Are you concerned about the legalities and liabilities of BYOD? Listen to what the experts have to say!
Are companies liable for storing or deleting personal information on devices they don’t own?
Anne Hulecki is a business and commercial law attorney, in Lincoln, MA, with a focus on copyright, trademark and trade secrets for public and private companies.
With Mobile Device Management, does a personal mobile device become a corporate owned device, and what must companies do as a result?
Andrew Jaquith is the CTO of Perimeter E-Security, the expert provider of cloud security solutions. Andrew brings 20 years of IT and information security experience. His book “Security Metrics: Replacing Fear, Uncertainty and Doubt” has sold more than 10,000 copies been praised by reviewers as “one of the best written security books ever.”
How do you respect the rights of the employee while protecting the assets of the company?
John Heitmann is a partner in Kelley Drye & Warren LLP’s Washington, D.C. based Telecommunications and Privacy and Information Security practice groups, where he advises broadband and Internet service providers on a broad range of communications law, privacy and data security issues.
How do you do centralized management policy in a BYOD environment?
Aaron Freimark is founder of EnterpriseiOS.com – the community of iOS administrators – and CTO of Tekserve, New York’s largest independent Apple consultancy.
Want to hear more? Click here to sign up for access to the online audio conference, The Paradox of Enterprise Mobility.