Acorda Therapeutics, a developer of drugs used for central nervous system disorders, wanted to ensure that its 500 employees could share and work on documents using their mobile devices in a secure environment. Acorda opted for the EMC Syncplicity file management app.
IT asset management can be employed successfully to combat the increasing number of cyberattacks on proprietary data, according to an IDC case study.
In 2007, I promoted a then-young fellow (which could describe a lot of us) named Tim Conneally to write for me at Betanews.
Firms are coming under increasing attack from advanced persistent threats, or APTs, yet they seem ill prepared to deal with these attacks. To help enterprises cope with the challenge of advanced threats, FierceITSecurity is bringing together a panel of experts for a July 29 webinar at 1 pm ET.
BYOD programs could make it easier for corporate insiders to steal confidential data and intellectual property warns a report at InsideCounsel.
Intellectual property law seems straightforward enough: an employer has the right to works created by employees in the course of their employment. But when employees are producing work on their own time and their own device things become murky, making bring your own device considerations important.
The U.S.-China Economic and Security Review Commission is calling for U.S. government action against China for its large-scale theft of U.S. intellectual property through its cyberesponiage campaign.
In an exclusive interview with FierceMobileIT, Joshua Konvisser, partner with the law firm of Pillsbury Winthrop Shaw Pittman, explains how BYOD is a balancing act between employee privacy, corporate interests and interests of the data owners.
While BYOD has helped improve productivity for workers and provided IT flexibility for companies, it has also raised a number of sticking issues around privacy, legal liability and intellectual property ownership. Here are some tips for companies to protect their IP through BYOD policies.
With such overwhelming evidence against China regarding cyberespionage, stronger action is needed from the U.S. government than the strategy released this week by the White House. The U.S. government should impose trade sanctions that have enough bite to make the Chinese government sit up and take notice.