tag:blogger.com,1999:blog-2938493123269026698.post112667762805237098..comments2023-12-26T22:00:58.352-08:00Comments on InfoSec & Forensics Law: Bring Your Own Device Policy - Part 2Benjamin Wrighthttp://www.blogger.com/profile/11543639411820745571noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-2938493123269026698.post-37891716251198218412012-04-05T11:37:39.896-07:002012-04-05T11:37:39.896-07:00Thank you, Ruth.Thank you, Ruth.Benjamin Wrighthttps://www.blogger.com/profile/11543639411820745571noreply@blogger.comtag:blogger.com,1999:blog-2938493123269026698.post-11616635893576118752012-04-05T07:44:38.083-07:002012-04-05T07:44:38.083-07:00Ben,
Typically I have seen policies that require ...Ben,<br /><br />Typically I have seen policies that require that the device have to be one that is on a "remote wipe" capable list in case it gets lost or stolen, and in that, the user has to agree that if they leave they have to wipe the device (which then can generally be re-loaded via sync/backup with their personal data only) to ensure all corp data is cleaned. Also, the company does make the user sign a waiver that they can "audit the device" to ensure it is in compliance with security and data controls at any time - passwords, data, encryption, etc. Those are key elements from what I have seen. - RuthAnonymousnoreply@blogger.com