Business or Pleasure: The Challenges of Bring Your Own Device Policies in the Workplace

Size: px
Start display at page:

Download "Business or Pleasure: The Challenges of Bring Your Own Device Policies in the Workplace"

Transcription

1 Business or Pleasure: The Challenges of Bring Your Own Device Policies in the Workplace Presented by: Gavin Appleby, Littler, Atlanta Dionysia Johnson-Massie, Littler, Atlanta

2 What Is BYOD? In the past: Companypurchased devices are linked directly to employer s computer system, employees used separate personal and work phones Current trend: Dual-Use devices used for both business and personal activities

3 Why Does It Matter? Ownership of the device used to store the data affects the employer s ability to control the device and the data Bring your own disaster?

4 Who is Doing It? Some of the largest corporations, including IBM, Kraft, Cisco & Lockheed are implementing BYOD policies BYOD is appealing to small and mid-sized employers, as well Recent survey found that 75% of companies allow employees to use their own personal devices for business (Aberdeen)

5 Why? Reducing expenses for employers Improving employee engagement Aiding in the recruitment of new employees Solving the two pocket problem Innovation to reduce costs and promote collaboration

6 Also Creates Risks and Challenges for Employers Data-Related Risks Security of company data Privacy of employee data Records management Contractual obligations ediscovery Trade Secret Protection Contingent Workers

7 Also Creates Risks and Challenges for Employers Behavior-Related Risks Performance management EEO Wage & Hour Workplace Safety Labor International

8 Recent BYOD Developments Fatal flaws: Flaw in latest update to iphone operating system (version 6.1) software causes BYOD chaos, many employers recommending against the update for BYOD devices Root of the problem: Users can unlock administrative features on devices by rooting or jailbreaking, which causes a BYOD headache for employers who may lose security control

9 Your Experiences with BYOD

10 Your Experiences with BYOD What approach has your company taken to the BYOD issue? Restricts to company-owned devices? Allows some employees to connect personal devices but process is ad hoc? Has a BYOD policy? Has a Bring Your Own Computer (BYOC) policy?

11 HR and Employment Law Issues

12 HR and Employment Law Issues

13 The Data Issues

14 Data Is Heavily Regulated Security Laws and Regulations Encryption Breach notification Secure data destruction Record retention Employee privacy rights Contractual obligations Indirectly regulated Trade secret protection ediscovery obligations

15 Security for Company Data Loss or theft of devices Lost and stolen equipment accounted for 31% of breaches Malware Increased use of malware targeting the Android platform Friends and family Legal risks associated with third party access to confidential information through BYOD

16 Security for Company Data Gateway to the cloud Applications such as Dropbox and Google Drive provide free and convenient access to the cloud, with legal risk Employee ownership of the account with the service provider will limit company access to its data

17 Privacy of Employee Data Wiping employee device without consent Computer Fraud and Abuse Act State computer trespass laws Accessing data stored with online service providers Stored Communications Act Inability to access data without lawful consent of account holder Apps may store access credentials Data you may not want to see Employee s privileged communications

18 Record Retention and Destruction Automatic deletion procedures? Data hoarding issues

19 Trade Secret Protection 60 percent of American workers who left their employers [in 2008] took some data with them. (Economist) Misappropriation may be harder to prove Use or disclosure will be the focus Access to the devices will be a challenge

20 ediscovery Challenges Locating the data Access to the device Collection challenges

21 Obligations Follow the Data

22 A Few BYOD Scenarios

23 What Are the Legal Risks? Scenario #1 Employees at your company are excited to learn about the new BYOD policy. John, a non-exempt administrative assistant, asks to have his Android phone connected to receive work s so he can stay connected outside of work hours. Any problems? a) Yes, this could create an off the clock problem under the Fair Labor Standards Act (FLSA) b) No, John should be encouraged to read and respond to s promptly c) No, responding to s does not qualify as work time under the FLSA

24 What Are the Legal Risks? Scenario #1 Employees at your company are excited to learn about the new BYOD policy. John, a non-exempt administrative assistant, asks to have his Android phone connected to receive work s so he can stay connected outside of work hours. Any problems? a) Yes, this could create an off the clock problem under the Fair Labor Standards Act (FLSA) b) No, John should be encouraged to read and respond to s promptly c) No, responding to s does not qualify as work time under the FLSA

25 What Are the Legal Risks? Scenario #2 A company plans to terminate an employee for poor performance. This employee routinely accesses the company s confidential and proprietary documents. The IT department would like to remotely wipe (i.e., erase) the employee s BYOD iphone following the termination. Any problems with that approach? a) No problem, wipe away! b) Cannot wipe personal device under any circumstances c) Depends - what does the employer s policy say?

26 What Are the Legal Risks? Scenario #2 A company plans to terminate an employee for poor performance. This employee routinely accesses the company s confidential and proprietary documents. The IT department would like to remotely wipe (i.e., erase) the employee s BYOD iphone following the termination. Any problems with that approach? a) No problem, wipe away! b) Cannot wipe personal device under any circumstances c) Depends - what does the employer s policy say?

27 What Are the Legal Risks? Scenario #3 An employee asks whether she can install the mobile game Angry Birds, Star Wars Edition on her BYOD device. What is your response? a) Go for it the employee owns the device b) Stop! Angry Birds could make the employee less productive c) Depends on whether the employee s job duties involve launching birds as projectiles

28 What Are the Legal Risks? Scenario #3 An employee asks whether she can install the mobile game Angry Birds, Star Wars Edition on her BYOD device. What is your response? a) Go for it the employee owns the device b) Stop! Angry Birds could make the employee less productive c) Depends on whether the employee s job duties involve launching birds as projectiles

29 What Are the Legal Risks? Scenario #4 An employee, Jane, claims that she is receiving explicit and harassing text messages from her co-worker, Frank. Both employees have BYOD devices but do not typically use text messages for work communications. You are conducting an investigation of Jane s allegations should you ask the IT department to remotely download text messages from Jane and/or Frank s phones? a) Yes, employers have a right to download texts from BYOD devices b) No, the texts are private, non-work communications c) No, the better approach would be to ask Jane to show you the offending texts

30 What Are the Legal Risks? Scenario #4 An employee, Jane, claims that she is receiving explicit and harassing text messages from her co-worker, Frank. Both employees have BYOD devices but do not typically use text messages for work communications. You are conducting an investigation of Jane s allegations should you ask the IT department to remotely download text messages from Jane and/or Frank s phones? a) Yes, employers have a right to download texts from BYOD devices b) No, the texts are private, non-work communications c) No, the better approach would be to ask Jane to show you the offending texts

31 Recommendations

32 Recommendations Plan the program Technical controls Policies Operating procedures and capabilities Educate and train

33 Recommendation: Decide whether all employees should be permitted to participate in a BYOD program or whether certain groups should be excluded.

34 Recommendation: Limit use of the cloud if employee has access to confidential/proprietary information or documents.

35 Recommendation: Install Mobile Device Management software on dual use devices.

36 Recommendation: Require employees to consent to the company s access to their data on the device.

37 Recommendation: Modify or create Employee Agreements.

38 Recommendation: Restrict employees from using cloudbased apps, cloud-based backup, or synchronizing with home PCs for work-related data.

39 Recommendation: No use by friends and family members.

40 Recommendation: Revise exit interview processes.

41 Questions?

42 Thank You! Gavin Appleby Littler Mendelson, P.C. Atlanta Office Dionysia Johnson-Massie Littler Mendelson, P.C. Atlanta Office

Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace

Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace Earl (Chip) M. Jones Littler, Dallas ejones@littler.com (214) 880-8115 Michelle B. Brookshire Littler, Dallas mbrookshire@littler.com

More information

September 29, 2015. Facing The Challenges of Bring Your Own Device (BYOD) Policies in the Workplace

September 29, 2015. Facing The Challenges of Bring Your Own Device (BYOD) Policies in the Workplace September 29, 2015 Facing The Challenges of Bring Your Own Device (BYOD) Policies in the Workplace Presented By: Angela B. Cummings, Shareholder Littler Mendelson, P.C. 704.972.7005 acummings@littler.com

More information

Mobile Devices in the Workplace: What Every Employer Needs to Know

Mobile Devices in the Workplace: What Every Employer Needs to Know Mobile Devices in the Workplace: What Every Employer Needs to Know Presented by: Shannon Huygens Paliotta Senior Associate, Littler Mendelson, P.C. spaliotta@littler.com (412) 201-7631 Marcy McGovern Knowledge

More information

BYOD: Bring Your Own Device Advantage, Liability or Both?

BYOD: Bring Your Own Device Advantage, Liability or Both? BYOD: Bring Your Own Device Advantage, Liability or Both? S S Scott Summers Laura B. Grubbs Dinsmore & Shohl Louisville, KY The BYOD to Work Movement Dual-Use Devices: used for both personal and company

More information

Practical Legal Aspects of BYOD

Practical Legal Aspects of BYOD Practical Legal Aspects of BYOD SESSION ID: LAW-F01 Lawrence Dietz General Counsel & Managing Director TalGlobal Corporation ldietz@talglobal.net +1 408 993 1300 http://psyopregiment.blogspot.com Francoise

More information

[BRING YOUR OWN DEVICE POLICY]

[BRING YOUR OWN DEVICE POLICY] 2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2

More information

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal

More information

How To Make Bring Your Own Device A Plus, Not A Risk

How To Make Bring Your Own Device A Plus, Not A Risk FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES BYOD: Bring your own device How to make BYOD a PLUS, not a RISK

More information

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work FEATURED FACULTY: Michael P. Elkon, Attorney at Law, Fisher & Phillips LLP (404) 240-5849 melkon@laborlawyers.com

More information

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work FEATURED FACULTY: Amy F. Melican, Associate, Proskauer 212.969.3641 AMelican@proskauer.com Traci Clements, Attorney,

More information

Third Thursday Crowell & Moring s Labor & Employment Update June 20, 2013

Third Thursday Crowell & Moring s Labor & Employment Update June 20, 2013 Third Thursday Crowell & Moring s Labor & Employment Update June 20, 2013 The webinar will begin shortly. Please stand by. Today s Presenters Chris Calsyn Robin Campbell David Cross Tom Gies 2 BYOD Employment

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:

More information

Security and Privacy Considerations for BYOD

Security and Privacy Considerations for BYOD Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening

More information

BYOD Policy for [AGENCY]

BYOD Policy for [AGENCY] BYOD Policy for [AGENCY] This document provides policies, standards, and rules of behavior for the use of smartphones, tablets and/or other devices ( Device ) owned by [AGENCY] employees personally (herein

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the

More information

Mobile Security Standard

Mobile Security Standard Mobile Security Standard Title Mobile Security Standard Mobile Device Security Category Version: 18/07/2013 PUBLISHED Author:, IT Services Contact: itsecurity@contacts.bham.ac.uk Mobile Security Standard

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

White Paper. Data Security. The Top Threat Facing Enterprises Today

White Paper. Data Security. The Top Threat Facing Enterprises Today White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is

More information

THE AMERICAN LAW INSTITUTE Continuing Legal Education

THE AMERICAN LAW INSTITUTE Continuing Legal Education 47 THE AMERICAN LAW INSTITUTE Continuing Legal Education Preventing Employee Data Leaks: Policies, Procedures, and Practical Advice May 20, 2014 Telephone Seminar/Audio Webcast Is your mobile workforce

More information

"choose your own device" : the employer still provides the hardware and the employee can choose e.g. the model.

choose your own device : the employer still provides the hardware and the employee can choose e.g. the model. WHAT IS BYOD? BYOD comes in "different shades of grey". "bring your own device" : employees are allowed to use their privately owned hard- and software. IT-applications and company data of the employer

More information

Smart Ideas for Smartphone Security

Smart Ideas for Smartphone Security Page 1 of 6 8814 Fargo Road, Suite 105 Richmond, Virginia 804.360.4490 www.seltekinc.com July 2013 Computer Forensics IT Support Security ediscovery Security Apps for your Smartphone Smart Ideas for Smartphone

More information

The Security Impact of Mobile Device Use by Employees

The Security Impact of Mobile Device Use by Employees The Security Impact of Mobile Device Use by Employees Sponsored by Accellion Independently conducted by Ponemon Institute LLC Publication Date: December 2014 Ponemon Institute Research Report The Security

More information

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Overview: The Bring Your Own Device (BYOD) program allows employees to use their own computing

More information

White Paper. Data Security. journeyapps.com

White Paper. Data Security. journeyapps.com White Paper Data Security CONTENTS The JourneyApps Commitment to Security Geographic Location of Cloud Hosting Infrastructure-Level Security Protection of Data Through Encryption Data Life Cycle Management

More information

Mobile Device Usage and Agreement Policy

Mobile Device Usage and Agreement Policy Page 1 of 10 1.0 Introduction Mobile Device Usage and Agreement Policy The State of Minnesota provides several electronic tools for employees whose job performance requires or would be enhanced by their

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

Bring Your Own Device

Bring Your Own Device Bring Your Own Device Save costs, deliver flexible working and manage the risks Gary Shipsey Managing Director 25 September 2014 Agenda Bring Your Own Device (BYOD) and your charity and how to avoid the

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

Washwood Heath Academy Use by staff of private communication devices policy

Washwood Heath Academy Use by staff of private communication devices policy As a learning community, Washwood Heath Academy wants all staff and students to be able to be safe users of ICT and all data storage. The development of responsible, independent users is a prime aim of

More information

BYOD: BRING YOUR OWN DEVICE

BYOD: BRING YOUR OWN DEVICE BYOD: BRING YOUR OWN DEVICE PART 5 OF THE LAW PRACTICE MANAGEMENT SERIES Sarah Banola Cooper, White & Cooper LLP James Y. Wu Law Office of James Y. Wu Bring Your Own Device (BYOD)Trend Increased use of

More information

Use of Mobile Apps in the Workplace:

Use of Mobile Apps in the Workplace: Use of Mobile Apps in the Workplace: PRIVACY & SECURITY ADAM D.H. GRANT AGRANT@ALPERTBARR.COM Cell Phone & Tablet Ownership 91% of American adults own a cell phone 56% have smartphones Of Americans aged

More information

Questions And Answers

Questions And Answers Questions And Answers Bring Your Own Device Challenges and Solutions for the Mobile Workplace Kevin J. Smith and Shira Forman Technological advances in the workplace often introduce new levels of convenience

More information

THE BRING YOUR OWN DEVICE TO WORK MOVEMENT:

THE BRING YOUR OWN DEVICE TO WORK MOVEMENT: THE BRING YOUR OWN DEVICE TO WORK MOVEMENT: Engineering Practical Employment and Labor Law Compliance Solutions May 2012 AUTHORS Garry G. Mathiason Michael J. McGuire Gavin S. Appleby Philip M. Berkowitz

More information

Bring Your Own Device. Individual Liable User Policy Considerations

Bring Your Own Device. Individual Liable User Policy Considerations Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

What s Yours Is Mine. Global Results. How Employees are Putting Your Intellectual Property at Risk. Embargo until Wednesday, Feb.

What s Yours Is Mine. Global Results. How Employees are Putting Your Intellectual Property at Risk. Embargo until Wednesday, Feb. What s Yours Is Mine How Employees are Putting Your Intellectual Property at Risk Global Results Embargo until Wednesday, Feb. 6 Methodology The Ponemon Institute surveyed 3,317 individuals in 6 countries

More information

THE BYOD SURVIVAL GUIDE 5TIPS FOR PRACTICING SAFE MOBILE FILE ACCESS AND COLLABORATION

THE BYOD SURVIVAL GUIDE 5TIPS FOR PRACTICING SAFE MOBILE FILE ACCESS AND COLLABORATION THE BYOD SURVIVAL GUIDE 5TIPS FOR PRACTICING SAFE MOBILE FILE ACCESS AND COLLABORATION Personal mobile devices have infiltrated organizations all over the world, enabling everyone to work from everywhere.

More information

How can I protect against the loss of my ID if my device is lost or stolen?

How can I protect against the loss of my ID if my device is lost or stolen? How can I protect against the loss of my if my device is lost or stolen? If your mobile device is stolen or lost, you can reactivate your user on a new device and deactivate it on your stolen or lost device.

More information

County of Grande Prairie - Information Systems

County of Grande Prairie - Information Systems County of Grande Prairie - Information Systems Title [Systems] [BRING YOUR OWN DEVICE - BYOD] - Procedure Location Buddie Systems and HR Documents Approved by Natalia Madden Collaborators Sophie Mercier,

More information

Presented by: Jason C. Gavejian

Presented by: Jason C. Gavejian 2014 Jackson Lewis P.C. Presented by: Jason C. Gavejian Shareholder, Morristown Office Jackson Lewis P.C. Mobile phones Tablets ipads Laptops Non-company owned PCs USB sticks External hard drives Cloud-based

More information

Taking Charge with Apps, Policy, Security and More. October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia

Taking Charge with Apps, Policy, Security and More. October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia Taking Charge with Apps, Policy, Security and More October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia http://pinterest.com/visualoop/byod-infographics/ vs. NSFW PSFW NSFW Security & Compliance

More information

Bring your own device - Legal Whitepaper

Bring your own device - Legal Whitepaper A Legal Whitepaper from the Technology Group Bring your own device - Legal Whitepaper The consumerisation of IT is the latest technology trend posing challenges to Australian businesses. As workplaces

More information

MOBILE BANKING USER GUIDE

MOBILE BANKING USER GUIDE MOBILE BANKING USER GUIDE CentricBank.com DrCentricBank.com 717.657.7727 Centric Bank does not currently charge a fee for Mobile Banking. However, your mobile phone provider may charge data usage fees

More information

6 Pillars for Building a Successful BYOD Program. Protecting corporate assets while increasing employee productivity

6 Pillars for Building a Successful BYOD Program. Protecting corporate assets while increasing employee productivity 6 Pillars for Building a Successful BYOD Program Protecting corporate assets while increasing employee productivity Executive Overview As the Bring Your Own Device (BYOD) movement continues to gain traction

More information

THE BRING YOUR OWN DEVICE TO WORK MOVEMENT:

THE BRING YOUR OWN DEVICE TO WORK MOVEMENT: THE BRING YOUR OWN DEVICE TO WORK MOVEMENT: Engineering Practical Employment and Labor Law Compliance Solutions May 2012 AUTHORS Garry G. Mathiason Michael J. McGuire Gavin S. Appleby Philip M. Berkowitz

More information

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees

More information

Total Enterprise Mobility

Total Enterprise Mobility Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate

More information

Are you prepared for the BYOD (bring your own device) movement?

Are you prepared for the BYOD (bring your own device) movement? Are you prepared for the BYOD (bring your own device) movement? IRIS Service Management Guide www.irisfieldservice.com Are you prepared for the BYOD (bring your own device) movement? The trend towards

More information

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

Kaspersky Security 10 for Mobile Implementation Guide

Kaspersky Security 10 for Mobile Implementation Guide Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful

More information

Considerations for Outsourcing Records Storage to the Cloud

Considerations for Outsourcing Records Storage to the Cloud Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage

More information

Exchange ActiveSync (EAS)

Exchange ActiveSync (EAS) Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,

More information

White Paper. How a cloud phone system uniquely supports your mobile workforce

White Paper. How a cloud phone system uniquely supports your mobile workforce White Paper How a cloud phone system uniquely supports your mobile workforce How a cloud phone system uniquely supports your mobile workforce What s the first thing you do when you wake up in the morning?

More information

Anatomy of a Cloud Computing Data Breach

Anatomy of a Cloud Computing Data Breach Anatomy of a Cloud Computing Data Breach Sheryl Falk Mike Olive ACC Houston Chapter ITPEC Practice Group September 18, 2014 1 Agenda Ø Cloud 101 Welcome to Cloud Computing Ø Cloud Agreement Considerations

More information

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues

More information

Don t Let BYOD Mean Bring Your Office Disaster. Southeastern Business Law Institute October 24-25, 2013 Cumberland School of Law Samford University

Don t Let BYOD Mean Bring Your Office Disaster. Southeastern Business Law Institute October 24-25, 2013 Cumberland School of Law Samford University Don t Let BYOD Mean Bring Your Office Disaster Southeastern Business Law Institute October 24-25, 2013 Cumberland School of Law Samford University Richard C. Balough BALOUGH LAW OFFICES, LLC 1 N. LaSalle

More information

Consumerization Survey Report The Consumerization of IT

Consumerization Survey Report The Consumerization of IT Securing Your Journey to the Cloud Consumerization Survey Report The Consumerization of IT An increasing number of organizations are taking a strategic approach to Consumerization. Learn what they are

More information

Bring Your Own Device Security and Privacy Legal Risks

Bring Your Own Device Security and Privacy Legal Risks Bring Your Own Device Security and Privacy Legal Risks Introduction Information Law Group, LLP National boutique firm with focus on information law Experienced, nationally-recognized privacy, technology,

More information

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will

More information

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business. There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business. We put this document together to help you understand

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com {ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling

More information

BYOD Policies: A Litigation Perspective

BYOD Policies: A Litigation Perspective General Counsel Panel Reveals the Real Deal BYOD Policies: A Litigation Perspective By Andrew Hinkes Reprinted with Permission BYOD Policies: A Litigation Perspective By Andrew Hinkes Bring-your-own-device

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

BYOD Privacy and Security in Europe

BYOD Privacy and Security in Europe BYOD Privacy and Security in Europe BYOD: Overview 2 BYOD Overview 38% of companies expect to stop providing electronic devices to their employees by 2016 (1) According to a 2013 survey conducted by Cisco,

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

RUNNING HEAD: BRING YOUR OWN DEVICE 1

RUNNING HEAD: BRING YOUR OWN DEVICE 1 RUNNING HEAD: BRING YOUR OWN DEVICE 1 Bring Your Own Device: The Advantages and Disadvantages of BYOD Network Policies Benjamin Fuller BRING YOUR OWN DEVICE 2 Introduction The world of mobile devices continues

More information

Mobile Security & BYOD Policy

Mobile Security & BYOD Policy Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks BYOD File Sharing - Go Private Cloud to Mitigate Data Risks An Accellion Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks Executive Summary The consumerization of IT and the popularity

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.) Organizational risks 1 Lock-in Risk of not being able to migrate easily from one provider to another 2 Loss of Governance Control and influence on the cloud providers, and conflicts between customer hardening

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to

More information

How to Practice Safely in an era of Cybercrime and Privacy Fears

How to Practice Safely in an era of Cybercrime and Privacy Fears How to Practice Safely in an era of Cybercrime and Privacy Fears Christina Harbridge INFORMATION PROTECTION SPECIALIST Information Security The practice of defending information from unauthorised access,

More information

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

"Bring Your Own Device" Brings its Own Challenges

Bring Your Own Device Brings its Own Challenges 6 June 2012 "Bring Your Own Device" Brings its Own Challenges By Susan McLean and Alistair Maughan The consumerisation of IT is the growing trend for information technology to emerge first in the consumer

More information

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED 1 Background Traditionally, security has not been a high priority for e-learning; as such content was hosted and only accessible at the

More information

Cloud Services and Business Process Outsourcing

Cloud Services and Business Process Outsourcing Cloud Services and Business Process Outsourcing What security concerns surround Cloud Services and Outsourcing? Prepared for the Western NY ISACA Conference April 28 2015 Presenter Kevin Wilkins, CISSP

More information

Policy Outsourcing and Cloud Based File Sharing

Policy Outsourcing and Cloud Based File Sharing Policy Outsourcing and Cloud Based File Sharing Version 3.1 TABLE OF CONTENTS Outsourcing Policy... 2 Outsourcing Management Standard... 2 Overview... 2 Standard... 2 Outsourcing Policy... 3 Policy Statement...

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley swilley@cosgravelaw.com (503)276-6074

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley swilley@cosgravelaw.com (503)276-6074 BYOD At Your Own Risk Working in the BYOD Era Shane Swilley swilley@cosgravelaw.com (503)276-6074 Remember when mobile technology was more Hollywood fantasy than reality The original Smart Phone By the

More information

Cloudifile: Frequently Asked Questions

Cloudifile: Frequently Asked Questions Cloudifile: Frequently Asked Questions 1 Contents Cloudifile Compatibility... 3 Cloudifile Installation... 4 Cloudifile Account Registration... 5 Working with Cloudifile... 6 Cloudifile Functionality...

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

Mobile Content Collaboration and its Benefits Across Your Enterprise. A Good Technology Whitepaper

Mobile Content Collaboration and its Benefits Across Your Enterprise. A Good Technology Whitepaper Mobile Content Collaboration and its Benefits Across Your Enterprise Mobile Content Collaboration and its Benefits Across Your Enterprise 866-7-BE-GOOD good.com 2 Contents Introduction The Key Elements

More information

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida 2015 SCCE Compliance & Ethics Institute Wednesday, October 7, 2015 (10:00 11:45) Session W14 Bring Your Own Device(BYOD) They are here and they are not going away. Understanding the benefits, risks, and

More information

KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE

KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE There s been lots of buzz about the tsunamis of change hitting IT. Talk of pivoting to the cloud, the growing mobile workforce, and the Internet of Things

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

5 Things You Need to Know About ipad in the Enterprise

5 Things You Need to Know About ipad in the Enterprise 5 Things You Need to Know About ipad in the Enterprise Introduction Without a doubt, ipads are one of the fastest adopted computing platforms in history. And, not just for consumers desiring to play Angry

More information

INFORMATION SYSTEM GENERAL USAGE POLICY

INFORMATION SYSTEM GENERAL USAGE POLICY PURPOSE The Information System General Usage Policy ("Policy") establishes appropriate uses of Devon s Information Systems. Devon provides secure Information Systems in accordance with the Information

More information

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Southern California Association for Financial Professionals February 14, 2014 Stan Stahl, Ph.D.

More information

My CEO wants an ipad now what? Mobile Security for the Enterprise

My CEO wants an ipad now what? Mobile Security for the Enterprise My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager

More information

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

BYOD File Sharing Go Private Cloud to Mitigate Data Risks AN ACCELLION WHITE PAPER BYOD File Sharing Go Private Cloud to Mitigate Data Risks Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto, CA

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology

More information

How To Backup and Copy Data Between ios Devices

How To Backup and Copy Data Between ios Devices How To Backup and Copy Data Between ios Devices (Courtesy of How-To Geek) Although itunes usually does a good enough job backing up your data, the backups are encrypted and inaccessible save for totally

More information