The BYOD Workplace and the 24/7 Employee: Managing Legal Risks for Employers

Size: px
Start display at page:

Download "The BYOD Workplace and the 24/7 Employee: Managing Legal Risks for Employers"

Transcription

1

2 The BYOD Workplace and the 24/7 Employee: Managing Legal Risks for Employers Thursday, April 17, 2014

3 Moderator Molly M. DiBianca, Associate, Young Conaway Stargatt and Taylor Wilmington, DE 2

4 Speakers Adam S. Forman, Principal, Miller, Canfield, Paddock and Stone, Detroit, MI Michael S. Glassman, Partner, Dinsmore & Shohl, Cincinnati, OH 3

5 Speakers Melanie V. Pate, Partner, Lewis Roca Rothgerber, Phoenix, AZ J. E. Jess Sweere, Director, Cross, Gunter, Witherspoon & Galchus, Little Rock, AR 4

6 Introduction Molly DiBianca Young Conaway Stargatt & Taylor 5

7 The Current Landscape Key Statistics Use of mobile technology BYOD policies What s an employer to do? Manage risk Be a realist 6

8 Webinar Agenda Legal Risks Best Practices Policy Pointers 7

9 Legal Risks Adam S. Forman Miller, Canfield, Paddock & Stone J.E. Jesse Sweere Cross, Gunter, Witherspoon & Galchus 8

10 CONSTITUTIONAL PROTECTIONS 9

11 10

12 4th Amendment Unreasonable searches and seizures Murphy v. Spring (N.D. Okla. 2013) Chaney v. Fayette Cnty. Pub. Sch. Dist. (N.D. Ga. 2013) 11

13 Once It s There It s There To Stay 12

14 9th and 14th Amendments Penumbra of implied constitutional rights of privacy NASA v. Nelson (U.S. 2011) People v. Holmes (Colo. Dist. Ct. 2013) 13

15 STATUTORY PROTECTIONS 14

16 Electronic Communications Privacy Act Title 1 Federal Wire Tap No intercepting electronic communications without authorization of 1 party Title 2 Stored Communications Act No accessing, without authorization, a facility through which electronic communication service is provided and thereby access to an electronic communication while it is electronic storage 15

17 Electronic Communications Privacy Act Title 2 Stored Communications Act Disputes over stored Cheng v. Romo (D. Mass. 2013) Disputes over facility Garcia v. City of Laredo (5th Cir. 2012) BYOD Lazette v. Kulmatycki (N.D. Ohio 2013) 16

18 NATIONAL LABOR RELATIONS ACT 17

19 National Labor Relations Act Protects employees who discuss terms and conditions of employment Social media is the today s workplace water cooler For unionized employers social media and BYOD policies are a mandatory subject of bargaining Use of monitoring software has surveillance implications 18

20 National Labor Relations Board Enforces the NLRA The Board has taken a very strong stance on any employer action or policy designed to restrict employee communication via social media Must be careful not to draft overly broad BYOD policies 19

21 Fair Labor Standards Act Statute that requires the payment of a minimum wage for all hours worked, and overtime for all hours worked in excess of 40 in a work week 20

22 Wage and Hour Issues When non-exempt employees use their own devices, there is a risk that employees will raise wage & hour claims for time worked off the clock. 21

23 Wage and Hour Issues Employees have to be paid for off the clock work even when the employer did not request it. Usual situation: making work-related calls, reading and replying to s during off-work hours. 22

24 Easy Solution? No or work-related calls outside of working hours 23

25 Not Necessarily While this certainly is an option, it might not always be the best one: There is an advantage to having a flexible staff that can be accessed outside of work that may outweigh the extra pay A blanket prohibition also must be clearly communicated and employees must be consistently disciplined for disregarding the policy Enforcing such a bright-line policy is often unrealistic in practice 24

26 Password Protection Statutes Many states have passed statutes prohibiting employers from requiring employees to provide usernames and passwords to social media accounts. Arkansas s statute could be interpreted to prohibit a supervisor from friending or following an employee 25

27 Password Protection Statutes Review your state s statute carefully Train supervisors and managers to refrain from seeking social medial credentials of employees and applicants 26

28 COMMON LAW PROTECTIONS 27

29 Four Common Law Torts 1. Intrusion upon seclusion 2. False Light 3. Appropriation of Likeness 4. Public disclosure of embarrassing private facts 28

30 Intrusion upon Seclusion Most commonly asserted common law claim Ehling v. Monmouth-Ocean Hosp. Serv. (D.N.J. 2013) 29

31 PRACTICAL CONSIDERATIONS 30

32 Control of Employer Data Increased risk of theft/loss Personal v. work device Facilitate employee theft Greater exposure Malware, viruses and hacking Consequences for loss 31

33 Legal Compliance EEO laws Labor laws OSHA Privilege issues E-discovery 32

34 BYOD and Harassment The blurring of personal and workrelated use on one device can be conducive for increased hostile work environments. 33

35 BYOD and Harassment The employer has a duty to stop coemployee harassment when the employer knows or has reason to know that such harassment is part of a pattern of harassment that is taking place in the workplace and in settings that are related to the workplace. 34

36 OSHA-Related Issues Blackberry thumb & neck problems Repetitive motion of texting can cause injury to the hand Cradling small phone between head and shoulder What to do: Educate employees regarding ergonomic use of their device 35

37 OSHA-Related Issues Distracted driving Study shows that texting driver takes twice as long to react than a legally intoxicated driver A company culture of texting while driving can create liability What to do: Implement policy prohibiting texting & possibly talking while driving 36

38 Litigation Holds E-Discovery When an employer has notice that litigation is possible, it has a duty to identify and preserve relevant sources of data Rules of Civil Procedure require a party to produce documents and electronically stored information that are in its possession, custody or control 37

39 Best BYOD Practices Melanie V. Pate Lewis Roca Rothgerber 38

40 Three Keys to BYOD Success Analyze scope of issues and risks for your particular company Create a comprehensive written policy Communicate the policy to employees 39

41 Analyze Scope of Issues and Risks for Your Particular Company Do you want to permit employees to use their own devices for work purposes? Can your in-house IT department appropriately address BYOD issues and challenges? Do you have buy-in from top officials/leaders in your company? 40

42 Create a Comprehensive Written Policy Benefits of having a specific written policy Risks of not having a specific written policy Develop agreement on policy components Solicit feedback from key employees 41

43 Communicate the Policy to Employees Determine how the policy can and will be communicated effectively Train employees on policy Carefully explain what is and what is not acceptable under policy Have employees sign written acknowledgment 42

44 Other BYOD Best Practices Ensure top executives are covered by and adhere to BYOD policies Allow employees broad device choice and consider covering part of device cost Require employees to buy devices through normal consumer channels to maintain clear lines of ownership 43

45 Other BYOD Best Practices Require contractors to use their own devices and include them in your policies Provide support and guidance to employees and help them understand the responsibilities that come with BYOD 44

46 Other BYOD Best Practices Keep business data strictly segregated to support e-discovery requirements and data retention policies Determine how various IT support and maintenance tasks will be addressed 45

47 Other BYOD Best Practices Choose security solutions that allow employees to self-audit their devices and quickly report potential security risks (aka: BYOD for Dummies) Monitor data usage to verify that only authorized use is occurring if costs are reimbursed 46

48 BYOD Policy Points Michael S. Glassman Dinsmore and Shohl 47

49 What Does a BYOD Policy Need to Include? Determine whether a BYOD policy is right for your company 48

50 Policy Development What should a BYOD policy include? No one-size-fits-all policy exists Review and analyze existing policies to see how they relate to employee use of personal devices for business purposes. 49

51 Policy Development Which employees should be eligible to use their own devices? Company provided devices vs. personal devices Network security controls Employee consent form Lost or stolen devices Access by others 50

52 Acceptable Use Define what constitutes acceptable personal use of personal device on company time Consider whether there are any apps/software that may not be installed on a personal device Address the need to obtain authorization to work remotely and outside of normal working hours 51

53 Devices and Support Specify what devices company will permit and support Require that devices be presented to IT for approval and configuration before use on company network 52

54 Ownership of Information Address that the company owns records, data, work product on personal device that was created within scope of employment Include non-disclosure language/reference existing policies 53

55 Security Controls Address security measures for personal devices Require password protection Autolocking No jailbreaking, rooting, modding Encryption Limit use to employee 54

56 Security Controls Prohibit transfer of data Ability for employer to wipe device Consult with IT 55

57 Company Access to Device Employee must relinquish possession and control of personal device to company upon request Specify that employer can inspect and take control of device, and monitor communications, location and activity Company allowed to copy or image personal device 56

58 Device Monitoring and Management Implement Mobile Device Management (MDM) software and inform employee of MDM controls Specify that device may be wiped if lost, employment terminates, or a data breach Specify that employees have no expectation of privacy with respect to personal device 57

59 Please Complete Our Survey Please take a few minutes to complete the survey that will appear on your computer screen immediately following the webinar. To listen to this webinar again or to any past ELA webinars, please visit our website at: The ELA is not authorized to give CLE/HRCI/SHRM credit for its webinars; however, a Certificate of Attendance and supporting materials are now posted on the ELA website (click this webinar s title and scroll down to the link). Attendees seeking HRCI or SHRM credit should submit the materials directly to HRCI at or to SHRM at 58

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information

More information

PEDs in the Workplace: It s a Mad, Mad BYOD World

PEDs in the Workplace: It s a Mad, Mad BYOD World PEDs in the Workplace: It s a Mad, Mad BYOD World Technology in the Workplace Technology in the workplace has transformed over the years from this The World s First Computer (1946) 2015 Snell & Wilmer

More information

Avoiding the Pitfalls of Bring Your Own Device Policies

Avoiding the Pitfalls of Bring Your Own Device Policies Pitfalls of Bring Device Policies BYOD/T Represents a Constant Battle Between Compliance Objectives and Employee Usability Presenters: Constantinos Dino G. Panagopoulos, Labor and Employment Group Philip

More information

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

Social Media and Texting: A Growing Concern

Social Media and Texting: A Growing Concern Social Media, Care Providers Texting: How Do You Protect PHI? HCCA Compliance Institute Monday, April 18, 2016 Presented By: Donna Thiel, VP & CCO, Fortis Management Group, LLC Craig Day, Esq., Lane Powell

More information

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems. BACKED BY REFERENCE GUIDE Acceptable Use Policy GENERAL GUIDANCE NOTE: This sample policy is not legal advice or a substitute for consultation with qualified legal counsel. Laws vary from country to country.

More information

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope Jacksonville State University Acceptable Use Policy 1. Overview Information Technology s (IT) intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Jacksonville

More information

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.

More information

Policies & Regulations

Policies & Regulations Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major

More information

Employee Privacy in the Electronic Workplace

Employee Privacy in the Electronic Workplace Employee Privacy in the Electronic Workplace Jane Shea and Michael Severini Today s Speakers Jane Hils Shea, Esq. Member & Chair of Data Privacy and Information Security Practice Group Frost Brown Todd

More information

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015 Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015 Definitions Cellular Telephone Service For the purposes of this policy, cellular telephone

More information

B. Employees are expected to make personal calls on non-work time and to ensure that friends and family members are aware of the City s policy.

B. Employees are expected to make personal calls on non-work time and to ensure that friends and family members are aware of the City s policy. City of Winder Personnel Policy Manual Title: Cellular Phone Use & Reimbursement Date Issued: 08/2016 Policy: 082 Mayor City Administrator 82.10 Purpose The purpose of this policy is to establish requirements

More information

Security and Privacy Breach Notification

Security and Privacy Breach Notification Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains

More information

Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client

Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client Client s Responsibility Easy Time Clock, Inc. ( ETC ) is a client-led time and attendance program. The Client is solely responsible

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance. Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV

More information

Internet, , Social Networking, Mobile Device, and Electronic Communication Policy

Internet,  , Social Networking, Mobile Device, and Electronic Communication Policy TABLE OF CONTENTS Internet, Email, Social Networking, Mobile Device, and... 2 Risks and Costs Associated with Email, Social Networking, Electronic Communication, and Mobile Devices... 2 Appropriate use

More information

RMU-IT-SEC-01 Acceptable Use Policy

RMU-IT-SEC-01 Acceptable Use Policy 1.0 Purpose 2.0 Scope 2.1 Your Rights and Responsibilities 3.0 Policy 3.1 Acceptable Use 3.2 Fair Share of Resources 3.3 Adherence with Federal, State, and Local Laws 3.4 Other Inappropriate Activities

More information

Integrating Information Security Protections In Supplier Agreements: Guidance for Business and Technology Counsel

Integrating Information Security Protections In Supplier Agreements: Guidance for Business and Technology Counsel Presenting a live 90-minute webinar with interactive Q&A Integrating Information Security Protections In Supplier Agreements: Guidance for Business and Technology Counsel Evaluating Data Security Risks

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

IAM Security & Privacy Policies Scott Bradner

IAM Security & Privacy Policies Scott Bradner IAM Security & Privacy Policies Scott Bradner November 24, 2015 December 2, 2015 Tuesday Wednesday 9:30-10:30 a.m. 10:00-11:00 a.m. 6 Story St. CR Today s Agenda How IAM Security and Privacy Policies Complement

More information

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 Panelists Beverly J. Jones, Esq. Senior Vice President and Chief Legal Officer ASPCA Christin S. McMeley, CIPP-US

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech

More information

Emsi Privacy Shield Policy

Emsi Privacy Shield Policy Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (

More information

Wireless Communication Device Policy Policy No September 2, Standard. Practice

Wireless Communication Device Policy Policy No September 2, Standard. Practice Standard This establishes the business need and use of cellular phones (hereinafter referred to as wireless communication devices ) as an effective means of conducting City of Richland business, and to

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established

More information

Data Use and Reciprocal Support Agreement (DURSA) Overview

Data Use and Reciprocal Support Agreement (DURSA) Overview Data Use and Reciprocal Support Agreement (DURSA) Overview 1 Steve Gravely, Troutman Sanders LLP Jennifer Rosas, ehealth Exchange Director January 12, 2017 Introduction Steve Gravely Partner and Healthcare

More information

Use of Mobile Devices on Voice and Data Networks Policy

Use of Mobile Devices on Voice and Data Networks Policy World Agroforestry Centre Policy Series MG/C/4/2012 Use of Mobile Devices on Voice and Data Networks Policy One of the policies on information security and business continuity which will be audited by

More information

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY Department of Veterans Affairs VA DIRECTIVE 6502.3 Washington, DC 20420 Transmittal Sheet WEB PAGE PRIVACY POLICY 1. REASON FOR ISSUE: To establish policy for the Department of Veterans Affairs (VA) for

More information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an

More information

Electronic Communication of Personal Health Information

Electronic Communication of Personal Health Information Electronic Communication of Personal Health Information A presentation to the Porcupine Health Unit (Timmins, Ontario) May 11 th, 2017 Nicole Minutti, Health Policy Analyst Agenda 1. Protecting Privacy

More information

Ferrous Metal Transfer Privacy Policy

Ferrous Metal Transfer Privacy Policy Updated: March 13, 2018 Ferrous Metal Transfer Privacy Policy Ferrous Metal Transfer s Commitment to Privacy Ferrous Metal Transfer Co. ( FMT, we, our, and us ) respects your concerns about privacy, and

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy 2015 City of Glasgow College Charity Number: SCO 36198 Page 1 of 9 Table of Contents 1. Introduction... 3 2. Purpose and Aims... 4 3. Scope... 4 4. Policy Statement... 5 4.1

More information

Mobile Device Policy. Augusta University Medical Center Policy Library. Policy Owner: Information Technology Support and Services

Mobile Device Policy. Augusta University Medical Center Policy Library. Policy Owner: Information Technology Support and Services Augusta University Medical Center Policy Library Mobile Device Policy Policy Owner: Information Technology Support and Services POLICY STATEMENT Augusta University Medical Center (AUMC) discourages the

More information

TELEPHONE AND MOBILE USE POLICY

TELEPHONE AND MOBILE USE POLICY TELEPHONE AND MOBILE USE POLICY Date first approved: 9 December 2016 Date of effect: 9 December Date last amended: (refer Version Control Table) Date of Next Review: December 2021 First Approved by: University

More information

University Policies and Procedures ELECTRONIC MAIL POLICY

University Policies and Procedures ELECTRONIC MAIL POLICY University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must

More information

Public Records and Records Retention

Public Records and Records Retention Public Records and Records Retention Administrative Professionals Workshop July 15, 2016 Presented by: Lisa M. Freiley, Staff Counsel / PACE Administrator Agenda Public Records Law Overview. How to respond

More information

Hacking and Cyber Espionage

Hacking and Cyber Espionage Hacking and Cyber Espionage September 19, 2013 Prophylactic and Post-Breach Concerns for In-House Counsel Raymond O. Aghaian, McKenna Long & Aldridge LLP Elizabeth (Beth) Ferrell, McKenna Long & Aldridge

More information

Trinity Multi Academy Trust

Trinity Multi Academy Trust Trinity Multi Academy Trust Policy: Bring Your Own Device Date of review: October 2018 Date of next review: October 2020 Lead professional: Status: Director of ICT and Data Non-Statutory Page 1 of 5 Scope

More information

Workplace Privacy: New Technology, New Challenges

Workplace Privacy: New Technology, New Challenges Workplace Privacy: New Technology, New Challenges Second Quarter Roundtable June 23, 2015 Mary Will What s Keeping You Up at Night? 2 Employers Dilemma Employers have many reasons to engage in activities

More information

Knowing and Implementing the GDPR Part 3

Knowing and Implementing the GDPR Part 3 Knowing and Implementing the GDPR Part 3 11 a.m. ET, 16:00 GMT March 29, 2017 Welcome & Introductions Panelists Your Host Dave Cohen IAPP Knowledge Manager Omer Tene Vice President Research & Education

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

HIPAA & Privacy Compliance Update

HIPAA & Privacy Compliance Update HIPAA & Privacy Compliance Update Vermont Medical Society FREE Wednesday Webinar Series March 15, 2017 Anne Cramer and Shireen Hart Primmer Piper Eggleston & Cramer PC acramer@primmer.com shart@primmer.com

More information

OAKLAND COUNTY, MICHIGAN GEOSPATIAL DATA ACCESS, DISTRIBUTION AND USE

OAKLAND COUNTY, MICHIGAN GEOSPATIAL DATA ACCESS, DISTRIBUTION AND USE OAKLAND COUNTY, MICHIGAN GEOSPATIAL DATA ACCESS, DISTRIBUTION AND USE The following Geospatial Data Access, Distribution, and Use standard is designed to assist County employees and other approved users

More information

Mobile Device policy Frequently Asked Questions April 2016

Mobile Device policy Frequently Asked Questions April 2016 Mobile Device policy Frequently Asked Questions April 2016 In an attempt to help the St. Lawrence University community understand this policy, the following FAQ document was developed by IT in collaboration

More information

Guest Wireless Policy

Guest Wireless Policy Effective: April 1, 2016 Last Revised: November 27, 2017 Responsible University Office: Information Technology Services Responsible University Administrator: Chief Information Officer Policy Contact: Deb

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

Remote Access Policy

Remote Access Policy Remote Consulting Group Policy 1.0 1234 Main Street Version 1.0 Philadelphia, PA 19000 1213 www.rcg.com 1. Overview Remote Access Policy Remote Access allows Remote Consulting Group (RCG) to leverage the

More information

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services. TERMS OF USE A. PLEASE READ THESE TERMS CAREFULLY. YOUR ACCESS TO AND USE OF THE SERVICES ARE SUBJECT TO THESE TERMS. IF YOU DISAGREE OR CANNOT FULLY COMPLY WITH THESE TERMS, DO NOT ATTEMPT TO ACCESS AND/OR

More information

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog April 6, 2012 National Institute of Standards and Technology 100 Bureau Drive, Stop 1070 Gaithersburg, MD 20899-1070 Re: Special Publication 800-53 Revision 4, Security Controls of Federal Information

More information

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Intermediate School District #917 WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Procedures Manual April 2009 Table of Contents Overview 3 Definitions 3 General Guidelines 4 Eligibility Requirements 5

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

By: James A. Sherer, Melinda L. McLellan, & Emily R. Fedeles 1

By: James A. Sherer, Melinda L. McLellan, & Emily R. Fedeles 1 PRIVACY, SECURITY, AND PRACTICAL CONSIDERATIONS FOR DEVELOPING OR ENHANCING A BYOD PROGRAM By: James A. Sherer, Melinda L. McLellan, & Emily R. Fedeles 1 The development and implementation of a bring your

More information

Employee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC

Employee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC Employee Privacy, Digital Evidence, and the CFE Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC The Good Old Days CFE s Aerial View 1. What Information

More information

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010 INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig

More information

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit Development of your Company s Record Information System and Disaster Preparedness The National Emergency Management Summit Thomas D. Anthony Frost Brown Todd LLC Attorneys at Law 201 E. Fifth Street Cincinnati,

More information

Wireless Communication Device Use Policy

Wireless Communication Device Use Policy Wireless Communication Device Use Policy Introduction The Wireless Communication Device Policy exists to provide guidance to employees regarding the acquisition and use of William Paterson University provided

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

October 2016 Issue 07/16

October 2016 Issue 07/16 IPPF: NEW IMPLEMENTATION GUIDES - IG 1100, IG 1110, IG 1111, IG 1120 and IG 1130 The IIA has released new Implementation Guides (IG) addressing the following standards: Standard 1100: Independence and

More information

Bring Your Own Device. Peter Silva Technical Marketing Manager

Bring Your Own Device. Peter Silva Technical Marketing Manager Bring Your Own Device Peter Silva Technical Marketing Manager Bring-Your-Own-Device (BYOD) Personal devices for business apps Why implement BYOD? Increase employee satisfaction, productivity Reduce mobile

More information

Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask

Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask Author: Jennifer Babe, LL.M, ICD.D Why Should I Read This Alert? a) despite its name, this Act covers much more

More information

Marketing Law in Canada Has Changed... Are You Ready?

Marketing Law in Canada Has Changed... Are You Ready? Email Marketing Law in Canada Has Changed... Are You Ready? Webinar May 29 th, 2014 Hosted by: Tracey Hart, Director of Marketing, Discover Boating Canada Presented by: Lonnie Brodkin-Schneider, Partner,

More information

Seven Requirements for Successfully Implementing Information Security Policies and Standards

Seven Requirements for Successfully Implementing Information Security Policies and Standards Seven Requirements for Successfully Implementing and Standards A guide for executives Stan Stahl, Ph.D., President, Citadel Information Group Kimberly A. Pease, CISSP, Vice President, Citadel Information

More information

Privacy Shield Policy

Privacy Shield Policy Privacy Shield Policy Catalyst Repository Systems, Inc. (Catalyst) has adopted this Privacy Shield Policy ("Policy") to establish and maintain an adequate level of Personal Data privacy protection. This

More information

Summary Comparison of Current Data Security and Breach Notification Bills

Summary Comparison of Current Data Security and Breach Notification Bills Topic S. 117 (Nelson) S. (Carper/Blunt) H.R. (Blackburn/Welch) Comments Data Security Standards The FTC shall promulgate regulations requiring information security practices that are appropriate to the

More information

RULES OF THE TENNESSEE ALCOHOLIC BEVERAGE COMMISSION CHAPTER RULES FOR PROFESSIONAL ALCOHOL SERVER TRAINING TABLE OF CONTENTS

RULES OF THE TENNESSEE ALCOHOLIC BEVERAGE COMMISSION CHAPTER RULES FOR PROFESSIONAL ALCOHOL SERVER TRAINING TABLE OF CONTENTS RULES OF THE TENNESSEE ALCOHOLIC BEVERAGE COMMISSION CHAPTER 0100-08 RULES FOR PROFESSIONAL ALCOHOL SERVER TRAINING TABLE OF CONTENTS 0100-08-.01 Purpose 0100-08-.05 Miscellaneous Provisions 0100-08-.02

More information

This Policy applies to all staff and other authorised users in St Therese School.

This Policy applies to all staff and other authorised users in St Therese School. St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way

More information

HELPFUL TIPS: MOBILE DEVICE SECURITY

HELPFUL TIPS: MOBILE DEVICE SECURITY HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information

More information

Bring Your Own Device BYOD

Bring Your Own Device BYOD Bring Your Own Device BYOD Elizabeth L. Lewis Randy V. Sabett Shane McGee October 25, 2016 12:30 2:00 p.m attorney advertisement Copyright Cooley LLP, 3175 Hanover Street, Palo Alto, CA 94304. The content

More information

Data Security: Public Contracts and the Cloud

Data Security: Public Contracts and the Cloud Data Security: Public Contracts and the Cloud July 27, 2012 ABA Public Contract Law Section, State and Local Division Ieuan Mahony Holland & Knight ieuan.mahony@hklaw.com Roadmap Why is security a concern?

More information

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification University of California UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification UCOP Implementation Plan for Compliance with Business and Finance Bulletin

More information

Electronic Network Acceptable Use Policy

Electronic Network Acceptable Use Policy Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s

More information

Acceptable Use Policy

Acceptable Use Policy IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations

More information

GOCO.IO, INC TERMS OF SERVICE

GOCO.IO, INC TERMS OF SERVICE GOCO.IO, INC TERMS OF SERVICE GoCo.io, Inc. ("GoCo", the "Site", "https://www.goco.io") welcomes you! GoCo provides services to you subject of the following terms of service (the "Agreement"). The Agreement

More information

Information Technology Standards

Information Technology Standards Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this

More information

Sword vs. Shield: Using Forensics Pre-Breach in a GDPR World. September 20, 2017

Sword vs. Shield: Using Forensics Pre-Breach in a GDPR World. September 20, 2017 Sword vs. Shield: Using Forensics Pre-Breach in a GDPR World September 20, 2017 The information and opinions expressed by our panelists today are their own, and do not necessarily represent the views of

More information

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment. Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

Shaw Privacy Policy. 1- Our commitment to you

Shaw Privacy Policy. 1- Our commitment to you Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of

More information

CODE OF CONDUCT FOR INFORMATION TECHNOLOGY, COMPUTER, TELEPHONE AND EQUIPMENT USE

CODE OF CONDUCT FOR INFORMATION TECHNOLOGY, COMPUTER, TELEPHONE AND EQUIPMENT USE CODE OF CONDUCT FOR INFORMATION TECHNOLOGY, COMPUTER, TELEPHONE AND EQUIPMENT USE INTENDED USE This Code is intended for the school s staff to provide directions in their work as to the standards for use

More information

Autofill and Other Disasters: The Ethics of Inadvertent Disclosures

Autofill and Other Disasters: The Ethics of Inadvertent  Disclosures Autofill and Other Disasters: The Ethics of Inadvertent Email Disclosures Deborah C. Meiners, Esq. DeWitt Ross & Stevens, S.C. (608) 252 9266 dcm@dewittross.com SCR 20:1.6 Confidentiality for Lawyers (a)

More information

CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS

CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS INTRODUCTION: Before the California State Teachers Retirement System (hereinafter "CalSTRS," "We," or "Us") will provide services found at mycalstrs.com (the

More information

Information Security BYOD Procedure

Information Security BYOD Procedure Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

Internet, , and Computer Usage Policy

Internet,  , and Computer Usage Policy Important disclaimer: The policy available on this page is only an example and is furnished merely as an illustration of its category. It is not meant to be taken and used without consultation with a licensed

More information

PRIVACY 102 TRAINING FOR SUPERVISORS. PRIVACY ACT OF U.S.C.552a

PRIVACY 102 TRAINING FOR SUPERVISORS. PRIVACY ACT OF U.S.C.552a PRIVACY 102 TRAINING FOR SUPERVISORS PRIVACY ACT OF 1974 5 U.S.C.552a PRIVACY TOOL BOX WEB SITE: WWW.PRIVACY.NAVY.MIL Lists all approved Navy and Marine Corps Privacy Act systems of records DOD systems

More information

Data Processing Agreement for Oracle Cloud Services

Data Processing Agreement for Oracle Cloud Services Data Processing Agreement for Oracle Cloud Services Version January 12, 2018 1. Scope, Order of Precedence and Term 1.1 This data processing agreement (the Data Processing Agreement ) applies to Oracle

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy SH IG 58 Information Security Suite of Policies Bring Your Own Device (BYOD) Policy Version 1 Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This

More information

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial Corporate Policy Information Systems Acceptable Use Document No: ISY-090-10 Effective Date: 2014-06-10 Page 1 of 5 Rev. No: 0 Issuing Policy: Information Systems Department Policy Originator: Erick Edstrom

More information

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016 Section 3.9 PCI DSS Information Security Policy Issued: vember 2017 Replaces: June 2016 I. PURPOSE The purpose of this policy is to establish guidelines for processing charges on Payment Cards to protect

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

Cybersecurity The Evolving Landscape

Cybersecurity The Evolving Landscape Cybersecurity The Evolving Landscape 1 Presenter Zach Shelton, CISA Principal DHG IT Advisory Zach.Shelton@DHG.com Raleigh, NC 14+ years of experience in IT Consulting 11+ years of experience with DHG

More information