SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Wherever You Go, There You Are
(With Your Mobile Device)
Legal and Practical Implications of a Cross-Border BYOD program
March 25, 2015
Melinda McLellan
BakerHostetler
Emily Fedeles
Shook, Hardy & Bacon
Moderated by: Jonathan E. Swerdloff, Driven, Inc.
Join Today! aceds.org/join
Exclusive News and Analysis
Monthly Members-Only Webcasts
Networking with CEDS, Members
On-Demand Training
Resources
Jobs Board
bits + bytes Newsletter
Affinity Partner Discounts
“ACEDS provides an excellent, much needed forum… to train, network and stay current on critical
information.”
Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
Jonathan is a consultant at Driven, Inc. Prior to joining
Driven, Jonathan was a litigation associate at Hughes,
Hubbard & Reed LLP with over 10 years experience that
included substantial eDiscovery experience managing
large discovery projects, analyzing enterprise data
systems, and investigations into nontraditional sources of
ESI.
Through his experience as a litigator and programmer,
Jonathan primarily focused on creative problem solving
with regard to all types of data. He analyzed and
produced complex structured data systems and developed
internal workflows for large litigations. His experience also
includes developing cost-saving legal processes,
managing legal budgets, and supervising legal personnel.
Speaker Bio
Jonathan Swerdloff
Consultant and Data Systems
Specialist
Driven, Inc.
jonathan.swerdloff@driven-inc.com
212-364-6385
Emily Fedeles is an associate in the Geneva office of Shook, Hardy & Bacon,
where her practice focuses on the defense of complex litigation in Europe,
West Africa, and the Middle East, including class actions, reimbursement
lawsuits, consumer protection claims, and individual product liability
claims. Emily's role includes working with other outside counsel to
coordinate defense strategies and develop supporting evidence. Emily
advises clients on litigation prevention strategies and legislative projects
that impact or alter civil liability risks - such as proposed legislation on class
actions and punitive damages - in Europe, Africa, and Asia-Pacific. As part
of that strategic advice, Emily evaluates client eDiscovery readiness
programs, advises on collection, review, and production considerations, and
considers the implications of mobile technologies, client information
technology platforms, and related social media use. Emily is an active
member of The Sedona Conference® Working Group Six. Prior to joining
the Geneva office, Emily practiced in the firm's Tampa office representing
product manufacturers against personal injury claims in both state and
federal courts in the United States.
Presenter
Emily Fedeles
Associate
Shook, Hardy & Bacon
efedeles@shb.com
+41.22.787.2000
Melinda McLellan is Counsel in the New York office of
BakerHostetler, where she advises clients on complex privacy,
cybersecurity, and information management issues as a member of
the firm’s national Privacy and Data Protection team. Melinda
regularly counsels companies across multiple industry sectors on a
broad range of privacy and security matters, including by advising
on how to respond to data security incidents and related regulatory
inquiries, creating and implementing internal privacy and security
policies and employee training programs, and working with
marketing teams to develop innovative and compliant new media
campaigns. Melinda is a 2005 graduate of Harvard Law School
where she served as Executive Editor of the Harvard International
Law Journal. New York Super Lawyers has selected Melinda as a
“Rising Star” for the past three years in a row.
Presenter
Melinda McLellan
Counsel
BakerHostetler
mmclellan@bakerlaw.com
212.589.4679
http://www.dataprivacymonitor.com/
• What is BYOD?
• Adoption rates
• Benefits to organizations
and individuals
• How does BYOD create risks
for organizations?
– The “number one e-
discovery challenge... for the
coming years”
BYOD Generally
7
• Tension between personal
privacy and professional needs
• Different countries, different
privacy expectations
– Employer expectations
– Employee expectations
• FTC mobile privacy guidance
(2013)
Privacy – Expectations and Guidance
8
• Regulation of BYOD in the EU
– Historical Backdrop
– Omnibus Data Protection Law
– Works Councils
– Examples: Germany, UK
• U.S. v. Odoni
Privacy – International Issues
9
• Electronic Communications Privacy Act (“ECPA”)
– Katz v. U.S., 389 U.S. 347 (1967)
– Stengart v. Loving Care Agency, Inc., 990 A.2d 650 (N.J. 2010)
• The Stored Communications Act (“SCA”)
– Theofel v. Farey-Jones, 359 F.3d 1066 (9th Cir. 2004)
– Quon v. Arch Wireless Operating Co., 529 F.3d 892 (9th Cir. 2008),
rev’d on other grounds sub nom. City of Ont. v. Quon, 130 S. Ct. 2619
(2010)
– Sunbelt Rentals, Inc. v. Victor No. C13-4240 SBA, 2014 WL 4274313
(N.D. Cal. Aug. 28, 2014)
• The Computer Fraud and Abuse Act (“CFAA”)
– Rajaee v. Design Tech Homes, Ltd., No. 4:13-cv-02517, 2014 WL
5878477 (S.D. Tex. Nov. 11, 2014)
Statutory and Common Law (U.S.)
10
• Security risks associated with BYOD
• The end node problem
• Securing mobile devices: EMMs and MDMs
• Remote wiping
Security
11
• Unique issues associated with BYOD
• Recent cases discussing BYOD
• Who has “control” of the device?
• Managing employee expectations
eDiscovery
12
• Device Basics
• Access and Use
• Designing BYOD Policies
• Privacy Concerns
Implementation Considerations
13
• How will the organization address employee separation and
device disposal issues?
• What types of devices will the organization support?
• If employees will be reimbursed for device purchases, how
will the reimbursement process work?
• What happens when a device is lost or stolen?
– If an employee wishes to trade in a device containing company
data, how will the organization ensure that all such data is
securely removed from the device?
– How can the organization ensure data security with respect to
company data on a personal device if an employee is terminated
or otherwise separates on bad terms?
– How will the organization recover company data if an employee
inadvertently (or intentionally) deletes it from a BYOD device?
Device Basics
14
• Who within the organization will be allowed to
participate in the BYOD program?
• Will the scope of employee participation differ
depending on job functions?
• What types of company data may employees
access using their devices?
• Who owns the data on the device when an
employee leaves?
• How should the organization restrict “risky”
employee behavior on the clock?
Access and Use
15
• What considerations go into the organization’s strategic
approach?
• How will the organization handle BYOD policy
violations?
• How will the organization address border crossing
security issues with respect to BYOD devices?
• What device security considerations are involved at the
strategic level?
• Which jurisdiction’s law will apply in various
scenarios?
• How will the organization integrate BYOD
considerations into other organizational policies?
Designing BYOD Policies
16
• Who within the organization is responsible for
monitoring legal developments concerning
BYOD?
• How will the organization provide notice of its
monitoring practices, and offer choices with
respect to monitoring where required?
• What additional factors should be considered
when the organization issues legal holds that
apply to BYOD devices?
Privacy Concerns
17

Weitere ähnliche Inhalte

Was ist angesagt?

Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
Nicholas Davis
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
William Tanenbaum
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Dr. Donald Macfarlane
 

Was ist angesagt? (20)

The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
Mis ethical social
Mis ethical socialMis ethical social
Mis ethical social
 
170105 d link-complaint_and_exhibits
170105 d link-complaint_and_exhibits170105 d link-complaint_and_exhibits
170105 d link-complaint_and_exhibits
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
 
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law Practice
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Data ethics for developers
Data ethics for developersData ethics for developers
Data ethics for developers
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Who owns your data ans why should you care
Who owns your data ans why should you careWho owns your data ans why should you care
Who owns your data ans why should you care
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 

Andere mochten auch

Dracula 150331060816-conversion-gate01
Dracula 150331060816-conversion-gate01Dracula 150331060816-conversion-gate01
Dracula 150331060816-conversion-gate01
David Lunn
 
Evaluation question 1
Evaluation question 1 Evaluation question 1
Evaluation question 1
curtisfrench
 
Turkvatandasligikanunu
TurkvatandasligikanunuTurkvatandasligikanunu
Turkvatandasligikanunu
gökhan durum
 
Research & planning - Recce
Research & planning - RecceResearch & planning - Recce
Research & planning - Recce
MattR298
 

Andere mochten auch (17)

Controllo delle emissione di CO2 di siti di e-commerce (IT language)
Controllo delle emissione di CO2 di siti di e-commerce (IT language)Controllo delle emissione di CO2 di siti di e-commerce (IT language)
Controllo delle emissione di CO2 di siti di e-commerce (IT language)
 
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is ImportantACEDS March 2015 Members Only Webcast - Why What We Do Is Important
ACEDS March 2015 Members Only Webcast - Why What We Do Is Important
 
Tugas so2 fitriana bakar044
Tugas so2 fitriana bakar044Tugas so2 fitriana bakar044
Tugas so2 fitriana bakar044
 
Dracula 150331060816-conversion-gate01
Dracula 150331060816-conversion-gate01Dracula 150331060816-conversion-gate01
Dracula 150331060816-conversion-gate01
 
Evaluation question 1
Evaluation question 1 Evaluation question 1
Evaluation question 1
 
Proyecto vocacional 2012 2014
Proyecto vocacional 2012 2014Proyecto vocacional 2012 2014
Proyecto vocacional 2012 2014
 
How to inform your clients
How to inform your clients How to inform your clients
How to inform your clients
 
Donofrio caine ppp
Donofrio caine pppDonofrio caine ppp
Donofrio caine ppp
 
Three Tears for Jimmy Prophet
Three Tears for Jimmy Prophet Three Tears for Jimmy Prophet
Three Tears for Jimmy Prophet
 
Genre research
Genre researchGenre research
Genre research
 
презентація 1
презентація 1презентація 1
презентація 1
 
2014 2015 ieee dotnet projects lists
2014 2015 ieee dotnet projects lists2014 2015 ieee dotnet projects lists
2014 2015 ieee dotnet projects lists
 
Ieee 2014 2015 matlab projects titles list globalsoft technologies
Ieee 2014 2015 matlab projects titles list globalsoft technologiesIeee 2014 2015 matlab projects titles list globalsoft technologies
Ieee 2014 2015 matlab projects titles list globalsoft technologies
 
Romeo-Juliet Kelas Pekerja
Romeo-Juliet Kelas PekerjaRomeo-Juliet Kelas Pekerja
Romeo-Juliet Kelas Pekerja
 
2.5.3 ppp slides
2.5.3 ppp slides2.5.3 ppp slides
2.5.3 ppp slides
 
Turkvatandasligikanunu
TurkvatandasligikanunuTurkvatandasligikanunu
Turkvatandasligikanunu
 
Research & planning - Recce
Research & planning - RecceResearch & planning - Recce
Research & planning - Recce
 

Ähnlich wie ACEDS-Driven March 2015 BYOD Webcast

2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery
Exterro
 

Ähnlich wie ACEDS-Driven March 2015 BYOD Webcast (20)

Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 

Mehr von Logikcull.com

Mehr von Logikcull.com (20)

Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery? Will the GDPR Kibosh EU-US Discovery?
Will the GDPR Kibosh EU-US Discovery?
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" RuleThe Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
The Price of Defeat: Navigating the High-Stakes 'Loser Pays" Rule
 
2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update2017 eDiscovery Case Law Update
2017 eDiscovery Case Law Update
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama Papers
 
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
Logikcull webcast 'Discovery Malpractice Is At Your Doorstep'
 
Bust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document ReviewBust These 4 Myths on Your Next Document Review
Bust These 4 Myths on Your Next Document Review
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15 Aceds edrm social media law 4-14-15
Aceds edrm social media law 4-14-15
 
ACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 WebcastACEDS-EDRM 4-15-15 Webcast
ACEDS-EDRM 4-15-15 Webcast
 
ACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 WebcastACEDS-Streamline Litigation March 2015 Webcast
ACEDS-Streamline Litigation March 2015 Webcast
 
ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy ACEDS 5 Simple Steps Webcast with Steve Levy
ACEDS 5 Simple Steps Webcast with Steve Levy
 
Understanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured DataUnderstanding the Value of Database Discovery - Beyond Unstructured Data
Understanding the Value of Database Discovery - Beyond Unstructured Data
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity
 
ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15 ACEDS Information Governance Webcast 3-11-15
ACEDS Information Governance Webcast 3-11-15
 
TRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast SlidesTRU-ACEDS 3-4-15 Webcast Slides
TRU-ACEDS 3-4-15 Webcast Slides
 
ACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 Webcast
 

Kürzlich hochgeladen

COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
RRR Chambers
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
mahikaanand16
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
Airst S
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
A AA
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
Airst S
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 

Kürzlich hochgeladen (20)

COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdfNavigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 

ACEDS-Driven March 2015 BYOD Webcast

  • 1. Wherever You Go, There You Are (With Your Mobile Device) Legal and Practical Implications of a Cross-Border BYOD program March 25, 2015 Melinda McLellan BakerHostetler Emily Fedeles Shook, Hardy & Bacon Moderated by: Jonathan E. Swerdloff, Driven, Inc.
  • 2. Join Today! aceds.org/join Exclusive News and Analysis Monthly Members-Only Webcasts Networking with CEDS, Members On-Demand Training Resources Jobs Board bits + bytes Newsletter Affinity Partner Discounts “ACEDS provides an excellent, much needed forum… to train, network and stay current on critical information.” Kimarie Stratos, General Counsel, Memorial Health Systems, Ft. Lauderdale
  • 3.
  • 4. Jonathan is a consultant at Driven, Inc. Prior to joining Driven, Jonathan was a litigation associate at Hughes, Hubbard & Reed LLP with over 10 years experience that included substantial eDiscovery experience managing large discovery projects, analyzing enterprise data systems, and investigations into nontraditional sources of ESI. Through his experience as a litigator and programmer, Jonathan primarily focused on creative problem solving with regard to all types of data. He analyzed and produced complex structured data systems and developed internal workflows for large litigations. His experience also includes developing cost-saving legal processes, managing legal budgets, and supervising legal personnel. Speaker Bio Jonathan Swerdloff Consultant and Data Systems Specialist Driven, Inc. jonathan.swerdloff@driven-inc.com 212-364-6385
  • 5. Emily Fedeles is an associate in the Geneva office of Shook, Hardy & Bacon, where her practice focuses on the defense of complex litigation in Europe, West Africa, and the Middle East, including class actions, reimbursement lawsuits, consumer protection claims, and individual product liability claims. Emily's role includes working with other outside counsel to coordinate defense strategies and develop supporting evidence. Emily advises clients on litigation prevention strategies and legislative projects that impact or alter civil liability risks - such as proposed legislation on class actions and punitive damages - in Europe, Africa, and Asia-Pacific. As part of that strategic advice, Emily evaluates client eDiscovery readiness programs, advises on collection, review, and production considerations, and considers the implications of mobile technologies, client information technology platforms, and related social media use. Emily is an active member of The Sedona Conference® Working Group Six. Prior to joining the Geneva office, Emily practiced in the firm's Tampa office representing product manufacturers against personal injury claims in both state and federal courts in the United States. Presenter Emily Fedeles Associate Shook, Hardy & Bacon efedeles@shb.com +41.22.787.2000
  • 6. Melinda McLellan is Counsel in the New York office of BakerHostetler, where she advises clients on complex privacy, cybersecurity, and information management issues as a member of the firm’s national Privacy and Data Protection team. Melinda regularly counsels companies across multiple industry sectors on a broad range of privacy and security matters, including by advising on how to respond to data security incidents and related regulatory inquiries, creating and implementing internal privacy and security policies and employee training programs, and working with marketing teams to develop innovative and compliant new media campaigns. Melinda is a 2005 graduate of Harvard Law School where she served as Executive Editor of the Harvard International Law Journal. New York Super Lawyers has selected Melinda as a “Rising Star” for the past three years in a row. Presenter Melinda McLellan Counsel BakerHostetler mmclellan@bakerlaw.com 212.589.4679 http://www.dataprivacymonitor.com/
  • 7. • What is BYOD? • Adoption rates • Benefits to organizations and individuals • How does BYOD create risks for organizations? – The “number one e- discovery challenge... for the coming years” BYOD Generally 7
  • 8. • Tension between personal privacy and professional needs • Different countries, different privacy expectations – Employer expectations – Employee expectations • FTC mobile privacy guidance (2013) Privacy – Expectations and Guidance 8
  • 9. • Regulation of BYOD in the EU – Historical Backdrop – Omnibus Data Protection Law – Works Councils – Examples: Germany, UK • U.S. v. Odoni Privacy – International Issues 9
  • 10. • Electronic Communications Privacy Act (“ECPA”) – Katz v. U.S., 389 U.S. 347 (1967) – Stengart v. Loving Care Agency, Inc., 990 A.2d 650 (N.J. 2010) • The Stored Communications Act (“SCA”) – Theofel v. Farey-Jones, 359 F.3d 1066 (9th Cir. 2004) – Quon v. Arch Wireless Operating Co., 529 F.3d 892 (9th Cir. 2008), rev’d on other grounds sub nom. City of Ont. v. Quon, 130 S. Ct. 2619 (2010) – Sunbelt Rentals, Inc. v. Victor No. C13-4240 SBA, 2014 WL 4274313 (N.D. Cal. Aug. 28, 2014) • The Computer Fraud and Abuse Act (“CFAA”) – Rajaee v. Design Tech Homes, Ltd., No. 4:13-cv-02517, 2014 WL 5878477 (S.D. Tex. Nov. 11, 2014) Statutory and Common Law (U.S.) 10
  • 11. • Security risks associated with BYOD • The end node problem • Securing mobile devices: EMMs and MDMs • Remote wiping Security 11
  • 12. • Unique issues associated with BYOD • Recent cases discussing BYOD • Who has “control” of the device? • Managing employee expectations eDiscovery 12
  • 13. • Device Basics • Access and Use • Designing BYOD Policies • Privacy Concerns Implementation Considerations 13
  • 14. • How will the organization address employee separation and device disposal issues? • What types of devices will the organization support? • If employees will be reimbursed for device purchases, how will the reimbursement process work? • What happens when a device is lost or stolen? – If an employee wishes to trade in a device containing company data, how will the organization ensure that all such data is securely removed from the device? – How can the organization ensure data security with respect to company data on a personal device if an employee is terminated or otherwise separates on bad terms? – How will the organization recover company data if an employee inadvertently (or intentionally) deletes it from a BYOD device? Device Basics 14
  • 15. • Who within the organization will be allowed to participate in the BYOD program? • Will the scope of employee participation differ depending on job functions? • What types of company data may employees access using their devices? • Who owns the data on the device when an employee leaves? • How should the organization restrict “risky” employee behavior on the clock? Access and Use 15
  • 16. • What considerations go into the organization’s strategic approach? • How will the organization handle BYOD policy violations? • How will the organization address border crossing security issues with respect to BYOD devices? • What device security considerations are involved at the strategic level? • Which jurisdiction’s law will apply in various scenarios? • How will the organization integrate BYOD considerations into other organizational policies? Designing BYOD Policies 16
  • 17. • Who within the organization is responsible for monitoring legal developments concerning BYOD? • How will the organization provide notice of its monitoring practices, and offer choices with respect to monitoring where required? • What additional factors should be considered when the organization issues legal holds that apply to BYOD devices? Privacy Concerns 17

Hinweis der Redaktion

  1. Hello and welcome to this ACEDS webcast, Wherever You Go, There You Are (With Your Mobile Device) – Legal and Practical Implications of a Cross-Border BYOD Program, presented by Driven. I’m your host Robert Hilson of ACEDS, and I’m joined today by three great experts, who I will introduce in a moment. But first I have two brief announcements.
  2. I’d like to especially welcome everyone on the call who is new to ACEDS. ACEDS is a membership association owned and managed by Barbri that is committed to promoting e-discovery skill and competence through training, education, and networking. We offer the Certified E-Discovery Specialist credential, which is held by more than a thousand practitioners in the US and globally. You can join today and start receiving a number of benefits exclusive to our members, including news content, members-only webcasts, our bits+bytes newsletter, a members directory, and special benefits from our affinity partners, which now include EDRM and Tru Staffing Partners.
  3. We will be holding our annual conference September 29 to 30 at the Gaylord National Resort in Washington, DC. A live certification prep course will precede the conference on the 28th. And we expect this to be our best show yet. We’ve announced a number of great speakers, including those you see on your screen. Earlier this month, we announced that retired US magistrate Judge Nan Nolan, who is now at JAMS, will be presenting, as well as Jeff Jacobson, the Director of the New Jersey Division of Law. They will join Judge Grimm, Judge Waxse and Judge Thomas Vanaskie among others. You can visit ediscoveryconference.com and learn more about the program and the topics we`ll cover, and if you feel so inclined, you can register to attend.
  4. Alright, let’s get started. Our moderator today is Jonathan Swerdloff, a consultant at Driven. Prior to joining Driven, he was a litigation associate at Hughes Hubbard and he has more than 10 years of experience managing large discovery projects, analyzing enterprise data systems and conducting investigations into nontraditional sources of ESI. Jonathan, thanks for joining us.
  5. Jonathan is joined by Emily Fedeles, an associate in the Geneva office of Shook Hardy, where her practice focuses on the defense of complex litigation in Europe, West Africa and the Middle East, including class actions, reimbursement lawsuits, consumer protection claims, and individual product liability claims. Emily, thanks for joining us today.
  6. By the way, all of this speakers have very impressive bios, and I encourage to go to ACEDS.org to read them all in full… Jonathan and Emily are joined by Melinda McLellan, an attorney in the New York office of Baker Hostetler. Melinda advises clients on complex privacy, cybersecurity and information management issues as a member of the firm’s national privacy and data protection team. New York Super Lawyers has selected her as a rising start three years in a row. Melinda, thanks for being here. Okay, before we get started, I want to encourage everyone on the call to ask questions by typing them into the questions box on the right of your screen. And we will get to them at the end of the presentation as time allows.