Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

There is no way to keep consumer technology from invading the enterprise. Compliance with a personal mobile device policy is the most important factor in mitigating any risk this invasion brings. This training slideshow will help users:

  • Understand the purpose of a personal mobile device policy, and which devices are covered by it.
  • Use devices that store corporate data in a way that maintains the data’s security and integrity.
  • Be aware of the steps that can be taken by IT—such as remote wiping a device—if a security breach occurs or the policy is not followed.
  • Know the responsibilities that IT has in managing personal devices, and which responsibilities are left to the user.

Use this presentation to increase end-user compliance, and maximize the potential for success.

Related Content


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.