SlideShare a Scribd company logo
1 of 20
The Accidental Cloud
                           Thirteenth Annual Institute on
                           Privacy and Data Security Law
                                  Practicing Law Institute


                     Presented by:
                  Margaret A. Keane
                Littler Mendelson, P.C.
                    MKeane@Littler.com
                      (415) 288-6303



June 19, 2012
The Accidental Cloud
• Wireless and Smartphone = Gateway to Cloud
• Think of Mobile Devices as “Cloud Access
  Tools”
• Your Employees are sending data to the Cloud
  24/7
                                  Tablets




                                                 2
Running Water, Electricity and Wi-Fi

• By 2015, the global mobile worker population will reach
  1.3 million, representing 37.2% of the global workforce
   −       IDC, Worldwide Mobile Worker Population 2011-2015
           Forecast, January 5, 2012
• IPASS Global Workforce Report for Q2 describes wireless
  access as a necessity of life
• Do you consider wireless access (3G, 4G and wi-fi) as
  important to your life as running water and electricity?
       −    Yes, it is that important to the way I live   – 59%
       −    No, but it is pretty close                    – 29%
   IPASS Global Mobile Workforce Report, Q2 2012, p. 5

                                                                  3
What Lives in the Accidental Cloud
•    Mobile devices send information to data storage, video, photography and social
     networking sites, and web-based email providers
•    Cloud services can replace thumb drives for storage
•    Cloud services also provide collaboration capabilities – may be used to circumvent
     IT restriction on sharing information outside the enterprise
•    Third party storage: Where is your data?
      –   iCloud
      –   Google Docs
      –   Dropbox.com
      –   Box.net
•    Generally, there is no reasonable expectation
     of privacy in data held by third parties
•    An employer rarely has any control over
     data stored by third party providers


                                                                                          4
Lingo: Dual Use Mobile Devices
                   and BYOD
•   Dual Use Mobile Device: Mobile device used to create, store and transmit both
    personal and work-related data
•   BYOD: Bring Your Own Device
     – A BYOD program includes:
          •   Policies that govern use of personal devices to
              access corporate services
          •   Policies attempt to manage risk associated with
              storage and transmittal of data using devices that
              may be outside of the employers control
          •   Policies address impact of mobile devices on existing
              workplace behavior
•   Some Other Considerations:
     − Regulatory issues, esp. FINRA – financial services, insurance,
       HIPPA
     − Federal Trade Commission
     − E-discovery implications


                                                                                    5
What is MDM – Mobile Device
              Management?
Mobile Device Management:
• Software that allows corporate IT to manage use of mobile
  devices. Component of BYOD programs. Features may allow
  an employee to:
   – Require users to register device as condition of network access
   – Lock down end user’s ability to use specific device features or
     apps, such cameras, Siri or iCloud
   – Enable remote locking or wipe of device
   – Enforce use of strong passwords
   – Implement anti-spam solutions – Siri,
     iCloud file sharing, blacklists
   – Prevent users from disabling or altering
     security settings on devices

                                                                       6
Policies Affected by BYOD
•   Data Privacy & Security
•   Harassment, Discrimination & EEO
•   Workplace Safety
•   Time Recording and Overtime
•   Acceptable Use of Technology
•   Compliance and Ethics
•   Records Management
•   Litigation Holds
•   Confidentiality & Trade Secret Protection
                                                7
The Perils of Mobile Devices
•   Lost or stolen devices
•   Malware
•   Friends & Family
•   Implications of a
    security breach




                                      8
Privacy & Dual Use Devices
1.   Remote wipes of lost devices – can be viewed as either pro-
     privacy or an intrusion. Participation in BYOD program may be
     conditioned upon consent to remote wipes.
2.   Litigation issues:
     – Identification of BYOD devices/information
     – Practical challenges of data collection
     – Does the employee “control” data on the devices?
     – Will employees be required to produce mobile devices to employer for
       inspection, preservation and production?
     – Will employees be required to allow access to other home devices such as
       storage devices, or Cloud-based storage accounts?


                                                                              9
Privacy & Dual Use Devices
3.   Accessing data stored with online services – What is a reasonable
     expectation of privacy? Be careful.
     – Pure Power Boot Camp, Inc. v. Warrior Fitness Boot Camp, LLC, 587 F. Supp. 2d 548 (S.D.N.Y.
       2008) (employee had reasonable expectation of privacy in password protected emails stored
       on hotmail and gmail servers, regardless of fact that she accessed them on a work computer)
     – Steingart v. Loving Care Agency, Inc., 201 N.J. 300 (NJ 2010) (employee had reasonable
       expectation of privacy in personal password protected web-based email sent through
       employer’s computer)
     – Pietrylo v. Hillstone Restaurant Group, No. 06-5754, 2008 U.S. Dist. LEXIS 108834, at *20
       (D.N.J. July 24, 2008) (question of whether employee had a reasonable expectation of privacy
       in My Space page is a question of fact)
     – Ehling v. Monmouth-Ocean Hospital Service Corp., Civ. No. 2:11-CV 033305 (WJM) (D.N.J. May
       30, 2012)(plaintiff may have reasonable expectation of privacy in Facebook posting where she
       restricted access to her Facebook page)
     – Doe v. City of San Francisco, No. C10-04700 THE (N.D. Cal. June 12, 2012)(employee had
       reasonable expectation of privacy in web-based emails viewed from a shared workplace
       computer designated for personal use by employees)

                                                                                                 10
Setting Up a BYOD Program
• Need to address challenges of dual use devices, REGARDLESS of
  whether you adopt a BYOD program
• If you implement BYOD, your policy should be part of an integrated
  Information Governance Plan
• Determine goals and objectives
   –   Economics – Not necessarily saving money
   –   Security
   –   E-Discovery compliance
   –   Risk Management concerns
   –   Privacy Considerations
        • Remote wipes
        • Containers
        • Backups
   – Pushing back the tide

                                                                   11
Setting Up a BYOD Program
• Who participates in program?
  – Limit to exempt employees.
  – If non-exempt employees are included, need to
    address overtime wage exposure.
  – Exclude contractors and contingent workers who
    may be working for other customers.
  – Consider excluding individuals in sensitive
    positions or involved in litigation or regulatory
    proceedings.
                                                        12
Setting Up a BYOD Program
• Who will pay and what devices are included?
  – Who pays for/owns device?
  – Who pays for service plan – employer selected
    options or reimbursement?
  – Options include technology allowances,
    reimbursement, standard devices issued by
    employer.



                                                    13
Setting Up a BYOD Program
• What conditions will be imposed on
  participants in the program?
• Address tradeoff of privacy for convenience
  – Participation in program is a privilege,
    not a right
  – Privacy tradeoff for convenience of
    remote access and device



                                                14
Setting Up a BYOD Program
Privacy Parameters
• Distinguish between data and device
• Device
   – May require return upon demand or inspection as part of investigation
   – May require return, with data intact, upon separation from employment
• Data
   – Determine whether employer will retain right to review all contents of
     device or will exclude categories such as music and photos
   – Require employee to provide access to cloud
     backups or home server?
   – Monitor/limit employee’s use of web-based
     applications? Example: Siri, Dropbox, iCloud, etc.
   – Set parameters for timing, terms and extent of remote
     wipes                                                                    15
Privacy: Monitoring as a
                   Moving Target
• 60 percent of corporations plan to implement formal programs for
  monitoring external social media security breaches and incidents by 2015
• Less than 10% of these organizations now use these techniques for
  security monitoring
    – Gartner Group, www.gartner.com/it/page/jsp?id=2-28215
• Tread carefully before engaging in collection and sharing of information,
  especially account passwords, from employee’s mobile devices
• Understand risks of monitoring personal activities
• Password issues. Require strong passwords
• If device is sending location-based information, disclose the practice.
  Tread carefully.
• Determine need for access to other personal computer devices, home
  storage and Cloud-based storage accounts

                                                                              16
Can Data in the Cloud Undermine Your
      Trade Secret Protection?
Trade Secrets Must Be:
1. Maintained in confidence
2. Have commercial value from not being generally known
3. Must not be readily ascertainable by proper means
Risk Areas:
1. LinkedIn – Customer lists in the public domain?
2. Sasqua Group, Inc. v. Cartney, No. CV 10-528, 2010 WL 36138855 (EDNY, August 2,
   2010)
     – Customer information not a trade secret where publicly available information
       “exceeded the amount and level of detail contained in the Sasqua database.”
     – Sasqua did not have password protected computers; did not require employee to sign
       confidentiality or non-solicitation agreement
3. LinkedIn contacts may violate non-solicit and non-compete restrictions (TEK
   Systems v. Hammernick, Civ. No. 10-CV-00819 (D. Minn. Mar. 16, 2010)

                                                                                            17
Protection of Trade Secret Information
             in the Cloud
• Take Reasonable
  Measures to Protect
  Trade Secrets in a BYOD
  Environment
• Use Confidentiality
  Agreements/Proprietary
  Information Assignment
  Agreements (“PIAA”)


                                     18
Questions?
The Accidental Cloud
Thirteenth Annual Institute on
Privacy and Data Security Law
    Practicing Law Institute

      June 19, 2012


Margaret A. Keane, Esq.
     Littler Mendelson, P.C.
      San Francisco Office
          (415) 288-6303
      mkeane@littler.com

More Related Content

What's hot

BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Wp byod
Wp byodWp byod
Wp byodJ
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark, CISSP, CISA
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcarePeter de Bruijn
 
The role and impact of IT in society
The role and impact of IT in societyThe role and impact of IT in society
The role and impact of IT in societyAnjan Mahanta
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineeringPeter Wood
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 

What's hot (18)

BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Wp byod
Wp byodWp byod
Wp byod
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers Miserable
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
 
IoT.ppt
IoT.pptIoT.ppt
IoT.ppt
 
The role and impact of IT in society
The role and impact of IT in societyThe role and impact of IT in society
The role and impact of IT in society
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Ch12
Ch12Ch12
Ch12
 

Viewers also liked

Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudChris Swan
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...North Texas Chapter of the ISSA
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsAntigone Peyton
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computingsaurabh soni
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computingragibhasan
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 

Viewers also liked (7)

Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloud
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy Implications
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 

Similar to The Accidental Cloud: Privacy and Security Issues in a BYOD World

Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device CooperTechnologiesInc
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMBitglass
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 
Data protection within development
Data protection within developmentData protection within development
Data protection within developmentowaspsuffolk
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 

Similar to The Accidental Cloud: Privacy and Security Issues in a BYOD World (20)

ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
Data protection within development
Data protection within developmentData protection within development
Data protection within development
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 

More from mkeane

Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacymkeane
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13mkeane
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplacemkeane
 
Social media, mobile computing and the cloud meet insurance regulation
Social media, mobile computing and the cloud meet insurance regulation  Social media, mobile computing and the cloud meet insurance regulation
Social media, mobile computing and the cloud meet insurance regulation mkeane
 
Employee use of mobile devices
Employee use of mobile devicesEmployee use of mobile devices
Employee use of mobile devicesmkeane
 

More from mkeane (6)

Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacy
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplace
 
Social media, mobile computing and the cloud meet insurance regulation
Social media, mobile computing and the cloud meet insurance regulation  Social media, mobile computing and the cloud meet insurance regulation
Social media, mobile computing and the cloud meet insurance regulation
 
Employee use of mobile devices
Employee use of mobile devicesEmployee use of mobile devices
Employee use of mobile devices
 

Recently uploaded

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Phases of negotiation .pptx
 Phases of negotiation .pptx Phases of negotiation .pptx
Phases of negotiation .pptxnandhinijagan9867
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 

Recently uploaded (20)

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Phases of negotiation .pptx
 Phases of negotiation .pptx Phases of negotiation .pptx
Phases of negotiation .pptx
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 

The Accidental Cloud: Privacy and Security Issues in a BYOD World

  • 1. The Accidental Cloud Thirteenth Annual Institute on Privacy and Data Security Law Practicing Law Institute Presented by: Margaret A. Keane Littler Mendelson, P.C. MKeane@Littler.com (415) 288-6303 June 19, 2012
  • 2. The Accidental Cloud • Wireless and Smartphone = Gateway to Cloud • Think of Mobile Devices as “Cloud Access Tools” • Your Employees are sending data to the Cloud 24/7 Tablets 2
  • 3. Running Water, Electricity and Wi-Fi • By 2015, the global mobile worker population will reach 1.3 million, representing 37.2% of the global workforce − IDC, Worldwide Mobile Worker Population 2011-2015 Forecast, January 5, 2012 • IPASS Global Workforce Report for Q2 describes wireless access as a necessity of life • Do you consider wireless access (3G, 4G and wi-fi) as important to your life as running water and electricity? − Yes, it is that important to the way I live – 59% − No, but it is pretty close – 29% IPASS Global Mobile Workforce Report, Q2 2012, p. 5 3
  • 4. What Lives in the Accidental Cloud • Mobile devices send information to data storage, video, photography and social networking sites, and web-based email providers • Cloud services can replace thumb drives for storage • Cloud services also provide collaboration capabilities – may be used to circumvent IT restriction on sharing information outside the enterprise • Third party storage: Where is your data? – iCloud – Google Docs – Dropbox.com – Box.net • Generally, there is no reasonable expectation of privacy in data held by third parties • An employer rarely has any control over data stored by third party providers 4
  • 5. Lingo: Dual Use Mobile Devices and BYOD • Dual Use Mobile Device: Mobile device used to create, store and transmit both personal and work-related data • BYOD: Bring Your Own Device – A BYOD program includes: • Policies that govern use of personal devices to access corporate services • Policies attempt to manage risk associated with storage and transmittal of data using devices that may be outside of the employers control • Policies address impact of mobile devices on existing workplace behavior • Some Other Considerations: − Regulatory issues, esp. FINRA – financial services, insurance, HIPPA − Federal Trade Commission − E-discovery implications 5
  • 6. What is MDM – Mobile Device Management? Mobile Device Management: • Software that allows corporate IT to manage use of mobile devices. Component of BYOD programs. Features may allow an employee to: – Require users to register device as condition of network access – Lock down end user’s ability to use specific device features or apps, such cameras, Siri or iCloud – Enable remote locking or wipe of device – Enforce use of strong passwords – Implement anti-spam solutions – Siri, iCloud file sharing, blacklists – Prevent users from disabling or altering security settings on devices 6
  • 7. Policies Affected by BYOD • Data Privacy & Security • Harassment, Discrimination & EEO • Workplace Safety • Time Recording and Overtime • Acceptable Use of Technology • Compliance and Ethics • Records Management • Litigation Holds • Confidentiality & Trade Secret Protection 7
  • 8. The Perils of Mobile Devices • Lost or stolen devices • Malware • Friends & Family • Implications of a security breach 8
  • 9. Privacy & Dual Use Devices 1. Remote wipes of lost devices – can be viewed as either pro- privacy or an intrusion. Participation in BYOD program may be conditioned upon consent to remote wipes. 2. Litigation issues: – Identification of BYOD devices/information – Practical challenges of data collection – Does the employee “control” data on the devices? – Will employees be required to produce mobile devices to employer for inspection, preservation and production? – Will employees be required to allow access to other home devices such as storage devices, or Cloud-based storage accounts? 9
  • 10. Privacy & Dual Use Devices 3. Accessing data stored with online services – What is a reasonable expectation of privacy? Be careful. – Pure Power Boot Camp, Inc. v. Warrior Fitness Boot Camp, LLC, 587 F. Supp. 2d 548 (S.D.N.Y. 2008) (employee had reasonable expectation of privacy in password protected emails stored on hotmail and gmail servers, regardless of fact that she accessed them on a work computer) – Steingart v. Loving Care Agency, Inc., 201 N.J. 300 (NJ 2010) (employee had reasonable expectation of privacy in personal password protected web-based email sent through employer’s computer) – Pietrylo v. Hillstone Restaurant Group, No. 06-5754, 2008 U.S. Dist. LEXIS 108834, at *20 (D.N.J. July 24, 2008) (question of whether employee had a reasonable expectation of privacy in My Space page is a question of fact) – Ehling v. Monmouth-Ocean Hospital Service Corp., Civ. No. 2:11-CV 033305 (WJM) (D.N.J. May 30, 2012)(plaintiff may have reasonable expectation of privacy in Facebook posting where she restricted access to her Facebook page) – Doe v. City of San Francisco, No. C10-04700 THE (N.D. Cal. June 12, 2012)(employee had reasonable expectation of privacy in web-based emails viewed from a shared workplace computer designated for personal use by employees) 10
  • 11. Setting Up a BYOD Program • Need to address challenges of dual use devices, REGARDLESS of whether you adopt a BYOD program • If you implement BYOD, your policy should be part of an integrated Information Governance Plan • Determine goals and objectives – Economics – Not necessarily saving money – Security – E-Discovery compliance – Risk Management concerns – Privacy Considerations • Remote wipes • Containers • Backups – Pushing back the tide 11
  • 12. Setting Up a BYOD Program • Who participates in program? – Limit to exempt employees. – If non-exempt employees are included, need to address overtime wage exposure. – Exclude contractors and contingent workers who may be working for other customers. – Consider excluding individuals in sensitive positions or involved in litigation or regulatory proceedings. 12
  • 13. Setting Up a BYOD Program • Who will pay and what devices are included? – Who pays for/owns device? – Who pays for service plan – employer selected options or reimbursement? – Options include technology allowances, reimbursement, standard devices issued by employer. 13
  • 14. Setting Up a BYOD Program • What conditions will be imposed on participants in the program? • Address tradeoff of privacy for convenience – Participation in program is a privilege, not a right – Privacy tradeoff for convenience of remote access and device 14
  • 15. Setting Up a BYOD Program Privacy Parameters • Distinguish between data and device • Device – May require return upon demand or inspection as part of investigation – May require return, with data intact, upon separation from employment • Data – Determine whether employer will retain right to review all contents of device or will exclude categories such as music and photos – Require employee to provide access to cloud backups or home server? – Monitor/limit employee’s use of web-based applications? Example: Siri, Dropbox, iCloud, etc. – Set parameters for timing, terms and extent of remote wipes 15
  • 16. Privacy: Monitoring as a Moving Target • 60 percent of corporations plan to implement formal programs for monitoring external social media security breaches and incidents by 2015 • Less than 10% of these organizations now use these techniques for security monitoring – Gartner Group, www.gartner.com/it/page/jsp?id=2-28215 • Tread carefully before engaging in collection and sharing of information, especially account passwords, from employee’s mobile devices • Understand risks of monitoring personal activities • Password issues. Require strong passwords • If device is sending location-based information, disclose the practice. Tread carefully. • Determine need for access to other personal computer devices, home storage and Cloud-based storage accounts 16
  • 17. Can Data in the Cloud Undermine Your Trade Secret Protection? Trade Secrets Must Be: 1. Maintained in confidence 2. Have commercial value from not being generally known 3. Must not be readily ascertainable by proper means Risk Areas: 1. LinkedIn – Customer lists in the public domain? 2. Sasqua Group, Inc. v. Cartney, No. CV 10-528, 2010 WL 36138855 (EDNY, August 2, 2010) – Customer information not a trade secret where publicly available information “exceeded the amount and level of detail contained in the Sasqua database.” – Sasqua did not have password protected computers; did not require employee to sign confidentiality or non-solicitation agreement 3. LinkedIn contacts may violate non-solicit and non-compete restrictions (TEK Systems v. Hammernick, Civ. No. 10-CV-00819 (D. Minn. Mar. 16, 2010) 17
  • 18. Protection of Trade Secret Information in the Cloud • Take Reasonable Measures to Protect Trade Secrets in a BYOD Environment • Use Confidentiality Agreements/Proprietary Information Assignment Agreements (“PIAA”) 18
  • 20. The Accidental Cloud Thirteenth Annual Institute on Privacy and Data Security Law Practicing Law Institute June 19, 2012 Margaret A. Keane, Esq. Littler Mendelson, P.C. San Francisco Office (415) 288-6303 mkeane@littler.com