What is a good BYOD policy? Step one is to clarify the rights of both company and employee and state upfront what's business and what's personal. But there's a lot more to it. In this interview with a technology transactions lawyer, CIO.com explores the do's and don'ts of BYOD policies.
- Worst DNS attacks and how to mitigate them
- Microsoft warned 10,000 targets of nation-state hackers in one year
- Microsoft eyes Mozilla’s Rust to obliterate C++ memory security flaws
- Will Facebook’s $US5b punishment finally prompt other companies to act on privacy?
- As skills gaps persist, CEDA finds temporary migration is “a net positive” for Australia