One of the biggest challenges you face is establishing and enforcing realistic (and legal) limitations on employees' business use of their own computers, tablets, smartphones, email, social networking accounts, and other forms of technology. We will examine best practices with respect to written policies, preservation of trade secrets and confidential information, security protections and breaches, privacy issues, protected concerted activity, and investigations of inappropriate conduct involving technology devices and accounts that are owned by the employee. This session will: