Whatup,
I'd echo what others have said. Not sure how important your job is to you but if your firm is sufficiently committed to security to set standards for particular cell phones, I doubt they would be happy discovering that you've violated that policy.
Generally, firms are concerned about three issues. First, that they can protect their internal networks from outside threats. It shouldn't be too difficult to demonstrate that the Droid poses no greater a threat than other mobile devices on that score. (Unless, of course, their entire security apparatus is built on RIM software and they're not willing to adapt to a changing environment.) But if they're Exchange-centric, Touchdown should provide the security they need (I believe.)
Second, firms have a legitimate concern about the loss of mobile devices and the capability to lock access to the phone and/or wipe the data on the phone. You might suggest they examine either Wave Secure or Mobile Defense as a solution to that problem on the Droid.
Finally, firms are sometimes concerned about open access to email on a phone even if it has not been lost. Apart from the obvious use of a lock pattern on your phone, you might investigate an app called "Protector." It allows you to password protect any application on the Droid, including email. Thus, even if you let someone examine your phone they won't be able to open your email application.
Good luck.