While this paper highlights the shortfalls of Australia’s privacy law regime in light of the IoT, lawmakers should not impulsively and unnecessarily restrict these technologies.
Bring your own device (“BYOD”) is an organizational policy that allows employees to use their own mobile devices to access the organization’s information, including personal data collected by the organization in Hong Kong. For the purpose of this leaflet, personal data collected by an organization is referred to as “organization-collected personal data.”
This brief article presents the top ten reasons to update your corporate Intellectual Property and information strategy, especially if you practice within the United States, the European Union or in the United Kingdom.
This is a sample form for self certification of the EU-US privacy shield
Learn the Top Ten considerations in-house counsel need to know when handling sensitive Protected Health Information ("PHI") and/or Personally Identifiable Information ("PII") in a healthcare setting in the United States, including the unique set of risks associated with this handling of data.
This short article presents key issues companies in the US should consider regarding data breaches, wearables/employees Tracking, privacy, information security, human capital analytics, vendor management, mobile workforce (Bring Your Own Device), and the US Telephone Consumer Protection Act (TCPA),
This session explores the immediate impact of the implementation of the EU General data protection regulation including the harmonisation of regulator activity across Europe, how effective the "one-stop shop" format will be, Article 29 Working Party submissions and how to protect your business from the right to be forgotten.
This sample policy lists a series of law firm cybersecurity obligations that companies and their in-house counsel may consider requiring from outside counsel.
This is a sample written information security policy to create effective administrative, technical and physical safeguards for the protection of personal information.
This sample outlines the provisions that are applicable to company employees who are authorized to connect a smartphone or other mobile computing device to the company network.