Advisor

BYOD, Mobile Device Management, and the Need for Secured Mobile Devices

Posted June 18, 2012 | Leadership | Technology |

A friend whose company provides data recovery services mentioned to me that his firm had been hired by a company to delete proprietary information from the mobile phone of an employee it had recently fired. In other words, he was going to have to go through and remove company information from the employee's personal device.

About The Author
Curt Hall
Curt Hall is a Cutter Expert and a member of Arthur D. Little’s AMP open consulting network. He has extensive experience as an IT analyst covering technology and application development trends, markets, software, and services. Mr. Hall's expertise includes artificial intelligence (AI), machine learning (ML), intelligent process automation (IPA), natural language processing (NLP) and conversational computing, blockchain for business, and customer… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.