Insights on Security,Facebook

anti-virus, assessment, audit, bring your own device, bring your own device coit device encrypt incident response mobile privacy se..., byod, coit, device, encrypt, forensics, incident response, liability, Mobile, mobile privacy, privacy, Security, security breach, security program, subpoena

The Legal Implications of BYOD (Part II) - Preparing Personal Device Use Policies

By InfoLawGroup LLP on June 11, 2012

In our last "bring your own device" post we explored some of the key security, privacy and incident response issues related to BYOD. These issues are often important drivers in a company's decision to pursue a BYOD strategy and set the scope of personal device use within their organization. If the risks and costs associated with BYOD outstrip the benefits, a BYOD strategy may be abandoned altogether. One of the primary tools (if not the most important tool) for addressing such risks are BYOD-related policies. Sometimes these policies are embedded within an organization's existing security and privacy policy framework. More frequently, however, companies are creating separate personal device use policies that stand alone or work with/cross-reference existing company security, privacy and incident response polices. This post lays out the key considerations company lawyers and compliance personnel should take into account when creating personal device use policies and outlines some of the important provisions that are often found in such policies.

authentication, comerica, commercially reasonable security, contracting, experimetal, FFIEC, layered security, multifactor authentication, patco, phishing, reasonable, Red Flags Rule, Security, security breach, security breach litigation, token, UCC 4A-202

The Duty to Authenticate Identity: the Online Banking Breach Lawsuits

By InfoLawGroup LLP on April 17, 2012

We have entered an era where our commercial transactions are increasingly being conducted online without any face-to-face interaction, and without the traditional safeguards used to confirm that a party is who they purport to be. The attenuated nature of many online relationships has created an opportunity for criminal elements to steal or spoof online identities and use them for monetary gain. As such, the ability of one party to authenticate the identity of the other party in an online transaction is of key importance.To counteract this threat, the business community has begun to develop new authentication procedures to enhance the reliability of online identities (so that transacting parties have a higher degree of confidence that the party on the other end of an electronic transaction is who they say they are). At the same time, the law is beginning to recognize a duty to authenticate. This blogpost post looks at two online banking breach cases to examine what courts are saying about authentication and commercially reasonable security.

anti-virus, bring your own device, byod, coit, device, encrypt, Fourth Amendment, incident response, management, Mobile, mobile privacy, privacy, Security, security breach, security privacy mobile privacy Mobile coit bring your own device incident re..., security program

The Security, Privacy and Legal Implications of BYOD (Bring Your Own Device)

By InfoLawGroup LLP on March 28, 2012

Employees are increasingly using (and demanding to use) their personal devices to store and process their employer's data, and connect to their networks. This "Bring Your Own Device" trend is in full swing, whether companies like it or not. Some organizations believe that BYOD will allow them to avoid significant hardware, software and IT support costs. Even if cost-savings is not the goal, most companies believe that processing of company data on employee personal devices is inevitable and unavoidable.Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk. This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including "reasonable" BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations.

collection, Consumer Protection, FTC, Legislation, personal data, privacy, Security, transparency, Whitehouse

White House Released Privacy Framework Includes the Consumer Privacy Bill of Rights

By Justine Young Gottshall on February 23, 2012

The White House today released its white paper setting forth a framework for "Protecting Privacy And Promoting Innovation in The Global Digital Economy" (the " Framework"). The Framework is far reaching, touching on everything from a call for legislation, including a national standard for security breach legislation, to promoting international interoperability.The Framework centers on The Consumer Privacy Bill of Rights, which contains seven core principles relating to "personal data." Note that "personal data" is defined broadly, to encompass any data, including aggregated data, which can be linked to a specific individual, and may include data linked to a specific computer or other device. It is worth noting that the Framework includes, as an illustrative example of personal data, "an identifier on a smartphone or family computer that is used to build a usage profile."

Facebook, LinkedIn, privacy, Security, security breach, security measures, social media, social network, trade secrets, twitter

The Legal Implications of Social Networking Part Three: Data Security

By InfoLawGroup LLP on January 09, 2012

In 2011, InfoLawGroup began its "Legal Implications" series for social media by posting Part One (The Basics) and Part Two (Privacy). In this post (Part Three), we explore how security concerns and legal risk arise and interact in the social media environment.There are three main security-related issues that pose potential security-related legal risk. First, to the extent that employees are accessing and using social media sites from company computers (or increasingly from personal computers connected to company networks or storing sensitive company data), malware, phishing and social engineering attacks could result in security breaches and legal liability. Second, spoofing and impersonation attacks on social networks could pose legal risks. In this case, the risk includes fake fan pages or fraudulent social media personas that appear to be legitimately operated. Third, information leakage is a risk in the social media context that could result in an adverse business and legal impact when confidential information is compromised.

Boris, data, enforcement, Facebook, InfoLawGroup, information law group, National Labor Relations Act, National Labor Relations Board, NLRA, NLRB, privacy, protection, Segalis, social media, workplace privacy

NLRB Holds "Facebook" Firing Justified on Alternative Grounds, but Finds Policy Unlawful

By InfoLawGroup LLP on November 03, 2011

As we have discussed on our blog, the National Labor Relations Board (NLRB) has continued a campaign of enforcement actions against employers who, according to the NLRB, have unlawfully terminated employees for discussing working conditions on social media. As we reported, in the first of such "Facebook" enforcement actions to come before an NLRB administrative judge, the employer was ordered to reinstate five employees and to pay back their wages.On September 28, 2011, in the second "Facebook" case to reach an NLRB administrative judge, an employer was found to have been justified in terminating an employee car salesman for Facebook postings that mocked the employer and did not concern working conditions

Facebook, FTC, privacy, privacy notice, social media, social network, twitter

The Legal Implications of Social Networking Part Two: Privacy

By InfoLawGroup LLP on October 17, 2011

As social media and networking continue to revolutionize modern-day marketing and become the norm for organizations of all types, shapes and sizes, it is even more important to adequately address the legal risks associated with social media use. In Part One of our Legal Implications series, we laid out some background and identified key areas of legal risk. In the next few posts InfoLawGroup is going to look deeper at some of these risks. In this post we explore some of the privacy legal issues that companies should address if they want to leverage social media.

Breach, do, Heartland, notification, Regulation S-P, risk assessment, SEC, Security, security breach

SEC Issues Guidance Concerning Cyber Security Incident Disclosure

By InfoLawGroup LLP on October 14, 2011

Publicly traded businesses now have yet another set of guidelines to follow regarding security risks and incidents. On October 13, 2011 the Securities and Exchange Commission (SEC) Division of Corporation Finance released a guidance document that assists registrants in assessing what disclosures should be made in the face of cyber security risks and incidents. The guidance provides an overview of disclosure obligations under current securities laws - some of which, according to the guidance, may require a disclosure of cyber security risks and incidents in financial statements.

advertising, copyrights, defamation, disparagement, Facebook, Facebook twitter LinkedIn defamation disparagement intellectual property trad..., intellectual property, LinkedIn, NRLA, NRLB, privacy, Security, social media, social network, social network social media security privacy advertising ECPA Stored Communic..., Stored Communications Act, trademark, twitter

The Legal Implications of Social Networking: The Basics (Part One)

By InfoLawGroup LLP on June 11, 2011

Much like the "Cloud computing revolution" there is an almost frenzied excitement around social media, and many companies are stampeding to exploit social networking. The promise of increased intimate customer interactions, input and loyalty, and enhanced sales and expanded market share can result in some organizations overlooking the thorny issues arising out of social networking. Many of these issues are legal in nature and could increase the legal risk and liability potential of an organization employing a social media strategy.In this multi-part series the InfoLawGroup will identify and explore the legal implications of social media. This series will help organizations begin to identify some of the legal risks associated with social media so that they may start addressing and mitigating these risks while maximizing their social media strategy. In Part One of the series, we will provide a high level overview of the legal risks and issues associated with an organization's use of social media. In subsequent parts members of the InfoLawGroup team will take a deeper dive into these matters, and provide some practical insight and strategic direction for addressing these issues. As always, we view our series as the beginning of a broader conversation between ourselves and the larger community, and we welcome and strongly encourage comments, concerns, corrections and criticisms.

Boris Segalis, employee privacy, enforcement, Facebook, InfoLawGroup, information law group, NLRA, NLRB, privacy, social media, Workplace Privac

Another Facebook Firing Enforcement Action Brought by NLRB

By InfoLawGroup LLP on May 24, 2011

We previously reported on our blog that a Connecticut ambulance company settled the National Labor Relations Board's (NLRB's) allegations that the company violated an employee's federal rights by firing her for criticizing a manager on Facebook. The NLRB continues its enforcement blitz with another Facebook firing complaint.