Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq. 303-299-8240

Similar presentations


Presentation on theme: "© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq. 303-299-8240"— Presentation transcript:

1 © 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq. 303-299-8240 ekeimig@shermanhoward.com

2 © 2015 Sherman & Howard L.L.C. BYOD: ITS BENEFITS AND RISKS

3 © 2015 Sherman & Howard L.L.C. BENEFITS Save on the cost of devices Employee comfort level Employee productivity Employee convenience Efficiency of communication Simple reimbursement polices

4 © 2015 Sherman & Howard L.L.C. RISKS Your Whole Company – Intellectual Property – Financial Records – Trade Secrets – Business Plans – Building and Construction Plans – Employee PII – Third Party PII – Statutory Requirements Remediation, Reporting and Clean Up Efforts

5 © 2015 Sherman & Howard L.L.C. THE LEGAL PATCHWORK OF DATA PROTECTION Payment Card Industry Standards Consumer Data (FTC; California; VPPA; Cable Act) Health Information (HIPAA) Financial Institutions (Gramm-Leach-Bliley Act) Reporting Requirements (Variation from state to state) FCRA Common Law Claims (invasion of privacy; breach of contract; fraud; unjust enrichment)

6 © 2015 Sherman & Howard L.L.C. ASIDE FROM THE LAWS, VALUING DATA Trade Secrets Confidential Information Customer Lists Financial Information PII Health Information

7 © 2015 Sherman & Howard L.L.C. REASONABLE/UNREASONABLE SECURITY MEASURES In the business of data – Comprehensive policies and procedures – Administrative, technical, physical safeguard – Legal Review – Executive and Director involvement – Risk Assessment

8 © 2015 Sherman & Howard L.L.C. REASONABLE/UNREASONABLE SECURITY MEASURES Intellectual Property/Trade Secrets – “Reasonable” changes over time – Non-disclosure agreements – “Warnings” – Training

9 © 2015 Sherman & Howard L.L.C. WHAT DO WE USE ODs FOR? Personal and business communication of all types

10 © 2015 Sherman & Howard L.L.C. EMAIL Attached data can include documents, spreadsheets, pictures, drawings, text

11 © 2015 Sherman & Howard L.L.C. TEXTING OR MESSAGING All can now accommodate pictures and videos

12 © 2015 Sherman & Howard L.L.C. SOCIAL MEDIA AND RELATED APPS Facebook, Twitter, LinkedIn, Instagram, Snapchat

13 © 2015 Sherman & Howard L.L.C. Use of ODs Will Only Expand Business Insider. February 5, 2015. 12:15 p.m.

14 © 2015 Sherman & Howard L.L.C. WHO SHOULD YOU BE WORRYING ABOUT AND WHY? Third-party thieves or hackers Anyone with access to the information

15 © 2015 Sherman & Howard L.L.C. SMARTPHONES ALONE Consumer Reports. May, 2014. – About 3.1 million American consumers were victims of smartphone theft in 2013 – Double 2012 – About 1.4 million smart phones lost and never recovered

16 © 2015 Sherman & Howard L.L.C. DATA ABOUT DATA SECURITY AND BREACHES Hard to know about the non-Sonys, non-Targets of the world Reportable versus non-reportable breaches mean many data breaches are never disclosed or reported in statistics 40-70% caused by employees

17 © 2015 Sherman & Howard L.L.C. THE ROLE OF EMPLOYEES Bad actors or victims? Possibly both

18 © 2015 Sherman & Howard L.L.C. WHAT CAN YOU DO TO MITIGATE THE RISKS AND COSTS? BYOD policy Limit access Remote wipe ability Encryption Short lock out times Security software Cybersecurity Insurance

19 © 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq. 303-299-8240 ekeimig@shermanhoward.com


Download ppt "© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq. 303-299-8240"

Similar presentations


Ads by Google