Jul 9 , 2015 Session 22: Why We Encrypt and Brining Your Own Device View Session autologoffavailability biasavailability heuristicbring your own deviceBYODchildrenchildren sharing devicesfdefull disk encryptionHIPAA Breach Notification safe harboronline disinhibition effectprivacy policiesreleasing recordsrisk assessmentrisk psychologyROIshutting downsmartphone encryptionuninterruptable power supplyUPS