BYOD compliance: How do you keep mobile data management legal?

How does your organization make sure mobile data adheres to legal and compliance regulations? Discuss with us during #GRCChat Jan. 22 at 12 p.m. EST.

Bring your own device (BYOD) is far more than a corporate buzzword. Businesses that enable mobile and other personal device use can benefit from improved employee flexibility and productivity. The problem is that mobility can also cause big complications for corporate data management processes, especially when it comes to following legal and compliance rules.

Join SearchCompliance on Twitter Thursday, Jan. 22, at 12 p.m. EST for a #GRCChat about mobile data management best practices for BYOD compliance. Topics we may discuss include BYOD policy development to ensure legal and regulatory compliance, the mobile data management complications created by wearable technology and how recent high-profile data breaches cast even more attention on mobile device security.

SearchCompliance editors will lead the chat from the site's Twitter handle, @ITCompliance, joined by other TechTarget writers, editors and experts.

Details

Date: Thursday, Jan. 22, 2015
Time: 12 p.m. EST
Host: @ITCompliance
Hashtag: Use and follow #GRCChat

Is this your first #GRCChat? Whether you're a first-time participant or a returning tweet chatter, read the following pointers before signing on:

To follow the conversation, type "#GRCChat" into Twitter's search bar. From this page, select "All" to view tweets in real time.

Your first #GRCChat tweet should be introductory, including your name, title and organization.

@ITCompliance will ask a series of questions related to BYOD compliance starting at 12 p.m. EDT (Q1, Q2, etc.). In your tweeted responses to each question, please preface with A1 (Answer 1), A2 and so on, then remember to include "#GRCChat". Each tweet sent during the chat should include the hashtag.

Please note that Twitter allows only 140 characters per tweet. You are welcome to tweet multiple responses to each question (consider using format "1 of 2" or "1/2" to identify there is more)

Throughout the discussion, retweet (RT) and favorite tweets you agree with and reply to those you don't.

Please direct questions, RSVPs or other concerns to SearchCompliance Editor Ben Cole. "See" you on Twitter!

Next Steps

Learn about the data governance challenges created by wearable technology and the 10 questions to ask when conducting a mobile data risk assessment. Plus, see how your peers balance GRC management with consumer risk protection.

Dig Deeper on Managing governance and compliance

Join the conversation

3 comments

Send me notifications when other members comment.

Please create a username to comment.

What does your organization include in a BYOD policy to ensure mobile data adheres to legal and compliance regulations?
Cancel
We have a company checklist that people bringing their own devices must meet. In short, if they can't prove that their device adheres to the relevant regulations, then they're not permitted to use the device. We've been looking at expanding our company policy to encompass what the device can be used for outside of normal working hours - mobile devices aren't perfectly safe, and we want to get on top of things before they hurt us.
Cancel
Companies shouldn't use mobile data to infringe privacy rights of staff. If it does not work towards efficiency of information dissemination, it shouldn't be used.
Cancel

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close