Scarinci Hollenbeck, LLC, LLCScarinci Hollenbeck, LLC, LLC

Firm Insights

Did You Know About the Risks of Pokémon Go?

Author: Scarinci Hollenbeck, LLC

Date: September 1, 2016

Key Contacts

Back

The Real and Hidden Risks of Pokémon Go

risks of pokèmon go

As Pokémon Go exploded onto the software scene, the physical dangers of users walking into traffic, trespassing onto other people’s property, and even abandoning their children in search of the imaginary beasts caused alarm to many. However, these are just a few of the real risks of Pokèmon Go.Niantic, Inc., which until recently, only enjoyed success in the niche market of augmented reality gaming, now boasts installs surpassing 100 million and global revenue topping $160 million at the beginning of the month. However, the software has begun to distress other businesses as the Pokémon Go phenomenon booms and increasingly occupies employee time while at work.

At a base level, Pokémon Go clearly redirects the productivity of employees who feel the mission statement of “Gotta Catch ‘Em All” eclipses that of most employers. What should be more concerning to businesses than employees’ and trespassers’ imaginary expeditions is the issue of data security.

Call to ban Pokèmon Go

The International Association of IT Asset Managers (IAITAM) is calling for companies to ban the game from both corporate-owned, business-only (COBO) phones/tablets and “bring your own device” (BYOD) phones/tablets with direct access to sensitive corporate information and accounts. IAITAM CEO Dr. Barbara Rembiesa warned:

Frankly, the truth is that Pokémon Go is a nightmare for companies that want to keep their email and cloud-based information secure. Even with the enormous popularity of this gaming app, there are just too many questions and too many risks involved for responsible corporations to allow the game to be used on corporate-owned or BYOD devices. We already have real security concerns and expect them to become much more severe in the coming weeks. 

Data security concerns

As highlighted above, data security is a significant concern. In the first version of the app, the user agreement allowed Niantic to access a user’s entire Google profile and essentially all metadata from the phone’s interaction with its various data signals. While the former issue has been corrected, the app still collects a large amount of data from its users, including contact lists and pinpoint locations.

While some apps are legitimate guides, others are designed to simply spread malware.

This implicates an issue broader than merely the app itself. Users are increasingly downloading third-party apps that promise to help players successfully navigate the game (in other words, cheat). While some apps are legitimate guides, others are designed to simply spread malware. In addition, while the Pokémon Go fad may fade, new software applications that divert employee attention will likely appear, and the same data security concerns will arise. Therefore, a more comprehensive and active approach is needed to address the increasingly dangerous and apparent world of cybersecurity.

What employers should do about potential threats to cyber security

All the data an application itself collects as well as the potential for malicious third-party applications form a double-edged sword for employers. Not only is worker productivity compromised, but also, the data systems of the company might be at risk as well. The safeguards against this sort of employee behavior are not as simple as banning certain applications or other blanket restrictions that will no doubt carry unintended consequences.

So, rather than ban the applications as they become known to the employer, good procedures and processes that limit the transfer of information and provide for various levels of verification need to be in place so companies can operate safely, effectively, and legally.

While cyber-planning requires customization and experts, the expense and maintenance of effective cyber procedures is trivial compared to the expense and experts required for a cyber breach.

    No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

    Scarinci Hollenbeck, LLC, LLC

    Related Posts

    See all
    Does Your Homeowners Insurance Provide Adequate Coverage? post image

    Does Your Homeowners Insurance Provide Adequate Coverage?

    Your home is likely your greatest asset, which is why it is so important to adequately protect it. Homeowners insurance protects you from the financial costs of unforeseen losses, such as theft, fire, and natural disasters, by helping you rebuild and replace possessions that were lost While the definition of “adequate” coverage depends upon a […]

    Author: Jesse M. Dimitro

    Link to post with title - "Does Your Homeowners Insurance Provide Adequate Coverage?"
    Understanding the Importance of a Non-Contingent Offer post image

    Understanding the Importance of a Non-Contingent Offer

    Making a non-contingent offer can dramatically increase your chances of securing a real estate transaction, particularly in competitive markets like New York City. However, buyers should understand that waiving contingencies, including those related to financing, or appraisals, also comes with significant risks. Determining your best strategy requires careful analysis of the property, the market, and […]

    Author: Jesse M. Dimitro

    Link to post with title - "Understanding the Importance of a Non-Contingent Offer"
    Fred D. Zemel Appointed Chair of Strategic Planning at Scarinci & Hollenbeck, LLC post image

    Fred D. Zemel Appointed Chair of Strategic Planning at Scarinci & Hollenbeck, LLC

    Business Transactional Attorney Zemel to Spearhead Strategic Initiatives for Continued Growth and Innovation Little Falls, NJ – February 21, 2025 – Scarinci & Hollenbeck, LLC is pleased to announce that Partner Fred D. Zemel has been named Chair of the firm’s Strategic Planning Committee. In this role, Mr. Zemel will lead the committee in identifying, […]

    Author: Scarinci Hollenbeck, LLC

    Link to post with title - "Fred D. Zemel Appointed Chair of Strategic Planning at Scarinci & Hollenbeck, LLC"
    Novation Agreement Process: Step-by-Step Guide for Businesses post image

    Novation Agreement Process: Step-by-Step Guide for Businesses

    Big changes sometimes occur during the life cycle of a contract. Cancelling a contract outright can be bad for your reputation and your bottom line. Businesses need to know how to best address a change in circumstances, while also protecting their legal rights. One option is to transfer the “benefits and the burdens” of a […]

    Author: Dan Brecher

    Link to post with title - "Novation Agreement Process: Step-by-Step Guide for Businesses"
    What Is a Trade Secret? Key Elements and Legal Protections Explained post image

    What Is a Trade Secret? Key Elements and Legal Protections Explained

    What is a trade secret and why you you protect them? Technology has made trade secret theft even easier and more prevalent. In fact, businesses lose billions of dollars every year due to trade secret theft committed by employees, competitors, and even foreign governments. But what is a trade secret? And how do you protect […]

    Author: Ronald S. Bienstock

    Link to post with title - "What Is a Trade Secret? Key Elements and Legal Protections Explained"
    What Is Title Insurance? Safeguarding Against Title Defects post image

    What Is Title Insurance? Safeguarding Against Title Defects

    If you are considering the purchase of a property, you may wonder — what is title insurance, do I need it, and why do I need it? Even seasoned property owners may question if the added expense and extra paperwork is really necessary, especially considering that people and entities insured by title insurance make fewer […]

    Author: Patrick T. Conlon

    Link to post with title - "What Is Title Insurance? Safeguarding Against Title Defects"

    No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

    Sign up to get the latest from our attorneys!

    Explore What Matters Most to You.

    Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.

    Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.

    Did You Know About the Risks of Pokémon Go?

    Author: Scarinci Hollenbeck, LLC

    The Real and Hidden Risks of Pokémon Go

    risks of pokèmon go

    As Pokémon Go exploded onto the software scene, the physical dangers of users walking into traffic, trespassing onto other people’s property, and even abandoning their children in search of the imaginary beasts caused alarm to many. However, these are just a few of the real risks of Pokèmon Go.Niantic, Inc., which until recently, only enjoyed success in the niche market of augmented reality gaming, now boasts installs surpassing 100 million and global revenue topping $160 million at the beginning of the month. However, the software has begun to distress other businesses as the Pokémon Go phenomenon booms and increasingly occupies employee time while at work.

    At a base level, Pokémon Go clearly redirects the productivity of employees who feel the mission statement of “Gotta Catch ‘Em All” eclipses that of most employers. What should be more concerning to businesses than employees’ and trespassers’ imaginary expeditions is the issue of data security.

    Call to ban Pokèmon Go

    The International Association of IT Asset Managers (IAITAM) is calling for companies to ban the game from both corporate-owned, business-only (COBO) phones/tablets and “bring your own device” (BYOD) phones/tablets with direct access to sensitive corporate information and accounts. IAITAM CEO Dr. Barbara Rembiesa warned:

    Frankly, the truth is that Pokémon Go is a nightmare for companies that want to keep their email and cloud-based information secure. Even with the enormous popularity of this gaming app, there are just too many questions and too many risks involved for responsible corporations to allow the game to be used on corporate-owned or BYOD devices. We already have real security concerns and expect them to become much more severe in the coming weeks. 

    Data security concerns

    As highlighted above, data security is a significant concern. In the first version of the app, the user agreement allowed Niantic to access a user’s entire Google profile and essentially all metadata from the phone’s interaction with its various data signals. While the former issue has been corrected, the app still collects a large amount of data from its users, including contact lists and pinpoint locations.

    While some apps are legitimate guides, others are designed to simply spread malware.

    This implicates an issue broader than merely the app itself. Users are increasingly downloading third-party apps that promise to help players successfully navigate the game (in other words, cheat). While some apps are legitimate guides, others are designed to simply spread malware. In addition, while the Pokémon Go fad may fade, new software applications that divert employee attention will likely appear, and the same data security concerns will arise. Therefore, a more comprehensive and active approach is needed to address the increasingly dangerous and apparent world of cybersecurity.

    What employers should do about potential threats to cyber security

    All the data an application itself collects as well as the potential for malicious third-party applications form a double-edged sword for employers. Not only is worker productivity compromised, but also, the data systems of the company might be at risk as well. The safeguards against this sort of employee behavior are not as simple as banning certain applications or other blanket restrictions that will no doubt carry unintended consequences.

    So, rather than ban the applications as they become known to the employer, good procedures and processes that limit the transfer of information and provide for various levels of verification need to be in place so companies can operate safely, effectively, and legally.

    While cyber-planning requires customization and experts, the expense and maintenance of effective cyber procedures is trivial compared to the expense and experts required for a cyber breach.

    Let`s get in touch!

    * The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form.

    Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!

    Please select a category(s) below: