
This post is from the Apperian blog and has not been updated since the original publish date.
Legalities and Liabilities of BYOD
Are companies liable for storing or deleting personal information on devices they don’t own?
Anne Hulecki is a business and commercial law attorney, in Lincoln, MA, with a focus on copyright, trademark and trade secrets for public and private companies.
With Mobile Device Management, does a personal mobile device become a corporate owned device, and what must companies do as a result?
Andrew Jaquith is the CTO of Perimeter E-Security, the expert provider of cloud security solutions. Andrew brings 20 years of IT and information security experience. His book "Security Metrics: Replacing Fear, Uncertainty and Doubt" has sold more than 10,000 copies been praised by reviewers as "one of the best written security books ever."
@arj
How do you respect the rights of the employee while protecting the assets of the company?
John Heitmann is a partner in Kelley Drye & Warren LLP’s Washington, D.C. based Telecommunications and Privacy and Information Security practice groups, where he advises broadband and Internet service providers on a broad range of communications law, privacy and data security issues.
@TelecomLawBlog
John Heitmann
How do you do centralized management policy in a BYOD environment?
Aaron Freimark is founder of EnterpriseiOS.com - the community of iOS administrators - and CTO of Tekserve, New York's largest independent Apple consultancy.
@EnterpriseiOS
Tekserve
More from the Blog
View more

Sneak Peek: How Are IT Leaders Driving Mobile App Adoption?

Part 1: App Security Should Be an Integral Part of Your DevSecOps Process — Not an Afterthought
