Beyond the Cloud: How to BYOD, Step 1

more+
less-
Explore:  Bring Your Own Device

Moving data to the cloud has been the critical data security challenge confronting organizations in the past few years.

With the cloud transition well underway, the spotlight has turned to securing end-user devices like smart phones and tablet computers, and in particular, the use of employee-owned devices for business purposes – “bring-your-own-device” or BYOD.

BYOD benefits often include reduced hardware costs for the organization and greater employee satisfaction from using a single portable device for workplace and personal needs. However, BYOD also raises significant data security and privacy concerns, which involve liability risk, some of which may require organizations to play catch-up to control.

The following is a summary of the key initial considerations lawyers and compliance personnel should take into account when creating the framework of an organization’s BYOD policies.

LOADING PDF: If there are any problems, click here to download the file.

Topics:  Bring Your Own Device

Published In: Business Organization Updates, Intellectual Property Updates, Professional Practice Updates, Privacy Updates, Science, Computers & Technology Updates

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Ingram Yuzek Gainen Carroll & Bertolotti, LLP | Attorney Advertising

Don't miss a thing! Build a custom news brief:

Read fresh new writing on compliance, cybersecurity, Dodd-Frank, whistleblowers, social media, hiring & firing, patent reform, the NLRB, Obamacare, the SEC…

…or whatever matters the most to you. Follow authors, firms, and topics on JD Supra.

Create your news brief now - it's free and easy »