Enjoying the privilege of using a personal device at work doesn’t come without responsibility. Companies that allow employees to use their own tablets must ensure that clearly defined security policies are in place. More importantly, those policies must be understood and agreed upon by management, IT and the tablet users themselves.
Technology is giving organizations lots of ways to successfully protect and manage the data and applications on Karen’s BlackBerry Playbook, Adam’s iPad, Barbra’s ThinkPad Tablet and Kevin’s Galaxy Tab—but without underlying policies, seemingly valid solutions can be ignored or even create ethical problems. Read more
If you'd like some help understanding how your organization can take advantage of business-focused mobility technology from a broad industry perspective, read our quick eBrief. Find out how the problems associated with mobility — access, connection quality, and security — have essentially been solved through new application development, embedded broadband, and cloud computing.