015 Sherman & Howard L.L.C.

THE LEGAL PATCHWORK OF DATA PROTECTION

• Payment Card Industry Standards• Consumer Data (FTC; California; VPPA; Cable Act)• Health Information (HIPAA)• Financial Institutions (Gramm-Leach-Bliley Act)• Reporting Requirements (Variation from state to

state)• FCRA• Common Law Claims (invasion of privacy; breach

of contract; fraud; unjust enrichment)

© 2015 Sherman & Howard L.L.C.

ASIDE FROM THE LAWS, VALUING DATA

• Trade Secrets• Confidential Information• Customer Lists• Financial Information• PII• Health Information

© 2015 Sherman & Howard L.L.C.

REASONABLE/UNREASONABLE SECURITY MEASURES

• In the business of data– Comprehensive policies and procedures– Administrative, technical, physical safeguard– Legal Review– Executive and Director involvement– Risk Assessment

© 2015 Sherman & Howard L.L.C.

REASONABLE/UNREASONABLE SECURITY MEASURES

• Intellectual Property/Trade Secrets– “Reasonable” changes over time– Non-disclosure agreements– “Warnings”– Training

© 2015 Sherman & Howard L.L.C.

WHAT DO WE USE ODs FOR?

• Personal and business communication of all types

© 2015 Sherman & Howard L.L.C.

EMAIL

• Attached data can include documents, spreadsheets, pictures, drawings, text

© 2015 Sherman & Howard L.L.C.

TEXTING OR MESSAGING

• All can now accommodate pictures and videos

© 2015 Sherman & Howard L.L.C.

SOCIAL MEDIA AND RELATED APPS

• Facebook, Twitter, LinkedIn, Instagram, Snapchat

© 2015 Sherman & Howard L.L.C.

Use of ODs Will Only Expand

• Business Insider. February 5, 2015. 12:15 p.m.

© 2015 Sherman & Howard L.L.C.

WHO SHOULD YOU BE WORRYING ABOUT AND WHY?

• Third-party thieves or hackers• Anyone with access to the information

© 2015 Sherman & Howard L.L.C.

SMARTPHONES ALONE

• Consumer Reports. May, 2014.– About 3.1 million American consumers were

victims of smartphone theft in 2013– Double 2012– About 1.4 million smart phones lost and never

recovered

© 2015 Sherman & Howard L.L.C.

DATA ABOUT DATA SECURITY AND BREACHES

• Hard to know about the non-Sonys, non-Targets of the world

• Reportable versus non-reportable breaches mean many data breaches are never disclosed or reported in statistics

• 40-70% caused by employees

© 2015 Sherman & Howard L.L.C.

THE ROLE OF EMPLOYEES

• Bad actors or victims?• Possibly both

© 2015 Sherman & Howard L.L.C.

WHAT CAN YOU DO TO MITIGATE THE RISKS AND COSTS?

• BYOD policy• Limit access• Remote wipe ability• Encryption• Short lock out times• Security software• Cybersecurity Insurance

© 2015 Sherman & Howard L.L.C.

TO B OR NOT TO B YOD

Emily Keimig, Esq.303-299-8240

[email protected]


Recommended