How a good BYOD policy should protect your data after employees leave the company.Read More
It’s hard to believe that no one raised warnings about obvious design and operability concerns. They were too profound and widespread for that not to have happened.Read More
Millennial workers admit to ignoring BYOD rules in the workplace.Read More
Companies are tackling questions of security on worker mobile phones and tablets by creating special compartments in the devices.Read More
Michigan officials have received calls from about 30 staffing and recruiting companies concerned with the policy. While the state is not changing the policy for now, a workaround is available, officials say.Read More
Any successful bring-your-own-device program results from a synergy among the C-suite, legal, IT, HR, and risk management. Involve all of these departments to make sure that your BYOD program is successful, and addresses all necessary security issues.Read More
Welcome to our new Workforce blog, the Practical Employer. And meet our new blogger, employment law expert Jon Hyman. His debut post addresses the touchy topic of where Internet Protocol awareness starts. It should begin, he says, with a clear set of policies and agreements that prioritize the confidentiality of your information and data.
Crowd sourcing can involve breaking up a large task such as validating data or translation into many small tasks and farming them out to numerous workers online instead of hiring a single worker or small number of workers to do the single large task.Read More