Due to the significant volume of sources that I relied upon in putting together my presentation at the 2014 Clio Cloud Conference, Law Firms in a BYOD World, I have elected to provide the primary and secondary sources here in my blog. Below, you will find the following sections: 1) Direct sources – sources for specific pieces of information or statistics cited in my presentation; 2) Secondary sources – sources that I relied upon for general thematic information; 3) Further reading – sources that I read and found generally informative while I was researching this presentation, but which I did not directly rely upon for my presentation.
For additional information, I have also provided links to several example or template BYOD Policies, should you need any assistance in drafting the right BYOD Policy for you and your firm. In the coming days, I hope to also make my presentation available.
1) Direct Sources
- IT Security Risks Survey 2014: A Business Approach to Managing Data Security Threats, Kaspersky Lab (last viewed September 21, 2014).
- Key Findings from the Global State of Information Security Survey 2014, PricewaterhouseCoopers, LLC (last visited Sept. 17, 2014).
- Ex-Employees Say Home Depot Left Data Vulnerable“, New York Times
- New Webroot Report Reveals Disparities Between Corporate Mobile Security Policies and BYOD Practice, Webroot (July 10, 2014).
2) Secondary sources
- Gartner Says Bring Your Own Device Programs Herald the Most Radical Shift in Enterprise Client Computing Since the Introduction of the PC, Gartner (August 28, 2012).
- Susan Bassford Wilson, BYOD Requires BYOB: How to Handle the Challenges Inherent in a “Bring Your Own Device” Program, Constangy, Brooks & Smith, LLP (March 3, 2014).
- Law Firms and the BYOD Trend: How to Manage Potential Security Risks, LANInfotech.com, (last visited Sept. 20, 2014).
- Roberto Baldwin, Don’t Be Silly. Lock Down and Encrypt Your Smartphone, Wired.com (Oct. 28, 2013).
- “Airport Lost & Found: Over 8,000 Laptops and Cell Phones Left at Major Airports,”Travelers Today (July 6, 2012).
- James Gayton & Greg Tolbert, How Lawyers Get into Trouble with Technology, Lawyerist.com (Aug. 20, 2014).
- Cyber Security Threats to Small and Mid-Sized Firms: Why Now?, Accellis Technology Group (July 28, 2014, 4:51 PM).
- Robert Ambrogi, Viruses are More Common at Law Firms than Encryption, ABA Survey Shows, lawsitesblog.com (Sept. 12, 2014).
- Matthew J. Hafey & Allen G. Haroutounian, Protecting Against Cyber-Attacks, American Bar Ass’n (March 27, 2014).
- Omer Eiferman, Millennials Don’t Care About Mobile Security, and Here’s What to Do About It, Wired.com (Sept. 19, 2014).
3) Further reading
- http://blogs.wsj.com/personal-technology/2014/08/14/is-encrypted-messaging-entering-the-mainstream/
- http://www.insidecounsel.com/2014/04/23/the-byod-horse-is-out-of-the-barn-what-now-inside
- http://www.insidecounsel.com/2014/07/31/the-byod-horse-is-out-of-the-barn-implementing-the
- http://www.insidecounsel.com/2014/06/09/5-keys-to-developing-a-bring-your-own-device-byod
- http://www.constangy.com/communications-511.html
- http://accellis.com/mobile-device-management-tips-for-law-firms/
BYOD Policy Templates
- http://www.itmanagerdaily.com/byod-policy-template/
- http://www.shrm.org/templatestools/samples/policies/pages/bringyourowndevicepolicy.aspx
- http://www.code3pse.com/public/media/22845.pdf
Pingback: Awareness is the Key Ingredient for a Successful BYOD Policy()
Pingback: Rocket Matter for iPad is Impressive - LawPracticeAdvisor.com()