Print

Print


Many organizations are permitting (or even encouraging) their employees to
use their own personal devices to access, create, and manage company
related information – a practice commonly referred to as Bring Your Own
Device (BYOD).  But, how can those organizations effectively manage those
BYOD devices to meet their discovery obligations?  To help with that
issue, *The
Sedona Conference®* (TSC) has published an initial Public Comment Version
of a Commentary to help.

https://urldefense.proofpoint.com/v2/url?u=http-3A__bit.ly_2EHQHkP&d=DwIFaQ&c=pZJPUDQ3SB9JplYbifm4nt2lEVG5pWx2KikqINpWlZM&r=b5NZPQUb9_r2rQ3Zd74ATT3aSs9yKyRnJLOhqJvd7fE&m=hzrlXmoHLtl88ukpbBIe0KBByOdn1Iib8faZq7ZqLE4&s=7-g9EFBmW46A1GsJD1zhaUHd31RC2PLQzwWoytch1Ko&e=
https://urldefense.proofpoint.com/v2/url?u=http-3A__bit.ly_2EHQHkP-2B&d=DwIFaQ&c=pZJPUDQ3SB9JplYbifm4nt2lEVG5pWx2KikqINpWlZM&r=b5NZPQUb9_r2rQ3Zd74ATT3aSs9yKyRnJLOhqJvd7fE&m=hzrlXmoHLtl88ukpbBIe0KBByOdn1Iib8faZq7ZqLE4&s=_28dfGwPeNEe3GR4yWg8zX_Du-mgavUFhcrFktyWbwQ&e=

-- 
Peterk
Dallas, Tx
[log in to unmask]
Save our in-boxes! https://urldefense.proofpoint.com/v2/url?u=http-3A__emailcharter.org&d=DwIFaQ&c=pZJPUDQ3SB9JplYbifm4nt2lEVG5pWx2KikqINpWlZM&r=b5NZPQUb9_r2rQ3Zd74ATT3aSs9yKyRnJLOhqJvd7fE&m=hzrlXmoHLtl88ukpbBIe0KBByOdn1Iib8faZq7ZqLE4&s=Kjb_q0LowUmOhcFdw9iLJpsFPZRGKOfWOzwFJZbMoVQ&e=
“If only there were a massive entity that I were forced to fund to tell me
how I should live my life, since I’m so obviously incapable of deciding for
myself.” M. Hashimoto

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]