They can be big security risks if not adequately controlled. If your staff are taking work data away on their palm tops, then synching them to home machines - there goes your proprietary data in the twinkling of an eye (potentially). If you have an employee who is determined to keep hold of important contact lists, key documents etc., they will find a way, but this is just another tool to make it easier.
Agree with the comments that if you're going to have them, make them work-issue only, with accompanying relevant security features switched on and conditions of use attached. Another reason for making them work-issue is if they go wrong, your IT helpdesk only has to know how to support the one model - rather than all the possible varieties on sale at any time.
Lastly, consider the type of device you might be encountering - if you have "always on" e-mail and the device is stolen, you could have real-time e-mail being delivered straight to the thief. Not a good thing.
regards
Su
---------------------------------
Yahoo! Plus - For a better Internet experience
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|