05/12/2015

Another Lawsuit Sheds Light on Legal Concerns Surrounding Mobile Device Controls

by Neil Farquharson


Earlier this month, a California woman filed a lawsuit against her former employer, alleging invasion of privacy, retaliation and unfair business practices related to her termination which occurred after she removed a mobile app that tracked her 24 hours a day. The lawsuit states her manager:

“Admitted that employees would be monitored while off duty and bragged that he knew how fast she was driving at specific moments ever since she installed the app on her phone.”

This type of monitoring is a bit scary and certainly extreme; after all, in speaking to our customers, they have no interest or time to track their employees’ whereabouts. They do, however, have an interest in enabling mobile devices – specifically Bring Your Own Devices (BYOD) – to provide added flexibility and convenience for employees, more attention for customers and increased productivity for their business.

Unfortunately, what seems like a win-win-win has not been simple to implement, and location tracking is only one legal concern employers have to consider. Here’s another BYOD-related lawsuit that adds to the complexity.

We hosted a webinar with mobility expert Michael Finneran and legal counsel Jim Brashear offering a full perspective of the many legal challenges involved with enabling mobility. In light of the recent lawsuit, their insights are even more pertinent today. Check out the webinar “Is BYOD really Bring Your Own Lawsuit” or read their eBook to help you recognize the legal issues surrounding BYOD and how they may impact your mobile strategy.

Posted: 5/12/2015 12:00:00 AM by Global Administrator | with 0 comments
Filed under: BYOD, employee, lawsuit, Mobile, privacy


Recent Posts

08/09/2018

What Is Needed to Achieve Secure by Default Email?

by Dena Bauckman

View Blog Post

08/02/2018

The Current State of Secure by Default for Email

by Dena Bauckman

View Blog Post

07/26/2018

Focusing on What Really Matters in Cybersecurity

View Blog Post