• First Reference
  • About us
  • Contact us
  • Blog Signup 📨

First Reference Talks

Discussions on Human Resources, Employment Law, Payroll and Internal Controls

  • Home
  • About
  • Archives
  • Resources
  • Buy Policies

Network Security

By Adam Gorley | 2 Minutes Read July 26, 2013

BYOD: is personal information visible over corporate networks?

Employers are increasingly drafting and implementing bring-your-own-device (BYOD) policies for their employees. And they should be, since employees are increasingly using their personal digital devices—phones, tablets, laptops—to perform work, both in and out of the workplace. But employees may have trouble trusting their employers to stay out of their personal information...

Article by Adam Gorley / Employee Relations, Payroll, Privacy / bring your own device, BYOD, BYOD policy, canadian employment law, collection of personal information, corporate networks, email, employee personal information, Employee privacy rights, employee trust, employment law, Information Technology PolicyPro, IT, ITPP, laptops, mobile devices, network access, Network Security, personal information, policies and procedures, portable devices, privacy, Privacy in the workplace, privacy policy, privacy rights, protecting personal information, smartphones, tablet computer

By Adam Gorley | 2 Minutes Read March 7, 2012

BYOD trend poses immense challenges for organizations

No, employees aren't bringing their own alcoholic drinks to work, but they are bringing in their own mobile devices and expecting to use them with their employers' networks. What does that mean? Well, chances are several (if not many) of a given organization's employees have personal smartphones or tablet computers, and they probably want to use them to perform work tasks.

Article by Adam Gorley / Privacy / Blackberry, BYOD, chief mobility officer, Crackberry, information technology, iPad, iPhone, IT, mobile devices, mobility, Network Security, smartphones, tablet computer

By Adam Gorley | 2 Minutes Read August 2, 2011

Online security – not just for big business

Surely you've heard about the major security and data breaches that Sony has experienced this year. It's bad. It's a liability. Despite the popularity of their online services, they'll have to work hard to regain customers' loyalty. Other big names have experienced similar attacks.

Article by Adam Gorley / Business, Finance and Accounting, Privacy / attack, classified information, credit card data, cyber-thieves, Data breach, FAPP, Finance and Accounting PolicyPro, hackers, hacking, Information Technology PolicyPro, ITPP, loyalty, Network Security, online security, privacy, proprietary information, risk management, SMBs, Sony, Symantec

  • Go to page 1
  • Go to page 2
  • Go to Next Page »

Footer

About us

Established in 1995, First Reference is the leading publisher of up to date, practical and authoritative HR compliance and policy databases that are essential to ensure organizations meet their due diligence and duty of care requirements.

First Reference Talks

  • Home
  • About
  • Archives
  • Resources
  • Buy Policies

Main Menu

  • About First Reference
  • Resources
  • Contact us
  • 1 800 750 8175

Stay Connected

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

We welcome your comments on our blog articles. However, we do not respond to specific legal questions in this space.
We do not provide any form of legal advice or legal opinion. Please consult a lawyer in your jurisdiction or try one of our products.


Copyright © 2009 - 2023 · First Reference Inc. · All Rights Reserved
Legal and Copyright Notices · Publisher's Disclaimer · Privacy Policy · Accessibility Policy