Subpoena BYOD Mobile Law: How to Confiscate Mobile Device Suppose enterprise has a BYOD policy<http://hack-igations.blogspot.com/2012/10/service.html>empowering the enterprise to seize employee’s smartphone. Suppose further that enterprise has reason to believe the phone contains important evidence . . . such as stolen trade secret or records of contract negotiations by employee on behalf of enterprise or photos relevant to allegations of a hostile work environment. http://bit.ly/10o0SOn Source: http://hack-igations.blogspot.com/2013/04/seize.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+SpiesSnoopsSnitchesPrivacyLaw+(Spies,+Snoops,+Snitches+%26amp;+Privacy+Law) See if people are clicking on this link: http://bit.ly/10o0SOn+ Try the bitly.com sidebar to see who is talking about a page on the web: http://bitly.com/pages/sidebar List archives at http://lists.ufl.edu/archives/recmgmt-l.html Contact [log in to unmask] for assistance To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message. mailto:[log in to unmask]