Bring Your Own Device to Work

How two companies are dealing with today's nightmare for IT chiefs.

, Corporate Counsel


How two companies are dealing with today's nightmare for IT chiefs.

This content has been archived. It is available exclusively through our partner LexisNexis®.

To view this content, please continue to Lexis Advance®.

Continue to Lexis Advance®

Not a Lexis Advance® Subscriber? Subscribe Now

Why am I seeing this?

LexisNexis® is now the exclusive third party online distributor of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® customers will be able to access and use ALM's content by subscribing to the LexisNexis® services via Lexis Advance®. This includes content from the National Law Journal®, The American Lawyer®, Law Technology News®, The New York Law Journal® and Corporate Counsel®, as well as ALM's other newspapers, directories, legal treatises, published and unpublished court opinions, and other sources of legal information.

ALM's content plays a significant role in your work and research, and now through this alliance LexisNexis® will bring you access to an even more comprehensive collection of legal content.

For questions call 1-877-256-2472 or contact us at

What's being said


    Soon after cutting through the red tape of BYOD implementation, many organizations are finding that IT admins and end-users have their own particular interests, both of which need to be accounted for. On one end, administrators are looking to enforce pass-codes, keep devices jailbreak/root free, ensure devices are connected to corporate WiFi instead of the data plan, up to date on the latest version, and much more. They will need cooperation from their end-users to accomplish this. Their colleagues on the other hand have their own best-interests to protect. Specifically, the privacy of their personally identifiable information. They are more than happy to bring their smartphones and tablets to work, but when considering their personal apps and location information, they need assurance this will be kept private from unwanted eyes. This blog post provides tips for pleasing both parties, I recommend checking it out if you have any interest in implementing a BYOD program at your organization:

Comments are not moderated. To report offensive comments, click here.

Preparing comment abuse report for Article #1202549135172

Thank you!

This article's comments will be reviewed.