Other Formats for Download (Membership Required)
An introduction to this issue of The SciTech Lawyer.
In memory of US Foreign Service Officer Anne T. Smedinghoff.
This year’s SciTech Chair reflects on privacy and mobile security.
Whole businesses are being created around linking mobile device location information to other data about our activities, desires, and purchases. Algorithms can be applied to that data set to make assumptions about us in ways that could benefit—or disadvantage—us.
Both the TCPA and the Do Not Call telemarketing rules require prior consent to receive text marketing messages. Advertisers must consider whether particular consents from the intended recipients are necessary before launching the campaign.
This article discusses the regulatory and litigation landscape and provides an overview of key best practices advocated by the regulatory entities.
Everything seems to be going mobile, corresponding privacy and security concerns are escalating, and everyone wants to know what regulators/enforcers are saying on the topic. Christopher Olsen and Dr. Ann Cavoukian, two experts in the field, share their thoughts.
Should companies embrace or avoid BYOD (bring your own device)? This article will explore the drivers behind the BYOD phenomenon and suggest practical ways to survive a BYOD program.
Do companies have the legal right to access both a mobile device and the data it contains when it becomes the subject of an investigation?
Lawyers have a responsibility to make sure that the mobile devices they use for confidential communications are secure. At the same time, they should counsel their clients regarding the need to adopt security best practices throughout their organizations.