Beyond the Cloud: How to BYOD, Step 1

Moving data to the cloud has been the critical data security challenge confronting organizations in the past few years.

With the cloud transition well underway, the spotlight has turned to securing end-user devices like smart phones and tablet computers, and in particular, the use of employee-owned devices for business purposes – “bring-your-own-device” or BYOD.

BYOD benefits often include reduced hardware costs for the organization and greater employee satisfaction from using a single portable device for workplace and personal needs. However, BYOD also raises significant data security and privacy concerns, which involve liability risk, some of which may require organizations to play catch-up to control.

The following is a summary of the key initial considerations lawyers and compliance personnel should take into account when creating the framework of an organization’s BYOD policies.

LOADING PDF: If there are any problems, click here to download the file.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Ingram Yuzek Gainen Carroll & Bertolotti, LLP | Attorney Advertising

Written by:


Ingram Yuzek Gainen Carroll & Bertolotti, LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.