Why Read This
Amid the rising trend of personally owned smartphone and tablet use in the workplace, security professionals face the tough question of how to properly manage and secure these devices. Secure processes such as remote wipe, pin-based entry, and centralized management will satisfy many of the security requirements of your organization. However, when the mobile actions of the user conflict with the interests of the enterprise, this raises notable legal issues surrounding the adoption of personal devices in the workplace. To address the often conflicting legal, privacy, and security requirements, security professionals must work with a general counsel, chief privacy officer, and an IT ops lead to develop a robust mobile policy baseline. For a successful mobile implementation, you must also balance the security requirements of the enterprise with the user's device experience.
Tags: Data & Information Protection, Enterprise Mobile Devices, Enterprise Mobility, Governance Risk & Compliance (GRC), Information Management, Information Workplace, Infrastructure Security, IT Infrastructure & Operations, Mobile Security, Office Productivity, Privacy, Security Program Governance, Security Risk & Compliance