There is no way to keep consumer technology from invading the enterprise. Compliance with a personal mobile device policy is the most important factor in mitigating any risk this invasion brings. This training slideshow will help users:
- Understand the purpose of a personal mobile device policy, and which devices are covered by it.
- Use devices that store corporate data in a way that maintains the data’s security and integrity.
- Be aware of the steps that can be taken by IT—such as remote wiping a device—if a security breach occurs or the policy is not followed.
- Know the responsibilities that IT has in managing personal devices, and which responsibilities are left to the user.
Use this presentation to increase end-user compliance, and maximize the potential for success.