Contact us

(831) 722-3541

Contact us

Contact details:

Message:

Your message has been sent successfully. Close this notice.

Commercial Insurance Quote

Coverage Information

Current Coverage Information

Contact details:

Your Quote Form has been sent successfully. Close this notice.

Auto Insurance Quote

Contact details:

Current Coverage Information

Your car:

Your Quote Form has been sent successfully. Close this notice.

Homeowners Insurance Quote

Your house:

Current Coverage Information

Contact details:

Your Quote Form has been sent successfully. Close this notice.

Life Insurance Quote

Life Insurance Details

Current Coverage Information

Contact details:

Your Quote Form has been sent successfully. Close this notice.

Health Insurance Quote

Coverage Information

Current Coverage Information

Contact details:

Your Quote Form has been sent successfully. Close this notice.
8 years ago · by · 0 comments

Mobile Devices Pose Data Breach Threats

2The widespread use of smartphones and tablets in the workplace is exposing more and more businesses to liability for sensitive data being compromised if these devices are lost, stolen, or hacked. How can your company protect itself against this threat – and how much authority do you have over an employee’s personal device if it’s also used for work-related activities?

What’s more, because these gizmos are small and portable, it’s easy to misplace them. (The federal Transportation Safety Administration recently leased a warehouse just to store those misplaced or left behind at airports.)

Another emerging risk linked to these devices is a “bring your own” policy that many companies have adopted as a way to save costs by having employees spend their own money on smartphones and tablets that are constantly evolving and updated. This approach raises questions about separating company data from personal information on the device. For example, when an employee leaves, does a business have the authority to wipe the information from his or her smartphone? According to some authorities, if an employee connects a personal device to a company network, the company has inherited responsibility for the data stored on it.

To deal with this risk, you need to provide every employee who uses these devices with training, updated annually, on how to respond in case of loss or theft. To minimize potential liability for lawsuits by customers and clients, make sure that the individual responsible for the mishap informs management immediately. The compromised information might include everything from sensitive data (financial or medical) contacts, photos, call history, personal notes – you name it.

You can also use insurance to protect yourself against losses from data breaches. A policy will provide Liability coverage that deals with legal costs and third-party expertise (such as forensics firms to analyze a breach and call centers to provide information and public relations. Coverage might also include services such as access to tools to estimate costs, a checklist for your planned response to a data breach, and access to experts who can answer questions and review your company’s policies and procedures.

For more information, feel free to give us a call.

Comments

Not found any comments yet.

Leave a reply

Your email address will not be published, and your website url is not required.

Company information

Scurich Insurance Services
Phone: (831) 661-5697
Fax: (831) 661-5741

Physical:
783 Rio Del Mar Blvd., Suite7,
Aptos, Ca 95003-4700

Mailing:
PO Box 1170
Watsonville, CA 95077-1170

Contact details

E-mail address:
[email protected]

(831) 661-5697

Available 8:30am - 5:00pm