When can companies “spy” on their employees? Monitoring data systems and employee digital activity is critical to reducing the significant cybersecurity risks that employees pose (either inadvertently or maliciously), but companies do need to make sure they comply with consent and other legal requirements when implementing surveillance programs. This first part of a two-part series on the topic addresses the role of data monitoring, effective notice, legal considerations, and specific policies regarding BYOD, termination and remote employees – including stories from the trenches. Part two will provide operational guidance on implementing effective and compliant monitoring programs, and discuss privacy concerns in different types of employee surveillance, including the contrasting rules and approaches in Europe. See also “Strategies for Preventing and Handling Cybersecurity Threats From Employees” (Apr. 8, 2015).
Apr. 5, 2017
Jan. 2, 2019
The Cybersecurity Law Report’s Most-Read Articles of 2018
Jan. 9, 2019
Ten Cyber and Privacy Resolutions for the New Year
Jan. 9, 2019
GDPR Provides Model for Privacy and Security Laws in Latin America and Asia (Part One of Two)
Jan. 16, 2019
Key Cyber Threats and Targets for 2019
Dec. 12, 2018
Illinois Appellate Decision Creates Split on Standing to Sue Under BIPA
Webinar: Building a Strong Relationship Between Privacy and Information Security Teams for Effective Data Protection
Join the Cybersecurity Law Report on January 24, 2019, from 12:00pm-1:00pm EST, for a complimentary webinar about how privacy and security professionals can effectively coordinate for strong data protection programs. Dan Koslofsky, associate general counsel at Gap Inc., and Aaron Weller, co-founder and strategy VP for Sentinel LLC, will join the Cybersecurity Law Report’s Jill Abitbol to discuss, among other topics, the evolving roles of privacy and security professionals and practical examples of best practices for successful communication and coordination of efforts. Registration information is here.