Sunshine Laws: New Light on Texting & Public Information

In recent years, the government sector has become increasingly impacted by the evolution of technology. From smart phones to social media, and now wearables, it is easier than ever before for the public to keep a close eye on their local government officials. Today, with the U.S. Transparency in Government Laws “Sunshine Laws,” all forms … Continue reading Sunshine Laws: New Light on Texting & Public Information

Secure Messaging Gets the Green Light in Healthcare

In a cascading pattern of modernization, the U.S. federal government and healthcare accreditation bodies are building in guidelines for secure messaging. The most recent Certification Companion Guide (CCG) issued by the Office of the National Coordinator includes guidance on secure messaging between providers and patients. Specifically, the criteria that need to be met include separate … Continue reading Secure Messaging Gets the Green Light in Healthcare

Are You Prepared in the Case of a Data Breach?

I recently had the pleasure of representing the Association of Corporate Counsel by moderating a panel at the National Bar Association conference in Scottsdale, AZ. The panel, “Understanding Cybersecurity Risks: Issues & Trends,” included four exceptional speakers: Marcus A. Christian, Partner, Mayer Brown LLP; Lillian S. Hardy, Counsel, Hogan Lovells; Antonio D. Robinson, Vice President, … Continue reading Are You Prepared in the Case of a Data Breach?

Safe Harbor is Dead! A Primer on EU Data Transfer And Why We Should Care

The latter part of 2015 saw social media and legal alerts blowing up about the EU/US Safe Harbor and the EU General Data Protection Regulation (the “GDPR”). Unless one is a privacy professional working with European data, one probably is relatively unfamiliar with the EU/US Safe Harbor and just what is going on. Here is … Continue reading Safe Harbor is Dead! A Primer on EU Data Transfer And Why We Should Care

Balancing Security and Privacy in BYOD

According to Forrester Research, more than half of North American and European organizations are developing bring-your-own-device (BYOD) policies in the workplace. However, letting employees use their personal mobile devices for work-related purposes can cause problems relating to company security policies, laws and employee privacy perceptions. Many businesses, for example, have deployed enterprise mobility management (EMM) … Continue reading Balancing Security and Privacy in BYOD

Five Best Practices for Securing Mobile Devices and Everything They Touch

In the span of just one year from 2012 to 2013, smartphone thefts in the U.S. nearly doubled to 3.1 million, according to Consumer Reports. Every one of those losses and thefts could enable multiple security breaches for businesses and organizations. Why? Because confidential data stored on a mobile phone isn’t the only asset that’s … Continue reading Five Best Practices for Securing Mobile Devices and Everything They Touch

Page 2 of 41234