Adams County, Colorado

Size: px
Start display at page:

Download "Adams County, Colorado"

Transcription

1 Colorado Independent Consultants Network, LLC Adams County, Colorado Bring-Your-Own-Device Policy Prepared by: Colorado Independent Consultants Network, LLC Denver, Colorado March 20, 2014

2 Table of Contents Executive Summary... 1 Background... 2 Objective, Scope, and Procedures Performed... 2 Interviews Conducted... 3 Observations and Recommendations... 3 Appendix A- Current Draft Personal Computing Device Security Policy... 9

3 Executive Summary Like many organizations, Adams County allows employees to access County data (primarily , calendar, and contacts) through non-county owned mobile devices (mobile phones, tablets, and laptop computers). The County has mitigated associated risks of this technology through the use of a mobile device management application (MobileIron), development of a mobile device usage policy, and requirement for all employees accessing County data on mobile devices to sign an acknowledgement of the usage policy. Internal Audit performed a review of this policy, examination of the mobile device management application settings, and testing of the signed usage acknowledgement forms. Our findings and conclusions are summarized as follows: 1. BYOD policy improvement recommendations. The current BYOD policy is in draft form and has not yet been rolled out to County personnel. Within the body of our report, we recommend policy enhancements in 5 areas. Items recommended include prohibiting the storage of personally identifiable information or other sensitive data on mobile devices, and validating that County data has actually been removed from a user s device upon termination or disposal of device. Additional recommendations are noted in the body of our report. 2. Ability to bypass mobile device management. While the County has implemented mobile device management enabling the selective remote wiping of user s devices, many users are accessing Adams County data without the mobile device management application installed on their devices. Additionally, the requirement that all devices be password protected is currently in the BYOD policy, but has not been pushed out to user devices. 3. Unsigned mobile device usage acknowledgements. Although individuals accessing Adams County data on mobile devices are required to sign a form to acknowledge their acceptance of usage terms and conditions, such forms could not be located in 3 of the 5 individuals selected for testing. 4. Data Classification Policy. A key element of data security, including mobile security, is a data classification policy, which the County does not currently have. Such a policy would define handling requirements based on data sensitivity. End of Executive Summary Section Page 1 of 12

4 Background Bring your own Device (BYOD) is the increasing trend toward employee-owned devices within an organization. Smartphones are the most common example but employees are also using their own tablets and laptops in the workplace. BYOD is part of the larger trend of IT consumerization, in which consumer software and hardware are being brought into the organization. The County has created a new program for employees at the Director level and above (as well as other employees at the discretion of their Director/Elected Official) to provide a $900 stipend to purchase ipads which become the employee s personal property. The county has allowed the use of employee-owned devices including both Apple ios (iphones and ipads) and Android devices. Without the proper policy and procedures, employee-owned hardware can pose security risks to the County when they connect to the network or access County data. To minimize the risk and accommodate consumer technologies, the County has implemented a mobile device management (MDM) solution called MobileIron. MobileIron is considered to be the industry leader in MDM software solutions. MobileIron allows only authorized personal devices (smart phones and tablets) to connect to the County network. The County first started allowing personally owned devices to access network services in 2009, where employees could connect to through Outlook Active Sync, though this was not formally rolled out/communicated). Currently, users can access County , calendar, contacts, and tasks through their mobile devices. A Personal Computing Device Security policy covering all mobile devices and personal computers is currently in draft form, and MobileIron has been in place as of Q The ability to connect to the County s network through mobile devices requires acknowledgement of the BYOD policy through an employee s signature on a standardized acknowledgement form. Objective, Scope, and Procedures Performed Colorado Independent Consultants Network, LLC (CICN) was engaged to perform a review of Adams County s Personal Computing Device Security Policy (Bring-Your-Own-Device - BYOD) Policy. The objective of this review was to evaluate the existing BYOD policy for potential areas to strengthen controls while balancing the need to easily and efficiently access County resources. The scope of this audit covers evaluation of the BYOD policy as of 9/30/13.. Procedures performed during this review included the following: Review of the BYOD policy Interviews with IT personnel to understand and evaluate policy implementation, potential issues, and other factors impacting the BYOD policy. Reviewed adequacy of MobileIron software implementation (policies & settings) Page 2 of 12

5 Interviews Conducted One of the components of our review involved the interview of key process owners. We conducted interviews with the two individuals listed below: Kevin Beach, Information Technology Director Brandon Archer, Information Security Architect These interviews allowed us to understand the current process used to control the access of personal devices and the current status of the policies in place. Observations and Recommendations Specific areas for improvement are outlined in the observations that follow. Our recommendations are based on our experience in internal audit, as well as best practices in business operations. Our observations are summarized in the table below and presented in detail on the following pages. Topic of Observation Detail on Page # 1. BYOD policy improvement recommendations 4 2. Ability to bypass mobile device management 6 3. Unsigned mobile device usage acknowledgements 7 4. Development of a data classification policy 8 Page 3 of 12

6 1. BYOD policy improvement recommendations Issue: The County does not have a BYOD policy in place. A draft BYOD policy (included as Appendix A) is in the development stage. We reviewed this draft policy and noted several recommendations to strengthen the policy s effectiveness which should be included in the approved policy. Risk: Without a comprehensive policy which identifies the types of data that can be accessed, the types of devices which are allowed, and the employee personal device agreement the County may face security breaches allowing inappropriate access to restricted County data. Recommendations: To enhance the controls over the BYOD policy, we recommend the following: 1. Scope - The Policy should be applicable to all employees, consultants, contractors, vendors and any other personnel that access non-public County systems and/or data using non-county owned technology. 2. General Requirements We recommended the following: Any exception to the policy should be evidenced in writing and approved by the Directory of Information Technology. Access to the County s network data from personal devices is only allowed via approved and secure access methods (i.e. use of the County s secured employee wireless network). While this is currently included in the draft version of the policy, we are highlighting this as a recommendation, as this is an especially critical component of any BYOD policy. 3. Data Security We recommended the following: Once a data classification policy is developed (See issue #4), the BYOD policy should cross reference the data classification policy to enforce appropriate security measures based on the sensitivity of the data. Storing information that is considered personally identifiable information, credit card information, personal health information or other sensitive data on a mobile device or removable media should be prohibited. 4. Support - We recommended the County require evidence that data has been properly removed for any BYOD device before it is released from an employees possession (e.g. recycling, selling, or donating). The current policy requires the device s owner to remove County data upon termination of employment, but does not require evidence that such data has been removed. 5. Adams County Personal Device Usage Agreement - We recommended the following be included for acknowledgement by employees using a personal device (BYOD): Page 4 of 12

7 Understand and accept the terms of the County s Acceptable Use Policy. Understand that they do not have a reasonable expectation of privacy beyond those granted under Colorado statute. Agree to use a password or PIN to lock my device and set an automatic lock-out after the device has been idle (e.g. 5 minutes). Management Response: Adams County IT has developed a draft BYOD policy that incorporates the auditor s suggestions. Policy will be reviewed by IT governance for approval and adoption. Responsible Party: Kevin Beach, IT Director Completion Date: 6/1/14 Page 5 of 12

8 2. Ability to bypass mobile device management Issue: As previously stated, the County has implemented MobileIron as their mobile device management solution. While the settings of MobileIron are appropriate, including enforcement of all devices to be password protected and enabling of mobile encryption, these requirements have not been turned on, reducing the security benefits afforded by the software. Additionally, through the use of ActiveSync, a user could bypass MobileIron and connect to County without the security benefits afforded through the MobileIron application. As of 1/27/14, nearly 100 user accounts were accessing County directly through ActiveSync, rather than using the MobileIron MDM solution. While the current draft BYOD policy prohibits this, preventative controls could be enhanced. Risk: Without enforcement of established security parameters through enactment of MobileIron settings, as well as enforcing the use of the MobileIron application itself, county data could be at risk. As an example, while the BYOD policy requires all devices to be password protected, this is not enforced through the MobileIron technology. County s containing sensitive data (such as Personally Identifiable Information (PII), HR/legal information, etc.) could be stored on an unprotected mobile device. If this device were to be lost or stolen, the integrity of this data would be compromised. Recommendations: The County should activate current MobileIron settings, pushing established requirements to user devices. Additionally, the ability to access County data through ActiveSync should be disabled, requiring users to install the MobileIron application on their devices in order to access this data. Management Response: All approved personal devices will be migrated to MobileIron Mobile Device Management (MDM) and direct access to will be disallowed. Current MobileIron settings will be activated as recommended. Responsible Party: Kevin Beach, IT Director Completion Date: 4/1/14 Page 6 of 12

9 3. Unsigned mobile device usage acknowledgements Issue: The current version of the draft personal computing device security policy states: Personal computing devices must be authorized by management order to access/store Adams County data. In practice, the County is requiring users of mobile devices accessing Adams County data to sign an acknowledgement form agreeing to the terms of mobile device usage. Authorizations from an employee s Manager are not required in practice. In 3 of the 5 users selected for testing, IT was not able to produce the acknowledgement form or provide any documentation in support of the user s acknowledgement of terms. It is unclear whether such acknowledgement was misplaced or never attained. Risk: The mobile device usage acknowledgement form serves to remind the end user of the security requirements around accessing Adams County data from a personal mobile device. This form also serves to avoid potential litigation surrounding the wiping of an employee s personal data from their personal mobile device. Absent signed acknowledgement forms, the County risks greater non-compliance with the mobile device usage policy and potential litigation. Recommendations: The County should ensure all employees accessing Adams County data on mobile devices have signed the Adams County Personal Device Usage Agreement and that this document is retained in a common location accessible to IT personnel. The current draft personal computing device security policy language should be revised to require acknowledgement of the policy rather than managerial approval of mobile device users if this is the County s intent. Management Response: All future agreement forms will be stored in edocs as well as the Helpdesk account to ensure that IT is able to retrieve signed forms. An audit will be performed by IT to ensure that all personal device users have returned signed agreement forms. Responsible Party: Kevin Beach, IT Director Completion Date: 6/1/14 Page 7 of 12

10 4. Development of a data classification policy Issue: A key element of data security, including mobile security, is a data classification policy, which the County does not currently have. Risk: Data elements carry varying levels of risk, depending on their sensitivity. For example, an employee s disciplinary record or legal advice provided under attorney-client privilege would be considered highly sensitive data. In contrast, the County s audited financial statements, which are posted on the public facing web site, would not be considered sensitive, as they are a matter of public record. Absent a policy to clearly highlight sensitive data elements and the expected treatment of this data, employees and vendors are left to their own judgment as to what would be considered sensitive and how such sensitive data should be handled. Individual employee judgment may be incongruent with expectations of County Management. Measures to protect data considered sensitive may be inadequate, if they exist at all. Recommendations: The County should develop a Data Classification Policy that defines handling requirements for data based on their sensitivity. The policy may contain both general guidelines applicable County-wide, as well as department specific guidelines. Common classification levels should be developed with associated minimum security parameters. Illustrative examples of data types should be included in the policy. Management Response: Although we agree Data Classification would be a worthwhile endeavor, IT has checked with three of the larger Colorado counties, Arapahoe, Douglas and Jefferson and none of them have gone down this path. We will submit a budgetary request in the 2015 budget for this project. Responsible Party: Kevin Beach, IT Director Completion Date: 12/31/14 (For submission of budgetary request) Page 8 of 12

11 Appendix A- Current Draft Personal Computing Device Security Policy Personal Computing Device Security Policy (BYOD) Purpose The purpose of this policy is to document the minimum security requirements and management decisions regarding the use of personal computing devices used to transmit, access, and/or store Adams County data. Scope All personal computing devices used to access Adams County data must comply with this policy and all applicable Adams County security policies, standards, and processes. For the purposes of this policy personal computing devices are divided into two categories: 1) personal computers including desktops and laptops and 2) personal mobile devices such as smartphones, PDAs, and tablet computers which do not run a workstation-grade operating system. Personal devices that only access and/or store County data that is generally available to the public (such as on the Adams County website) are exempt from this policy. This policy does not supersede any other laws, or regulations. Authorization Personal computing devices must be authorized by management order to access/store Adams County data. General Requirements At management s discretion, employees may use personal computing devices to access County data providing that the following requirements are met: Failure to comply with this policy may result in termination of service to the personal device. Authorization 1. User has signed the Adams County Personal Device Agreement form and returned to IT 2. The user s manager has authorized the use of the personal device(s) by ing the IT helpdesk Page 9 of 12

12 Network Access 3. Access from personal devices is only allowed via approved access methods as defined by the IT department (e.g. Citrix). 4. Users are prohibited from connecting personal devices directly to the Adams County Network. 5. Users may use their personal home wireless networks only if the network is secured using WPA or WPA2 and a strong passphrase. A strong passphrase is one that is at least 8 characters long and includes a combination of upper case and lower case letters, numbers and symbols. Open unencrypted networks and WEP encrypted networks are prohibited. 6. Open public wireless hotspots (e.g. Hotels, Coffee Shops) should be avoided whenever possible. If an unsecured public network must be used, users must use IT approved secure protocols to access County data (e.g. Citrix). Personal Device Security 7. Device owners are responsible for taking measures to protect County data on their personal devices. Examples of recommended security controls include : Workstations and laptops: Anti-malware software, personal firewall, disk encryption, account passwords, password protected screen saver, creation of separate accounts for work & personal use, and limiting the use of administrative rights on the device. Mobile devices such as smartphones and tablets: Password or PIN to unlock the device, device encryption, and automatic lock after idle period (e.g. 5 minutes). 8. Device owners are required to ensure that all vendor security updates are applied within 30 days of release 9. Lost/Stolen devices must be reported to IT no more than 24 hours after discovered lost/stolen. Page 10 of 12

13 Data Security 10. Storing sensitive and/or non-public County ;data on personal external cloud services (e.g DropBox, Google Drive, Evernote, etc.) is prohibited unless part of a management approved initiative 11. Storing County data on external storage (e.g. SD card, USB thumbdrive, external harddrive, etc.) is prohibited unless encrypted 12. The device user must protect County data from unauthorized access or disclosure and will notify Adams County management immediately if data is suspected to have been lost or compromised 13. Adams County reserves the right to erase all data from personal devices used for County business Support 14. IT staff may only provide limited assistance for personally owned devices and will not be able to assist with problems unrelated to County business. 15. The owner of the device is responsible for securely erasing all County data from the device before releasing the device from their possession (e.g. recycling, selling, or donating). Page 11 of 12

14 Personal Mobile Devices Requirements The requirements below are additional requirements for personal mobile devices such as smartphones, and tablets. 1. Mobile devices may access and/or store County data only where managed by an IT approved mobile device management (MDM) solution (MobileIron) 2. Where will be accessed from the device, support for Microsoft ActiveSync is required 3. Mobile device must support device level encryption 4. Devices must be wiped of any County data in the event of employee termination, or suspension 5. Users must not attempt to circumvent or disable any security controls applied to the device while the device contains County data. 6. The owner of the device is responsible for backing up all personal items (including but not limited to: photos, videos, music, contacts, paid apps, and notes). Adams County is not responsible for the loss of any personal data and/or applications and will not reimburse the cost to recover personal data. 7. Security policies may be pushed to my device (such as a personal identification number (PIN), or encryption) at the County s discretion as long as County data is stored on the device. 8. The County may collect information about the device for support reasons. Information collection may include but is not limited to: device model, software/firmware versions, network information, and installed applications. 9. Devices that have been intentionally compromised e.g. jailbroken or rooted to modify or replace the manufacturer s software/firmware on the device will not be allowed to access or store County data. Page 12 of 12

Consumer Device Policy (Smartphones / Tablets) BYOD (Bring Your Own Device)

Consumer Device Policy (Smartphones / Tablets) BYOD (Bring Your Own Device) Consumer Device Policy (Smartphones / Tablets) BYOD (Bring Your Own Device) Policy Number: 422 Supersedes: - Standards For Healthcare Services No/s 1, 5, 19 New Version Date Of Reviewer Completed Date

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be

More information

BYOD Policy for [AGENCY]

BYOD Policy for [AGENCY] BYOD Policy for [AGENCY] This document provides policies, standards, and rules of behavior for the use of smartphones, tablets and/or other devices ( Device ) owned by [AGENCY] employees personally (herein

More information

Washwood Heath Academy Use by staff of private communication devices policy

Washwood Heath Academy Use by staff of private communication devices policy As a learning community, Washwood Heath Academy wants all staff and students to be able to be safe users of ICT and all data storage. The development of responsible, independent users is a prime aim of

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

[BRING YOUR OWN DEVICE POLICY]

[BRING YOUR OWN DEVICE POLICY] 2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices 8-27-2015 4-007.1 Supersedes 4-007 Page Of 1 5 Responsible Authority Vice Provost for Information

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

Southwest Airlines 2013 Terms of Use Portable Devices Feb 2013

Southwest Airlines 2013 Terms of Use Portable Devices Feb 2013 1 TERMS OF USE As of February 3, 2013 The following terms and conditions of use ( Terms of Use ) form a legally binding agreement between you (an entity or person) and Southwest Airlines Co. ( Southwest

More information

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Inside ü Tips for deploying or expanding BYOD programs while remaining

More information

EXECUTIVE DECISION NOTICE. ICT, Communications and Media. Councillor John Taylor. Deputy Executive Leader

EXECUTIVE DECISION NOTICE. ICT, Communications and Media. Councillor John Taylor. Deputy Executive Leader EXECUTIVE DECISION NOTICE SERVICE AREA: SUBJECT MATTER: DECISION: DECISION TAKER(S): DESIGNATION OF DECISION TAKER(S): GOVERNANCE ICT, Communications and Media PERSONAL DEVICE POLICY That the Personal

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

trends and audit considerations

trends and audit considerations Bring your own device (BYOD) trends and audit considerations SIFMA IT audit session 4 October 2012 Disclaimer Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited,

More information

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. Alan Ferretti CJIS Information Security Officer Texas Department of Public Safety CJIS Security Policy version 5.2: On 8/9/2013

More information

OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT. County of San Diego Auditor and Controller

OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT. County of San Diego Auditor and Controller County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA,

More information

MINNESOTA STATE STANDARD

MINNESOTA STATE STANDARD Version: 1.00 Approved Date: 4/29/2011 Approval: Signature on file MINNESOTA STATE STANDARD From the Office of Carolyn Parnell Chief Information Officer, State of Minnesota Enterprise Security Portable

More information

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device)

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

Mobile Security Standard

Mobile Security Standard Mobile Security Standard Title Mobile Security Standard Mobile Device Security Category Version: 18/07/2013 PUBLISHED Author:, IT Services Contact: itsecurity@contacts.bham.ac.uk Mobile Security Standard

More information

Tuesday, June 5, 12. Mobile Device Usage

Tuesday, June 5, 12. Mobile Device Usage Mobile Device Usage Remeber This? The original, live presentation included the embedded video below: http://www.youtube.com/watch?v=bo-nft2mohi A Changing Industry Proliferation of Smart Phones and Tablets.

More information

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work FEATURED FACULTY: Amy F. Melican, Associate, Proskauer 212.969.3641 AMelican@proskauer.com Traci Clements, Attorney,

More information

HELPFUL TIPS: MOBILE DEVICE SECURITY

HELPFUL TIPS: MOBILE DEVICE SECURITY HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information

More information

Securing BYOD With Network Access Control, a Case Study

Securing BYOD With Network Access Control, a Case Study Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device

More information

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Data Protection Safeguards Page 1 Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Purpose: The purpose of the Data Protection Safeguards is to provide guidelines for the appropriate

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Securing end-user mobile devices in the enterprise

Securing end-user mobile devices in the enterprise IBM Global Technology Services Thought Leadership White Paper January 2012 Securing end-user mobile devices in the enterprise Develop an enforceable mobile security policy and practices for safer corporate

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

A Guide to MAM and Planning for BYOD Security in the Enterprise

A Guide to MAM and Planning for BYOD Security in the Enterprise A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy Bring Your Own Device (BYOD) Policy Document History Document Reference: Document Purpose: Date Approved: Approving Committee: To set out the technical capabilities of the chosen security solution Airwatch

More information

Enterprise Mobility as a Service

Enterprise Mobility as a Service Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...

More information

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are

More information

IT TECHNOLOGY ACCESS POLICY

IT TECHNOLOGY ACCESS POLICY IT TECHNOLOGY ACCESS POLICY Effective Date May 19, 2016 Cross- Reference 1. IT Access Control and User Access Management Policy Responsibility Director, Information 2. IT Acceptable Use Policy Technology

More information

Montclair State University. HIPAA Security Policy

Montclair State University. HIPAA Security Policy Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that

More information

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Employee Teleworking Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Introduction... 2 2. Teleworking Risks... 3 3. Safeguards for College

More information

Data Security in a Mobile, Cloud-Based World

Data Security in a Mobile, Cloud-Based World Data Security in a Mobile, Cloud-Based World Jacob Buckley-Fortin CEO ehana What we ll cover Trends Risks Recommendations 1 Trends Mobile Has Taken Over Trend #1 2 3 450 million users worldwide Adopted

More information

Don t Let A Security Breach Put You Out of Business

Don t Let A Security Breach Put You Out of Business Don t Let A Security Breach Put You Out of Business Committed to providing you with the most innovative security and privacy solutions. www.boomtechit.com Bring Your Own Device (BYOD) and Mobile Device

More information

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 What are You Trying to Protect? If someone got into your email, what

More information

Corporate Mobile Policy Template

Corporate Mobile Policy Template Updated July 2011 Three major changes have occurred over the past 18 months that require updates to your organization s mobile policy. These changes include widespread adoption of tablet devices, changes

More information

Windows Phone 8.1 Mobile Device Management Overview

Windows Phone 8.1 Mobile Device Management Overview Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are

More information

The Maximum Security Marriage:

The Maximum Security Marriage: The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according

More information

Bring Your Own Device (BYOD) and Mobile Device Management

Bring Your Own Device (BYOD) and Mobile Device Management Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect

More information

Human Subject Research: HIPAA Privacy and Security. Human Research Academy 101

Human Subject Research: HIPAA Privacy and Security. Human Research Academy 101 Human Subject Research: HIPAA Privacy and Security Human Research Academy 101 Your Enterprise Privacy Officer Christine Adams, CHC, CHPC Enterprise Privacy Officer Compliance & Enterprise Risk Management

More information

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution. Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

Workplace-as-a-Service BYOD Management

Workplace-as-a-Service BYOD Management For companies with people in them Workplace-as-a-Service BYOD Management Solution Overview The BYOD Management solution provides customers with IT tools and services to deploy a Workplace-as-a-Service

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy Page 1 of 10 Contents 1 Preamble...3 2 Purpose...3 3 Scope...3 4 Roles and responsibilities...3

More information

Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation

Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation The Central Florida Chapter of The Florida Government Finance Officers Association 2/7/2014 K. Adam Glover,

More information

Mobile Device Manager. Windows User Guide (Windows Phone 8/RT)

Mobile Device Manager. Windows User Guide (Windows Phone 8/RT) Mobile Device Manager Windows User Guide (Windows Phone 8/RT) Document Revision Date: Oct. 22, 2014 Mobile Device Manager Windows Phone 8 User Guide i Contents Windows Phone 8 Features Matrix... 1 Overview...

More information

Mobile Devices in Healthcare: Managing Risk. June 2012

Mobile Devices in Healthcare: Managing Risk. June 2012 Mobile Devices in Healthcare: Managing Risk June 2012 1 Table of Contents Introduction 3 Mobile Device Risks 4 Managing Risks and Complexities 5 Emerging Solutions 7 Conclusion 7 References 8 About the

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER WHITE PAPER 2 Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them Business success is highly

More information

BYOD Policy Implementation Guide. February 2016 March 2016

BYOD Policy Implementation Guide. February 2016 March 2016 BYOD Policy Implementation Guide February 2016 March 2016 Table of Contents Step One: Evaluate Devices... 3 Step Two: Refine Network Accessibility... 4 Step Three: Determine Appropriate Management Policies...

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

My CEO wants an ipad now what? Mobile Security for the Enterprise

My CEO wants an ipad now what? Mobile Security for the Enterprise My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager

More information

Use of Mobile Apps in the Workplace:

Use of Mobile Apps in the Workplace: Use of Mobile Apps in the Workplace: PRIVACY & SECURITY ADAM D.H. GRANT AGRANT@ALPERTBARR.COM Cell Phone & Tablet Ownership 91% of American adults own a cell phone 56% have smartphones Of Americans aged

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

Sample Mobile Device Security Policy

Sample Mobile Device Security Policy Sample Mobile Device Security Policy Using this policy One of the challenges facing IT departments today is securing both privately owned and corporate mobile devices, such as smartphones and tablet computers.

More information

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere

More information

SAO Remote Access POLICY

SAO Remote Access POLICY SAO Remote Access POLICY Contents PURPOSE... 4 SCOPE... 4 POLICY... 4 AUTHORIZATION... 4 PERMITTED FORMS OF REMOTE ACCESS... 5 REMOTE ACCESS USER DEVICES... 5 OPTION ONE: SAO-OWNED PC... 5 OPTION TWO:

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for

More information

Information Governance Officer 01427 676652 Steve.anderson@west-lindsey.gov.uk

Information Governance Officer 01427 676652 Steve.anderson@west-lindsey.gov.uk B CPR.32 15/16 Corporate Policy and Resources Committee Date: 10 November 2015 Subject: Bring Your Own Device Policy Report by: Director of Resources Contact Officer: Purpose / Summary: Steve Anderson

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT

More information

Mobile Device Deployments-The Security Dangers of Technology on the Go

Mobile Device Deployments-The Security Dangers of Technology on the Go Mobile Device Deployments-The Security Dangers of Technology on the Go Presented by Mark Bell, PMP, CISSP, CISA, CHSS OM03 Friday, 10/25/2013 3:45 PM - 5:00 PM Mobile Device Deployments Is Your Organization

More information

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida 2015 SCCE Compliance & Ethics Institute Wednesday, October 7, 2015 (10:00 11:45) Session W14 Bring Your Own Device(BYOD) They are here and they are not going away. Understanding the benefits, risks, and

More information

Bring Your Own Device Acceptable Use Policy

Bring Your Own Device Acceptable Use Policy Bring Your Own Device Acceptable Use Policy Released On Author(s) Reviewed By Version and Date Master Document Index Number Protective Marking Irene Docherty v 1.3, 08/01/14 IS-WC-POL-0001 unclassified

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

POLICIES. Campus Data Security Policy. Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central.

POLICIES. Campus Data Security Policy. Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central. POLICIES Campus Data Security Policy Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central Policy Statement Policy In the course of its operations, Minot State University

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones

More information

This policy outlines different requirements for the use of PSDs based on the classification of information.

This policy outlines different requirements for the use of PSDs based on the classification of information. POLICY OFFICE OF THE INFORMATION COMMISSIONER Use of portable storage devices 1. Purpose A Portable Storage Device (PSD) is a mobile device capable of storing and transferring digital information. Examples

More information

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees

More information

School of Nursing Research Seminar. Data Security in The Academic Health Center. Presented By Jon Harper AHC Information Systems

School of Nursing Research Seminar. Data Security in The Academic Health Center. Presented By Jon Harper AHC Information Systems School of Nursing Research Seminar Data Security in The Academic Health Center Presented By Jon Harper AHC Information Systems 1 Overview of AHC-IS and Supported Services Provide desktop support to ~8500+

More information

Addressing NIST and DOD Requirements for Mobile Device Management

Addressing NIST and DOD Requirements for Mobile Device Management Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW

More information

BYOD. opos WHAT IS YOUR POLICY? SUMMARY

BYOD. opos WHAT IS YOUR POLICY? SUMMARY BYOD WHAT IS YOUR POLICY? opos SUMMARY The organization s employees and contractors frequently perform employment-related tasks which require connecting to the organization s networks, systems, and/or

More information

BYOD BEST PRACTICES GUIDE

BYOD BEST PRACTICES GUIDE BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create

More information

Mobile First Government

Mobile First Government Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,

More information

Windows Phone 8.1 in the Enterprise

Windows Phone 8.1 in the Enterprise Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows

More information

Mobile Device Usage and Agreement Policy

Mobile Device Usage and Agreement Policy Page 1 of 10 1.0 Introduction Mobile Device Usage and Agreement Policy The State of Minnesota provides several electronic tools for employees whose job performance requires or would be enhanced by their

More information

BYOD Strategies: Chapter I

BYOD Strategies: Chapter I Building Bring-Your-Own-Device (BYOD) Strategies This is the first part in a series designed to help organizations develop their BYOD (bring-your-own-device) strategies for personally-owned smartphones

More information

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Guidelines. I. Purpose. A. Ownership and Responsibilities

Guidelines. I. Purpose. A. Ownership and Responsibilities MDM Guidelines I. Purpose The purpose of these guidelines is to establish mobile device management standards for securing college owned mobile devices. College owned devices are defined as any smart device

More information

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them Mobile Security Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for

More information

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Top. Reasons Federal Government Agencies Select kiteworks by Accellion Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government

More information

Authorized. User Agreement

Authorized. User Agreement Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION

More information

UNC School of Dentistry Personally-Owned Computing Device Policy (BYOD)

UNC School of Dentistry Personally-Owned Computing Device Policy (BYOD) UNC School of Dentistry Personally-Owned Computing Device Policy (BYOD) Purpose of Policy Introduction To establish how SoD faculty, staff and students will use and access the dental school s information

More information