BYOD: Bring Your Own Policy. Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works.
|
|
- Lee Holland
- 8 years ago
- Views:
Transcription
1 BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works.
2 BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works. Employees using consumer devices to access their organization s information has become the norm, a trend the public sector should note. The austerity pressures being placed on local authorities will provide a fertile environment for the growth of BYOD. By allowing employees to use their own devices to access corporate resources, public sector organizations can make savings on capital expenditure as well as ensuring that workers are more productive. Maintenance costs would fall significantly as employees regularly update their own devices, providing organizations with more advanced technology at no expenses to the organization. The major concern for IT departments is how they can enable BYOD while maintaining control of the information users are accessing. A significant amount of the information that will be accessed is of a sensitive nature so it is vital that organizations fully understand the regulatory processes and technical controls that need to be put in place. This is all on the backdrop of recent high profile announcements from public sector organizations, such as the Metropolitan Police Service who have lost or had stolen 809 devices and the BBC who lost 785 devices at a cost of 750,000. 2
3 The productivity benefits of BYOD BYOD can bring a number of real benefits to public sector organizations. Employees will be able to access information at any time and from anywhere, using devices they are familiar with. In order to avoid these benefits being negated, it is crucial that the public sector thinks about how it will expose its services to BYOD. In the private sector BYOD has reached a tipping point and evidence suggests that the public sector will follow suit. Now is the time for public sector organizations to implement the required controls that permit the use of personal devices within the workplace to manage and control the use of personal devices in the workplace. These controls have not been implemented and as a consequence there have been a number of highly publicized security incidents. There are a myriad number of devices that do not belong to the organization and yet they hold sensitive information without any controls in place. These organizations are unaware of such issues and therefore cannot determine the extent of any potential information loss, should these devices fall into the wrong hands. As Public sector organizations have already implement physical controls that prohibit the use of any employee USB memory sticks. These are more controlled and are password protected and encrypted and only permit employees to use these types of USB memory sticks. These memory sticks are not readily available to everyone within the organization and employees find ways to circumvent the controls that are in place so they can take their work home. On the whole, this is not for malicious gain but simply a fact of life. Employees are now working longer and harder as employers place more and more demands on employees to do more work with less resources. This presents a significant risk for the public sector as dropbox, services and other file-sharing services are not located in the UK, and some are not located within Europe. This means confidential information is being placed on file-sharing services and external services that are not protected by UK law, and more importantly the security controls, such as password policies that support these services are not as stringent as those that are implemented within the Public Sector. There are a number of documented cases, where information loss has been reported to the Information Commissioners Office (ICO) and public sector organizations have been fined. An example of this was Greater Manchester Police, who were fined 120,000. Once the information leaves the organization there is no control over who, what and how that information is being used. Information on an uncontrolled device, is like information that has been printed on paper. i.e. Once printed it becomes un controlled. If an employer does not know where the information is located, such as dropbox, external services or on the employees personal devices how they can retract the information when a given employee leaves the business. As an employer can I erase the ex-employees personal device once they leave the business? These are some of the many challenges organizations are facing today. Employers need to ask the simple questions: How do I allow my employees to work smarter and not harder, and at the same time not lose control of the information within the organization. Can I afford not to implement the appropriate controls and technology within my organization that does not expose the organization to fines being imposed by the ICO and at the same time allow the employees to work securely. Therefore it is critical the public sector finds a balance that permits employees access to technology such as the use of their own mobile devices, in a secure manner that is not intrusive but also protects the information assets within the organization. How do I allow my employees to work smarter and not harder, and at the same time not lose control of the information within the organization. 3
4 How can public sector bodies adopt BYOD securely? A balanced approach to BYOD is required. How securely BYOD is adopted depends entirely upon the risk appetite of the organization. There are a number of options that are open to the public sector such as the extent to which the employee can use their own device, who can access it and whether the information will be encrypted. Adopting a more intrusive stance will make it more difficult for employee to work on their personal devices, whereas the adoption of a relaxed approach will leave the organization open to security threats and lose of data. Overall, it will be organizations Senior Information Risk Owner (SIRO) responsibility and their risk appetite by balancing the benefits against the information assets and the level of technical controls that need to be put in place. When they are thinking about adopting BYOD, right at the very top of the list should be overall policy. Considerable amount of thought is required when it comes to deciding what the content of the policy will be and the impact this will have upon the employees within the organization there are many vendors that provide solutions in this space. Once this has been achieved then the underlying technology vendor should be selected. It will be necessary to involve many key areas of the organization, from Human Resources, Legal, IT and Security. The technology choice of what vendor to be used isn t trivial, as many of the vendors offer similar functionality. Overall the policy definition will take far more time that which solution to select. Organizations must remain in control of their information regardless of the device that is being used to access it. For this reason it is crucial that public sector bodies clearly define the boundaries within which users can access information and what devices they can access this information on. 4
5 The technical solutions available to combat BYOD security threats Any personal device should at the very least be registered to the organization. Registration allows the organization to identify which devices are being used to access its information and allow decisions to made regarding the levels of policy enforcement that are to be applied for the devices that are being used. One such way of enforcing this is to use Mobile Device Management (MDM) will provide the technical enforcement of the organizations BYOD policy. Without MDM there is no enforcement and BYOD almost becomes a free for all. The extent to which MDM controls the use of personal devices is entirely dependent upon the organization. It can vary from no control to full control. For those that find the correct balance, there will be a BYOD deployment that will not only allow users access to organizational information, but ensure the users are allowed to use their own devices. It will enable employees to work from any place at any time, allowing a greater flexible approach to how they work. No users should be able to access information from any BYOD device without signing up to the organization s acceptable usage policy. This is the agreement between the organization and the user and clearly defines the responsibilities of the employee when using their device. Once more the level of control comes down to the individual organization. It may be that the organization restricts the level of access based upon the device type, the ability to enforce policy upon the types of devices, and if the user has agreed to the usage policy. All information stored (data at rest) on the device must be encrypted within the restrictions of the companies encryption/ cryptography policy. It is critical that BYOD policy recognizes the need to encrypt all information on any device used by employees. 5
6 What can be done? It is un-realistic to expect the CIO or any organization to keep up with the speed of technological and commercial changes that sees new devices enter the market on an almost daily basis. The budgetary constraints that CIOs are operating within have left them between a rock and a hard place. On one hand they need to appease staff wanting to use the latest devices that will help them do their job more efficiently, while on the other hand they need to ensure information remain secure and does not violate any data privacy policies. Inevitably people will choose to use their own, higher performance device to access corporate systems and they will adopt to use the simplest mechanism which allows to them to continue working away from the office. This sometimes leads to the temptation in transfer confidential information to their own personal systems, which they access from their own personal devices which is a breach of the security policies the organization has in place. Organization should allow employees to use a single device for both personal and work use. There is no infringements of the employee s use of their personal device, such as disabling applications or erasing information, due to the device being split into the two distinct (ring-fenced) areas. The ring-fenced area of a device should be controlled by the organization and the end user should only be able to use applications in the ring-fenced area that have been downloaded via the approved enterprise application stores. To prevent information leakage, copying and pasting of information between the two areas of the device are not be permitted, meaning that a common problem such as the loss or theft of a device need, is no longer an issue. The organization will have total control of the sensitive information in the organization owned area and information can be wiped if necessary, removing the risk of the information being made widely available. In this case, ring-fencing information is the best approach to handling the growth of BYOD. By taking an open minded, positive approach to the issue, the public sector can be seen by its employees as taking a proactive approach to addressing how an employee can use their own mobile device. This approach will give employees the flexibility that they can use their own device to access organization information. As a direct consequence of this proactive approach it lowers the IT costs for IT departments, increase productivity of employees and more importantly removes the risk of information leakage. 6
7 Why public sector bodies must take the lead on BYOD policy BYOD is not just a trend that the public sector can afford to ignore. The reality is simple. BYOD has already played a big role in the enterprise and the public sector should embrace it by adopting BYOD securely at the same time as maximizing the benefits that it provides. Advice from security experts must be sought if organizations are not familiar with the types of controls that need to be enforced. It is crucial that BYOD is initiated from the top down in order for the public sector to maintain control over its information. Currently personal devices are not permitted to consume PSN services. PSN sets a baseline impact level of IL2, therefore by design; personal devices are prohibited as they operate at an IL0 level. If they are to be integrated in the public sector, the SIRO should understand the risks and how these risks can be mitigated with process, policies and technology. Once this is understood they should work with organizations that leverage the knowledge of CLAS consultants who fully understands Information Assurance and have practical experiences in the implementing this across an organization. This will provide the SIRO the confidence they need, in that a secure solution can be devised that allows personal devices to be used in a secure manner at IL2. This does not mean that efforts should not be undertaken to change this and PSN providers are working with the Cabinet Office to formulate a policy for the use of BYOD within the PSN. BYOD must happen by design, not trial and error The public sector must accept that personal devices are already being used today in an insecure fashion. Ignoring BYOD will only push employees to find ways around security barriers, putting public sector bodies and the information they have access to at further risk. If organizations take a haphazard, trial and error approach to BYOD, they will put their information at risk and fail to harness the advantages that BYOD can bring. The policies must be clear and precise, educating end-users and organizations aware of their responsibilities and what they can and cannot do on their own devices. By accepting BYOD as a reality, the public sector will be able to control BYOD and implement it securely. The public sector must not be scared by the inherent risks posed by BYOD but recognize, assess and develop appropriate policies followed by implementation. By acting swiftly PSN can ensure BYOD enhances the public sector as opposed to threatening it. 7
8 About Unify Unify is one of the world s leading communications software and services firms, providing integrated communications solutions for approximately 75 percent of the Fortune Global 500. Our solutions unify multiple networks, devices and applications into one easy-to-use platform that allows teams to engage in rich and meaningful conversations. The result is a transformation of how the enterprise communicates and collaborates that amplifies collective effort, energizes the business, and enhances business performance. Unify has a strong heritage of product reliability, innovation, open standards and security. unify.com Copyright Unify GmbH & Co. KG, 2015 Hofmannstr. 63, D Munich, Germany All rights reserved. The information provided in this document contains merely general descriptions or characteristics of performance which in case of actual use do not always apply as described or which may change as a result of further development of the products. An obligation to provide the respective characteristics shall only exist if expressly agreed in the terms of contract. Availability and technical specifications are subject to change without notice. Unify, OpenScape, OpenStage and HiPath are registered trademarks of Unify GmbH & Co. KG. All other company, brand, product and service names are trademarks or registered trademarks of their respective holders.
OpenScape Business V1 OpenScape Office V3
OpenScape Business V1 OpenScape Office V3 How To Desktop Dialing Version 1.3 Table of Contents 1. Preface 3 2. UC Suite 3 2.1. Desktop Dialing 4 2.1.1. Dependencies 4 2.2. Clipboard Dialing 4 2.2.1. Dependencies
More informationWelcome to the era of the anywhere worker
Welcome to the era of the anywhere worker Today s anywhere worker is more responsive, more productive and more mobile than ever before. Don t just add mobile. Be mobile. Real-time conversations are happening
More informationYour Voice is Critical. OpenScape Enterprise voice solutions gives power to voice
Your Voice is Critical OpenScape Enterprise voice solutions gives power to voice High quality reliable voice is business critical Conversations involve real-time engagement across multiple communication
More informationYour Voice is Critical. OpenScape Enterprise voice solutions gives power to voice
Your Voice is Critical OpenScape Enterprise voice solutions gives power to voice High quality reliable voice is business critical Conversations involve real-time engagement across multiple communication
More informationOpenScape Business V2
OpenScape Business V2 How To: SIP trunk Configuration for CLIP no Screening Version 1.0 Definitions HowTo An OpenScape Business HowTo describes the configuration of an OpenScape Business feature within
More informationEnterprise Licensing Agreement
Enterprise Licensing Agreement Here at Unify we believe that selecting and purchasing the right communications solution for your business should be simple. So we ve created the Unify Enterprise Licensing
More informationThe all-in-one Unified Communications solution for SMBs.
OpenScape Business The all-in-one Unified Communications solution for SMBs. Improve your performance and take your business to the next level with Unified Communications. Amplifying opportunities The success
More informationOpenScape Business V1. Tutorial SIP Endpoint Configuration - OpenScape Desk Phone IP / OpenStage SIP Version 1.2
OpenScape Business V1 Tutorial SIP Endpoint Configuration - OpenScape Desk Phone IP / OpenStage SIP Version 1.2 About Unify Unify is one of the world s leading communications software and services firms,
More informationOpenScape Contact Center Agile & Enterprise. Customer Service Made Simple.
OpenScape Contact Center Agile & Enterprise Customer Service Made Simple. Serving your Customers, Building your Business. It could be your greatest asset, or your biggest weakness. Is your contact center
More informationOpenScape UC Application
OpenScape UC Application A better way to communicate How productive are your virtual teams? Today s reality - A mobile, global, distributed and virtual workforce. But face-to-face just isn t always possible.
More informationSuccess Story. Managed communication services bring Solvay 30% cost savings and greater freedoms for its workforce
Success Story Managed communication services bring Solvay 30% cost savings and greater freedoms for its workforce By committing to a managed services agreement with Unify chemical group Solvay has centralized
More informationTime critical responses right here
Time critical responses right here Public safety, emergency medical services, utilities and air traffic control. Your dispatchers are being asked to make instant decisions every minute of the day. Nowhere
More informationOpenScape Business V2
OpenScape Business V2 Tutorial VoIP Interfaces Version 1.0 Definitions HowTo An OpenScape Business HowTo describes the configuration of an OpenScape Business feature within the OpenScape Business administration.
More informationPortfolio Journey OpenScape 4000
Portfolio Journey OpenScape 4000 You ve seen all the changes in communications over the last decade. One solution is there every step of the way, adapting, changing, and evolving. Making sure your business
More informationOpenScape Enterprise Express
OpenScape Enterprise Express Unified business for mid-sized companies. OpenScape Enterprise Express for mid-sized companies Now, mid-sized companies can move faster than ever to gain the competitive advantage
More informationOpenScape Web Collaboration
OpenScape Web Collaboration The quickest and easiest way to collaborate, share and support online Performance-boosting collaboration and secure support from anywhere Issues raised, ideas shared and decisions
More informationOpenScape Web Collaboration
OpenScape Web Collaboration The quickest and easiest way to collaborate, share and support online Performance-boosting collaboration and secure support from anywhere Issues raised, ideas shared and decisions
More informationHospitals without walls. Care without boundaries?
Hospitals without walls. Care without boundaries? Patient safety. Audit trails. Clinical governance. Efficiency. Cost reduction and collaboration. In partnership, Hospedia empowers Unify OpenScape through
More informationResults from Enterprise Connect 2013. Business starts with a conversation, and we re changing the conversation.
Results from Enterprise Connect 2013 Business starts with a conversation, and we re changing the conversation. RFP: UC Without Buying a New PBX Siemens Enterprise Communications (now Unify) and OpenScape
More information10 Top Tips for Data Protection in the New Workplace
10 Top Tips for Data Protection in the New Workplace Balancing Workplace Security with Workforce Productivity One of the key things that keeps CIOs awake at night, is worrying about the loss or leakage
More informationOpenScape Video and Room Systems
OpenScape Video and Room Systems White Paper By Patrick Kleiner and Ines Zengerle-Kremer Global Product Management OpenScape Video May 2012 OpenScape Video and Room Systems Executive summary Video is now
More informationMobility for Healthcare
Mobility for Healthcare Fully connected to patient records and emergency protocols at the point of care, today s healthcare professionals are more informed, more responsive and more collaborative than
More informationBell Mobile Device Management (MDM)
Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to
More informationOpenScape Contact Center Campaign Director. Creating Profitable Customer Experiences
OpenScape Contact Center Campaign Director Creating Profitable Customer Experiences From responsive to proactive customer care Customers are the core of your business. So why would you wait for them to
More informationFacts. 2014 2. Edition
Facts 2014 2. Edition Business relationships start with a conversation. And we re changing the conversation. 2 3 Dean Douglas CEO Looking forward Welcome to a unified world. On October 15, 2013, we became
More informationYour Company Data, Their Personal Device What Could Go Wrong?
Your Company Data, Their Personal Device What Could Go Wrong? Top 5 Myths about Mobile Security By Barbara Hudson, Senior Product Marketing Manager Employee use of smartphones and tablets to access corporate
More informationExternal Communication to Third Parties
External Communication to Third Parties Egress Software Technologies Ltd Unit 16 Quadrant Business Center, 135 Salusbury Road, London, NW6 6RJ T: +44 (0)20 7624 8500 / F: +44 (0)20 7624 8200 / E: info@egress.com
More informationAccelerate with OpenScape Office
Accelerate with OpenScape Office Take your business to the next level with Unified Communications and Collaboration. Our UCC solutions can help your business - no matter how big or small get more done
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
More informationBring Your Own Device and Expense Management
Bring Your Own Device and Expense Management A Telesoft Whitepaper Table of Contents About this Whitepaper... 3 Essential Elements for BYOD Policy... 4 Capabilities Needed to Manage BYOD and Expense Management...
More information5 Things You Need to Know About ipad in the Enterprise
5 Things You Need to Know About ipad in the Enterprise Introduction Without a doubt, ipads are one of the fastest adopted computing platforms in history. And, not just for consumers desiring to play Angry
More informationOpenScape Business V1
OpenScape Business V1 Tutorial Support of SIP Endpoints connected via the internet Version 1.0.1 Definitions HowTo An OpenScape Business HowTo describes the configuration of an OpenScape Business feature
More informationCA Enterprise Mobility Management MSO
SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.
More informationSECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK
SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK Whitepaper 2 Secure File Sharing and Collaboration: The Path to Increased Productivity and Reduced Risk Executive
More informationWindows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows
More informationEMBRACING SECURE BYOD
EMBRACING SECURE BYOD Acronis 2002-2014 Introduction The Bring Your Own Device (BYOD) movement has evolved from a buzzword and a trend to a full-fledged corporate phenomenon. Tablets and smartphones have
More informationUK Cabinet Office Mobility Rules: Advice on Implementation of BYOD
Advisory Notice UK Cabinet Office Mobility Rules: Advice on Implementation of BYOD UK Government Regulations There are a number of online documents discussed in this document that define regulations and
More informationMoving to the Cloud: What Every CIO Should Know
Moving to the Cloud: What Every CIO Should Know CONTACT SALES US: 1.877.734.6983 UK: +44 (0)845.528.0588 www.egnyte.com WHITEPAPER Overview Enterprise data storage needs are growing exponentially, doubling
More informationOpenScape Health Station. Integrating care, improving patient outcomes
OpenScape Health Station Integrating care, improving patient outcomes Integrated at the point of care Streamlining clinical access, reducing costs and enhancing the patient experience. This is the power
More informationHow To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
More informationInsert Partner logo here. Financial Mobility Balancing Security and Success
Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.
More informationAre you prepared for the BYOD (bring your own device) movement?
Are you prepared for the BYOD (bring your own device) movement? IRIS Service Management Guide www.irisfieldservice.com Are you prepared for the BYOD (bring your own device) movement? The trend towards
More informationMitigating Bring Your Own Device (BYOD) Risk for Organisations
Mitigating Bring Your Own Device (BYOD) Risk for Organisations Harness the benefits and mitigate the risks of BYOD espiongroup.com Executive Summary Mobile devices such as smart phones, tablets, or laptops
More informationWhite. Paper. Evaluating Sync and Share Solutions. Balancing Security, Control, and Productivity. September, 2014
White Paper Evaluating Sync and Share Solutions Balancing Security, Control, and Productivity By Terri McClure, Senior Analyst September, 2014 This ESG White Paper was commissioned by Code42 and is distributed
More informationData Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
More informationThe Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee
More informationBusiness Value Assessment
Business Value Assessment Town of Enfield Moves to SIP-based Unified Communications Solution to Reduce Costs and Boost Service; Net benefits of $2.8M Projected Business Value Assessment conducted by HIGHLIGHTS
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
More information2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy
2009 NASCIO Recognition Awards Nomination A. Title: Sensitive Data Protection with Endpoint Encryption Category: Information Security and Privacy State: Ohio B. Executive Summary Protecting the confidentiality
More informationUnify New Way to Work Index. The Habits of Successful Virtual Teams
Unify New Way to Work Index The Habits of Successful Virtual Teams Survey Analysis In January 2014, Unify continued our quest to crack the code on virtual teams by studying the habits of teams of all sorts.
More informationDocument Sharing on Mobile Devices. Securing Productivity on the Go! www.maas360.com
Document Sharing on Mobile Devices Securing Productivity on the Go! www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential
More informationOpenScape UC Firewall and OpenScape Session Border Controller
UC Firewall and Session Border Controller Security within and beyond the boundaries Security within and beyond your network s boundaries Our connected world We are living and working in a new world that
More informationA New Way to Work in Higher Education. Transforming student, faculty and administrative engagement
A New Way to Work in Higher Education Transforming student, faculty and administrative engagement A new way to work for students, faculty and administrative staff More than a quarter of a billion students
More information"Bring Your Own Device" Brings its Own Challenges
6 June 2012 "Bring Your Own Device" Brings its Own Challenges By Susan McLean and Alistair Maughan The consumerisation of IT is the growing trend for information technology to emerge first in the consumer
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationMobile Medical Devices and BYOD: Latest Legal Threat for Providers
Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and
More information"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
More informationDocument Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy
Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)
More informationSecure communications at the point of care
Secure communications at the point of care A single, unified terminal at the point of care: improving patient and clinician access to information, services and support. That s the power of OpenScape Health
More informationA matter of trust Fujitsu Managed Mobile
Mobility at enterprise level A matter of trust Fujitsu Managed Mobile Worry-free mobility. Take your mobile environment to the next level. Mobility motivates. Mobile devices such as smartphones and tablet
More informationDon t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It
WHITE PAPER: DON T LOSE THE DATA: SIX WAYS YOU MAY BE LOSING........ MOBILE....... DATA......................... Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It Who should
More informationDocument Sharing on Mobile Devices: Securing Productivity on the Go!
Document Sharing on Mobile Devices: Securing Productivity on the Go! Table of Contents Introduction: Enterprise Documents Go Mobile...3 Solving the Secure Data Conundrum...3 Ensuring Productivity in the
More informationAccelerate with OpenScape Office
Accelerate with OpenScape Office Take your business to the next level with Unified Communications and Collaboration. Our UCC solutions can help your business - no matter how big or small get more done
More informationWHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
More informationDriving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationGood Practice in Records Management and Information Security
Good Practice in Records Management and Information Security BELB LJ Schools 2013 How Valuable are Records & Documents? Valuable only because of the information they contain. Usable if they can be accessed
More informationEnterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER
Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER WHITE PAPER 2 Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them Business success is highly
More informationThe virtual safe: A user-focused approach to data encryption
The virtual safe: A user-focused approach to data encryption Steganos GmbH, 2008 1 The hard disk: a snapshot of our lives The personal computer has never been more personal. We routinely trust it with
More informationThis factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business.
FSA factsheet for All firms This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. It explains: What you should
More informationSmart Communications. Smarter Trading.
Smart Communications. Smarter Trading. OpenScape Xpert from Unify is a virtualized, smart trading solution that combines voice, data, security, risk reduction and seamless communication with a robust,
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationOpenScape Business V2
OpenScape Business V2 Tutorial Support of SIP Endpoints connected via the internet Version 2.1 Definitions HowTo An OpenScape Business HowTo describes the configuration of an OpenScape Business feature
More informationWhite Paper. The Importance of Securing Emails as Critical Best Practice within Financial Services. Executive Summary
White Paper The Importance of Securing Emails as Critical Best Practice within Financial Services IN THIS WHITE PAPER 1. Latest survey results Attitudes toward data security within Financial Services conducted
More informationCSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table
CSG & Cyberoam Endpoint Data Protection Ubiquitous USBs - Leaving Millions on the Table Contents USBs Making Data Movement Easy Yet Leaky 3 Exposing Endpoints to the Wild. 3 Data Breach a Very Expensive
More informationYes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
More informationHow To Implement Data Loss Prevention
Data Loss Prevention Implementation Initiatives THE HITACHI WAY White Paper By HitachiSoft America Security Solutions Group September, 2009 HITACHI SOFTWARE ENGINEERING AMERICA, LTD. Executive Summary
More informationThe Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
More informationBYOD Policies: A Litigation Perspective
General Counsel Panel Reveals the Real Deal BYOD Policies: A Litigation Perspective By Andrew Hinkes Reprinted with Permission BYOD Policies: A Litigation Perspective By Andrew Hinkes Bring-your-own-device
More informationE-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING
E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING E mployees are circumventing IT protocols and turning to unsanctioned tools such as file-sharing, messaging, collaboration and social media
More informationSamsung Mobile Security
Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationGetting Ahead of the Mobile Revolution
Getting Ahead of the Mobile Revolution Leverage the Power of Your Growing Mobile Workforce Today s businesses face a technological sea change as employees continue to make BYOD (bring your own device)
More informationEvolution from FTP to Secure File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Evolution from FTP to Secure File Transfer www.ipswitchft.com Do you know where your organization s confidential and sensitive files were transferred today? Are you sure
More informationFIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
More informationThe Cloud App Visibility Blind Spot
WHITE PAPER The Cloud App Visibility Blind Spot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Line-of-business leaders everywhere are bypassing IT departments
More informationBOYD- Empowering Users, Not Weakening Security
BOYD- Empowering Users, Not Weakening Security Table of Contents Exec summary... 3 Benefits of BYOD... 4 Threats that BYOD Harbours... 5 Malware... 5 Data Leakage... 5 Lost or Stolen Devices... 5 Public
More information2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
More informationIntralinks Survey Report
Intralinks Survey Report Safe Sharing: A Survey of Enterprise IT Decision Makers on Best Practices for Adopting File Sync and Share Applications New research conducted by Harris Poll June 2014 Copyright
More informationHow To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
More informationBRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
More informationSeamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
More informationDECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY
GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS
More informationHMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
More informationProactive controls to mitigate IT security risk
Proactive controls to mitigate IT security risk Policy Compliance Content Security Secure Access Endpoint Security Information security risk mitigation Empowering people to work securely The Cryptzone
More informationDATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
More information10 Hidden IT Risks That Threaten Your Financial Services Firm
Your firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your business without IT. Today,
More informationSecurity and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
More informationPrivilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
More information