Bring your own device (BYOD) is far more than a corporate buzzword. Businesses that enable mobile and other personal device use can benefit from improved employee flexibility and productivity. The problem is that mobility can also cause big complications for corporate data management processes, especially when it comes to following legal and compliance rules.
Join SearchCompliance on Twitter Thursday, Jan. 22, at 12 p.m. EST for a #GRCChat about mobile data management best practices for BYOD compliance. Topics we may discuss include BYOD policy development to ensure legal and regulatory compliance, the mobile data management complications created by wearable technology and how recent high-profile data breaches cast even more attention on mobile device security.
SearchCompliance editors will lead the chat from the site's Twitter handle, @ITCompliance, joined by other TechTarget writers, editors and experts.
Date: Thursday, Jan. 22, 2015
Time: 12 p.m. EST
Hashtag: Use and follow #GRCChat
Is this your first #GRCChat? Whether you're a first-time participant or a returning tweet chatter, read the following pointers before signing on:
To follow the conversation, type "#GRCChat" into Twitter's search bar. From this page, select "All" to view tweets in real time.
Your first #GRCChat tweet should be introductory, including your name, title and organization.
@ITCompliance will ask a series of questions related to BYOD compliance starting at 12 p.m. EDT (Q1, Q2, etc.). In your tweeted responses to each question, please preface with A1 (Answer 1), A2 and so on, then remember to include "#GRCChat". Each tweet sent during the chat should include the hashtag.
Please note that Twitter allows only 140 characters per tweet. You are welcome to tweet multiple responses to each question (consider using format "1 of 2" or "1/2" to identify there is more)
Throughout the discussion, retweet (RT) and favorite tweets you agree with and reply to those you don't.
Please direct questions, RSVPs or other concerns to SearchCompliance Editor Ben Cole. "See" you on Twitter!
Learn about the data governance challenges created by wearable technology and the 10 questions to ask when conducting a mobile data risk assessment. Plus, see how your peers balance GRC management with consumer risk protection.
Dig Deeper on Managing governance and compliance
Intel's job cuts a sign of PC's metamorphosis; keeping cool during a cyberassault
The logistics of a 'bossless' workplace; dated security practices endanger companies
IT systems integration key to multichannel retail; Samsung chips away at IoT market
Go beyond compliance checklists to avoid information security breaches