Change Location × Pune, India

    Recent Locations

      Legal Considerations of Mobile Computing in the Workplace in Pune

      • Legal Considerations of Mobile Computing in the Workplace Photo #1
      1 of 1
      September 25, 2013

      Wednesday  11:30 AM - 12:30 PM

      Pune, Mahārāshtra

      • No Performers Listed
      Legal Considerations of Mobile Computing in the Workplace


      Mobile devices have permeated the workplace and have become part of an organization's IT and business infrastrucutre.  Organizations are faced with supporting a broad range of mobile devices—hundreds of types of mobile devices running on dozens of different platforms and operating systems—and increased risk of business data exposure.  Furthermore, organizations are contending with sensitive legal questions regarding access to an employee's personal device and the need to balance personal privacy.  

      Join Kivu Consulting for a discussion of the legal considerations and questions of mobile computing in the workplace.

      Points Covered:

      • Establishing practices, policies and monitoring to protect corporate data--customer lists, trade secrets, etc.
      • Dealing with issues about employer access, customer privacy and employee privacy
      • Implications of mobile device data as evidence
      • BYOD Risks: The importance of well-defined policies
      • Understanding and planning for liabilities associated with mobile-device use
      • Overview of international legal differences for mobile device use, communications and content


      Richard Cheng, CISSP, CISA, ACE

      Mr. Cheng is the Director of Forensics and eDiscovery at Kivu Consulting, Inc.  Richard Cheng directs digital forensics and e-discovery cases, conducts IT audits, and consults on IT governance, risk, and compliance. He has substantial experience with the collection and analysis unique and/or proprietary digital evidence (including data stored in Apple devices, mobile devices, collaboration sites, and the cloud). Richard has provided testimony as a neutral expert and technology authority. Additionally, he has 20 years’ experience in IT which includes building next-generation IT infrastructure and services. He has presented on e-discovery, digital forensics, mobile security and risk, and investigations at HTCIA, ACFE, CalCPA, Wave University, the Masters Conference, and the Merchant Acquirers’ Conference West. He has two M.S. degrees from the University of New Haven and a B.S. from MIT. He holds the CISSP and CISA certifications and is a member of HTCIA, InfraGard, IEEE, and ACM.

      MCLE Credit:
      This event is pending approval by the State Bar of California for 1 hour of MCLE credit based on a 60 minute hour.  You must attend this event for credit.  To receive MCLE credit and a certificate of completion for your records, email the following to

      • Name
      • California Bar Number
      • Title of Conference
      • Date of Conference

      IAPP Continuing Education Credit:
      IAPP-certified professionals earn 1 hour continuing privacy education (CPE) credit. To receive credit. register for and attend this event. After the event, log into the IAPP website and complete an IAPP CPE Submission Form for the event. If you have questions, email

      Categories: Conferences & Tradeshows | Technology

      Event details may change at any time, always check with the event organizer when planning to attend this event or purchase tickets.
      COMMENTS ABOUT Legal Considerations of Mobile Computing in the Workplace