Compliance Guru • FFIEC Guidance
  • Ask the Guru
  • Upcoming Events
  • About
  • Ask the Guru
  • Upcoming Events
  • About
The Compliance Guru Pictogram

Role of the Information Security Officer

Get a Copy

Managing Risk with Vendor Management

White Paper

Assess your Cybersecurity Readiness

Take Quiz

By Tom Hinkel  |  In Hot Topics

BYOD Redux – The Policy Solution (Part 2)

In the previous post, I suggested that because mobile devices (smart phones and PDA’s) were not that functionally different in how they process, transmit, and store information than other mobile computing devices like laptops, a separate policy wasn’t necessary.  Since data security, confidentiality and integrity concerns were the same as other devices, you should be […]

Read Post 0
By Tom Hinkel  |  In Hot Topics

BYOD Redux – The Policy Dilemma (Part 1)

Employee-owned mobile devices are everywhere, and they’re being used for everything from email to document storage and editing.  Proper risk management procedures are defined in your policies, but do you need a separate mobile device policy, or can you simply mention them in the same policy sections that address other portable devices?  Or is there […]

Read Post 0

Join Our Community

Browse Posts

  • Ask the Guru
  • Ask the ISO
  • From the Field
  • Hot Topics
  • Resources

Copyright © Compliance Guru®. All Rights Reserved.

Powered by Safe Systems. Privacy Policy