Legal and Practical Considerations for Corporate Bring Your Own Device Programs

(728 Ratings)

Produced on: January 12, 2016

Course Format On Demand Audio

Taught by


Course Description

Time 90 minutes
Difficulty Intermediate

Employee use of mobile devices for both personal and professional purposes, commonly referred to as “Bring Your Own Device” or “BYOD,” presents myriad challenges for businesses of all sizes, and can be especially difficult for multinational organizations. Companies with BYOD programs must balance employee expectations of privacy against the need for enhanced data security, which may include the added wrinkle of managing devices and data for employees who live and work in multiple jurisdictions. In this presentation, Melinda McLellan and James Sherer, Counsel in the New York office of BakerHostetler, discuss this new frontier at the intersection of employee privacy and corporate security, including how to approach the development of policies and procedures to govern employee use of mobile devices and the relevant legal standards emerging in this rapidly-evolving space.


Learning Objectives:

I.     Identify and triage potential risks associated with employee use of mobile devices

II.    Understand the regulatory and litigation landscape for BYOD programs, including how recent developments in the regulation of cross-border data transfers may impact these programs

III.   Get practical advice on how to develop and implement a BYOD program tailored to your organization’s needs


Melinda L. McLellan


Melinda McLellan works with clients to navigate complex privacy, cybersecurity, and data management issues in a rapidly evolving regulatory environment. She counsels companies of all sizes across multiple industry sectors, helping them to identify, evaluate, and manage the myriad compliance obligations associated with corporate privacy and information security practices. Melinda regularly advises on the creation, development, and implementation of global privacy and security policies, standards, procedures, and guidelines, as well as company codes of conduct and employee privacy training programs. Attentive to her clients' business needs, Melinda's proactive approach favors pragmatic, forward-thinking compliance strategies that emphasize prevention and mitigation of privacy and data security risks.

Select Experience:

  • Advises clients on the development and implementation of enterprise-wide privacy and information security programs, including by creating employee privacy training modules and drafting company codes of conduct, policies, standards, procedures and guidelines related to the protection of personal data.
  • Develops compliance strategies for the execution of multi-marketer and multimedia digital and mobile marketing campaigns, regularly advising on online behavioral advertising issues, CAN-SPAM Act requirements, regulations imposed by the Telephone Consumer Protection Act, the FTC's Telemarketing Sales Rule and National Do-Not-Call Registry, and the FCC's regulations applicable to telemarketing calls and text messages.
  • Counsels clients on the legal implications of various data collection and analytics technologies, including facial recognition software, in-store WiFi tracking and web-based tools used for behavioral marketing and geotargeting purposes.

James Sherer


James Sherer is Counsel in the New York office of BakerHostetler. At BakerHostetler, James co-chairs the Information Governance practice team and serves as part of the E-Discovery and Management and Privacy and Data Protection groups.


His work focuses on litigation; discovery management processes; enterprise risk management; records and information governance; data privacy, security, and bank secrecy; technology integration issues; and related merger and acquisition diligence. Prior to joining BakerHostetler, James worked as in-house litigator with a Fortune 500 company and previously practiced litigation in New York.


James holds CIPP/US, CIPP/E, and CIPM credentials as well as an MBA in finance; is a member of The Sedona Conference® Working Groups One, Six, and Eleven; and writes and presents on e-discovery, information governance, privacy, investigation, and merger and acquisition issues.


Retha M.

Good program. Look forward to an update.

Leah G.

Very practical. Great presenters.

Chris R.

Quite interesting

Roger P.

excellent discussion and professional presentation.

William T.

Quite good. Thanks.

Cheryl B.

They were excellent and worked well together.

Kylee G.

Good coverage on the topic.

Peggy H.

very good team presentation of content, kept it interesting!

Sara L.

This was a super unexpectedly interesting one.

tim r.

Presenters worked well together.

Hugh A. P.


Scott R.

Thought provoking discussion. Opened my eyes.


Extremely timely. We had this issue arise & persist in the last few months. Very well-considered points & learned explanations.

thomas m.

This was the most interesting CLE class I've ever taken.

Mariam C.

Enjoyed the relevance of the subject matter and the overall format.

Samantha E.

This was one of the better organized presentations I've seen. The instructors were well prepared and they interacted well.

Elizabeth Z.

Thank you.

John B.

Best course I have attended, fun and interactive.

Karin V.

Very interesting topic and I thought the presenters did a great job!

Marc S.

One of the better programs to watch and certainly the best I've seen on here using a multiple presenter approach.

Judd M.

easy to listen to

Load More


$ 89 Discovery & E-Discovery, Science & Technology Law, and Privacy & Cybersecurity In Stock


Get Unlimited Access to Lawline Courses

Unlimited CLE Subscription gives you access to take almost any course from our catalog and earn as much CLE credit as you need.