Phil Lee, Head of US Office, Fieldfisher Jim Brashear, General Counsel, Zix © 2015 ZixCorp. All Rights Reserved. THE CHANGING LEGAL PERSPECTIVE ON BYOD.

Slides:



Advertisements
Similar presentations
Data Privacy and Security in the Cloud Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
Advertisements

Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.
Office 365 for Enterprises ITExpo February 2, 2012.
Social Media Awareness Training For Financial Institutions
Driving change in information risk within the financial services industry Subtitle Date.
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
Public Key Infrastructure (PKI) Hosting Services.
Secure Transit & Storage HOW TO SECURELY STORE & SEND CONFIDENTIAL DATA by The UTHSC Information Security Team.
The IT Manager’s Nightmare... “Good morning, the board decided last night that we need to have iPads in order to do our work properly. Can you please.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
1 A SIMPLE APPROACH TO BYOD. A Leader in Data Protection  Committed to innovative, easy-to-use security  Recognized by Gartner Research.
Web 2.0: Concepts and Applications 5 Connecting People.
Web 2.0: Concepts and Applications 5 Connecting People.
| Copyright© 2010 Microsoft Corporation the future of productivity Kurt DelBene President, Microsoft Office Division.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
| Copyright© 2010 Microsoft Corporation What’s New in Office New user interface Role based access Identity federation (eliminate sign-in client)
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Microsoft Confidential - Internal Only Cloud Services for Collaboration – the road to Wave 15.
Security and Privacy Strategic Global Partners, LLC.
RULES OF ENGAGEMENT Engage if client expresses an interest in data preservation Engage if the client is experiencing one or more “pains” (see “customer.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
Protecting Corporate Assets and the Brand in a Digitized, Global Environment July 29, 2013 Stacy-Ann Golding.
Prepared By Ben Smyrlian Zix Encryption Network Protects Every .
Security considerations for mobile devices in GoRTT
Strictly Private & Confidential Trends in Treasury Technology: Investment Portals – A Helpful Tool in the Treasury Toolbox February 19, 2015 Commonwealth.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Brandon McCormick Channel Account Manager (781) Zix Training 101: Our Solutions.
Developing a Social Media Policy Manish Mandhyan, CRCM, CAMS.
Your compuBase online services Module 3: The Company Profile.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
1 ZIXCORP The Criticality of Security Kevin Cloutier Oct 2015.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
Recent Privacy Developments ISACA January 12, 2012 Keith A. Cheresko and Robert L. Rothman Principals, Privacy Associates International LLC.
| Copyright© 2011 Microsoft Corporation 1 journey to the cloud KOEN VAN TOLHUYZEN TSP OFFICE 365 MICROSOFT CORPORATION.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
Patrick Opela, Director, Enterprise Business Solutions, Stewart Title Interviewed by Neil Farquharson SECURING S IN THE TITLE INDUSTRY 1 © 2015 ZixCorp.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
Attorney General’s Office Near On-Line Archive Project Presented by Greg Harvill AGO Network Operations Manager January 23 rd, 2007 IPMA Professional.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
The future of recruitment and selection? Vanessa Doust – Graduate Recruitment Manager Lizzie McCoy – Graduate Marketing Officer Analiese Birch – Graduate.
Welcome Esuring Your File Sharing Solution is Secure and Compliant Hosts: Josh Bopp Rebekah Stevens Paisley Coxsey President Account Manager Relationship.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Unified Communications – Use and Advantages If you deal with business communications or head an organization where the right emphasis is put upon effective.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Total Enterprise Mobility Comprehensive Management and Security
The Contractual Regime of PayPal and Electronic Payments Irene Kull ETAg funding, project 9301.
OFFICE 365 APP BUILDER PROFILE: Druva
Protection of CONSUMER information
A Winning Combination !! and Good afternoon…
ZIXCORP The Criticality of Security Dena Bauckman
Hot Topics:Mobility in the Cloud
ZIXCORP The Criticality of Security Kevin Cloutier
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Digital $$ Quiz Test your knowledge.
Office365 Exchange Online Risun Antony Technology Specialist
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Phil Lee, Head of US Office, Fieldfisher Jim Brashear, General Counsel, Zix © 2015 ZixCorp. All Rights Reserved. THE CHANGING LEGAL PERSPECTIVE ON BYOD 1

 Founded in 1998 as an encryption company  More than 11,000 active customers including :  Six divisions of the U.S. Treasury  All of the FFIEC U.S. federal financial regulators (incl. FDIC and OCC)  The U.S. Securities and Exchange Commission  24 U.S. state financial regulators  More than 2,000 U.S. financial institutions  25% of all banks in the U.S.  20% of all hospitals in the U.S.  32 Blue Cross Blue Shield organizations ABOUT ZIXCORP 2

 Partner in Fieldfisher's privacy and information law group: heads up the firm's US Office based in Palo Alto, California  Specializes in data privacy, digital media and disruptive technologies. Also advises on a wide range of EU digital media, consumer protection and technology-related issues.  Contributes to Fieldfisher's 'Privacy and Information Law' blog, and has co-authored or contributed to several books on privacy  Certified Information Privacy Professional (Europe) (CIPP/E) and Certified Information Program Manager (CIPM) status. PHIL LEE HEAD OF US OFFICE, FIELDFISHER 3

 Member of the Bar of the United States Supreme Court, the California Bar Association and the State Bar of Texas  Certified Information Privacy Professional (CIPP/US)  Legal experience includes: data privacy, data security, technology, cloud computing, corporate compliance  Juris Doctorate degree, magna cum laude, from the University of San Diego School of Law JIM BRASHEAR GENERAL COUNSEL, ZIX 4

5

WHAT ARE MOST COMPANIES DOING TO ENABLE BYOD 6

o Leaves data on the device: exposes offline weakness o Loss of employee control and privacy o Employee acceptance issues o Corporate liabilities WHY IS THIS A PROBLEM?

THE CHANGING LEGAL PERSPECTIVE ON BYOD 8 US SUPREME COURT, SUMMER 2014

9 EMPLOYER ACCESS TO EMPLOYEE SOCIAL MEDIA THE CHANGING LEGAL PERSPECTIVE ON BYOD

10 TRENDS IN PRIVACY ABROAD THE CHANGING LEGAL PERSPECTIVE ON BYOD

PHIL LEE, HEAD OF US OFFICE, FIELDFISHER JIM BRASHEAR, GENERAL COUNSEL, ZIX INTERVIEWED BY NEIL FARQUHARSON 11 THE CHANGING LEGAL PERSPECTIVE ON BYOD

12 SEARCH WARRANTS FOR SMARTPHONES

13 EMPLOYER ACCESS TO EMPLOYEE SOCIAL MEDIA Photo: Shutterstock

14 THE DIRECTION OF PRIVACY RIGHTS Photo: Shutterstock

15 COMMON ISSUE WITH BYOD ROLLOUTS Photo: Shutterstock

16 A SOLUTION FOR BYOD THAT ANYONE CAN USE? Reproduced with the permission of PG.de Vertriebs GmbH

MOST POPULAR MOBILE BUSINESS APPS , CALENDAR AND CONTACTS 17 Source: BYOD and Mobile Security Report, 2014, Holger Schulze, Information Security Community on LinkedIn

YOUR QUESTIONS AND COMMENTS PHIL LEE AND JIM BRASHEAR WITH NEIL FARQUHARSON 18

19 Neil Farquharson Product Marketing Manager (214) SECURITY MEETS SIMPLICITY Next today………..

Thanks for Watching © 2015 ZixCorp. All Rights Reserved. THE CHANGING LEGAL PERSPECTIVE ON BYOD Neil Farquharson (214) Sales Enquiries (866)

21 Neil Farquharson Product Marketing Manager (214) SECURITY MEETS SIMPLICITY

The Issues Add Up  Lost or stolen devices  Company data residing on the device  Policy enforcement  User acceptance and trust  Employee privacy and associated liability risks  Compliance with federal and state regulations  Transitioning employees that leave the company  Access and management of contractors 22 THE COMPLEXITY OF BYOD

Mail Server ZixOne 23 ZIXONE THE NEXT GENERATION SOLUTION

24 o data never resides on the device o Users retain complete control o No monitoring, restrictions or risk of data loss o Firewalling of personal data o Limits company liability o Seamless integration with native functions and user interface o Contacts can be used for phoning and texting o Compliance reporting o The number of messages at risk is minimized, because is only on the phone while being viewed WHY ZIXONE CHANGES THE GAME

25 WATCH THE ZIXONE ON-DEMAND WEBINAR

26 TRY THE ZIXONE DEMO ONLINE abetterbyod.com

27 Neil Farquharson Product Marketing Manager (214) SECURITY MEETS SIMPLICITY