One of the biggest challenges faced by employers today is establishing and enforcing realistic (and legal) limitations on employees' business use of their own computers, tablets, smartphones, email, social networking accounts, scanners and other forms of technology. This session will examine best practices with respect to written policies, preservation of trade secrets and confidential information, security protections and breaches, privacy issues, protected concerted activity and investigations of inappropriate conduct involving technology devices and accounts that are owned by the employee.