Archives: BYOD

Subscribe to BYOD RSS Feed

Live-Streaming Apps; What We Aren’t Talking About

There are many articles circulating the web about new live-streaming video technologies like Meerkat. These tremendous apps make it possible for users to stream real time video from their phone to the internet for all to view, turning every individual into a real-time video-journalist.   Brands and entertainment properties have also jumped into the fray … Continue Reading

New Federal Guidance for BYOD Security Released

The National Institute of Standards and Technology (“NIST”) is at it again.  This past Monday it released an update of its 2008-era special publication to reflect the tremendous growth of mobile devices since:  Guidelines for Managing the Security of Mobile Devices in the Enterprise (SP 800-124r1))(the “Mobile Guidelines”).  The Mobile Guidelines are designed to go … Continue Reading

Ponemon Study on Patient Privacy Highlights Security Failings

Released today, the Ponemon Institute‘s Third Annual Benchmark Study on Patient Privacy & Data Security (available at, starkly highlights the continued serious challenges faced by healthcare organizations in adequately safeguarding protected health information (“PHI”). As the study notes straight out of the gate “the threats to healthcare organizations have become increasingly more difficult to … Continue Reading

Federal CIO Council Releases BYOD Toolkit

Bring Your Own Device (“BYOD”) is the latest overnight IT sensation. But like most “overnight sensations” the foundational work took years before now familiar names “suddenly” hit the bright lights. In broader response to the ongoing Consumerization of Information Technology trend (“COIT”), no less than the Federal government has jumped on the BYOD bandwagon.  Last week … Continue Reading

The Legal Implications of BYOD (Part II) – Preparing Personal Device Use Policies

In our last "bring your own device" post we explored some of the key security, privacy and incident response issues related to BYOD. These issues are often important drivers in a company's decision to pursue a BYOD strategy and set the scope of personal device use within their organization. If the risks and costs associated with BYOD outstrip the benefits, a BYOD strategy may be abandoned altogether. One of the primary tools (if not the most important tool) for addressing such risks are BYOD-related policies. Sometimes these policies are embedded within an organization's existing security and privacy policy framework. More frequently, however, companies are creating separate personal device use policies that stand alone or work with/cross-reference existing company security, privacy and incident response polices. This post lays out the key considerations company lawyers and compliance personnel should take into account when creating personal device use policies and outlines some of the important provisions that are often found in such policies. … Continue Reading

The Security, Privacy and Legal Implications of BYOD (Bring Your Own Device)

Employees are increasingly using (and demanding to use) their personal devices to store and process their employer's data, and connect to their networks. This "Bring Your Own Device" trend is in full swing, whether companies like it or not. Some organizations believe that BYOD will allow them to avoid significant hardware, software and IT support costs. Even if cost-savings is not the goal, most companies believe that processing of company data on employee personal devices is inevitable and unavoidable. Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk. This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including "reasonable" BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations. … Continue Reading