- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
Page 2 of 2
A signed policy also gives companies the right to protect themselves in the event of device theft, loss or misuse. “Companies can’t simply wipe information off lost devices -- that wouldn’t be legal,” Park says. “There has to be some sort of agreement in place between the individual and the company.”
To read more about byod, how to implement it securely and the keys to the implementation, you need to become a Network World Insider (free registration is required).
Read more about wireless & mobile in Network World's Wireless & Mobile section.