Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology
|
|
|
- Lauren Hubbard
- 10 years ago
- Views:
Transcription
1 Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology September 2013 Office of Information Technology
2 This page left blank intentionally Office of Information Technology
3 Contents Legislative Request... 2 Report Focus... 2 Introduction... 2 Policy Considerations... 3 Devices... 3 Security... 3 Cost... 4 Reimbursement... 4 Roadmap... 4 Short term... 5 Middle term... 5 Long term... 5 Issues & Cost... 5 Next Steps... 6 Appendix... 7 Office of Information Technology
4 This page left blank intentionally Office of Information Technology
5 Legislative Request SECTION 7.18.(d) of Session Law directs the Office of the State CIO to develop a policy for implementing a "bring your own device" plan for State employees. By September 1, 2013, the State CIO shall report to the Joint Legislative Oversight Committee on Information Technology and the Fiscal Research Division on how the plan is to be implemented, as well as on potential issues and costs. Following consultation with the Joint Legislative Oversight Committee on Information Technology, the State CIO may implement the "bring your own device" plan. Report Focus 1. Develop a Policy for implementing BYOD plan (Policy Considerations) 2. How the policy plan is to be implemented (Roadmap) 3. Potential policy issues and cost 4. Consultation for implementing BYOD plan (Next Steps) Introduction We live in a mobile society, with an always on workforce that expects to be constantly connected to work and home. This presents multiple challenges to employers in both the public and private sectors as they try to balance business interests with their employees desires. Nowhere is this balancing act more pronounced than the technology used in the workplace. Today s employees bring an expectation that they can use their personal laptop, tablet or smartphone for work. State government is no different. State employees, like those in the private sector, already use their personal devices in the workplace. Some agencies pay employees a stipend for using their own smartphones. Statewide policies regarding security, public records and confidentiality apply to government documents and data stored on personal devices, but no statewide policy specifically addresses the use of mobile devices. Agencies can determine the types of devices their employees use, the amounts they are reimbursed, and the security controls if any that are deployed. This approach needs to be fixed, given trends in the marketplace and citizens growing concerns over the security of their data. The management of mobile devices is only one component of a much larger shift in the technology industry. Enterprises are moving away from technology solutions and operations are designed and Office of Information Technology Page 2
6 developed based on the requirements of specific devices (e.g. desktop/laptop pc s; mobile phones, server systems). Modern trends are moving towards a user centric approach. In that model, solutions are designed around the user s needs and a workspace can follow a worker across their mix of devices and locations. North Carolina IT is moving in this direction and a bring your own device (BYOD) policy is one consideration in support of this transformation. This report summarizes some of the policy considerations and outlines an approach for developing a BYOD Policy for North Carolina state government. The State CIO is providing the report to the Joint Legislative Oversight Committee on Information Technology pursuant to Sect. 7.18(d) of Session Law , which is included in the Appendix. Policy Considerations Any BYOD policy must address a number of interconnected issues. Basically, they can be divided into four three areas: devices, security, cost and reimbursement. Devices A threshold question in the development of any BYOD plan is what devices will be allowed? Will state employees be allowed to bring any type of device into the workplace, whether it s a smartphone, a tablet, a laptop, or a wearable device, such as Google Glass? If so, are there any limits on the operating systems? Are they limited to systems that are compatible with the enterprise, so that employees can read and edit documents, for example? If the devices are not compatible, who is responsible for supplying the necessary software: the employee or the state? Support for devices is another consideration. Are employees on their own when their device will not connect to the network, or they cannot use the system? Or will the help desk handle those issues, which increases cost and complexity? Security Citizens are increasingly concerned about their privacy and the billions of bits of information about them stored by government and businesses. The proliferation of personal devices in the workplace makes protecting citizen data even more difficult for IT security professionals. Every PC, smartphone, desktop, and tablet on the network is a pathway for hackers and their malicious software, and a potential source of data loss if the device is lost, stolen or hacked. Office of Information Technology Page 3
7 Security policy considerations must flow from a decision on the approach the state will use, specifically whether it will invest in a centralized mobile device management system, or manage controls at the agency or device level. Authentication of devices to ensure that state employees are using them, not hackers, is another baseline issue. The state could adopt a system allowing different levels of access, depending on the device. Once the framework is established, policies dealing with specific risks and incidents must be developed. For example, should the state have the authority to wipe all data on a personal device that is lost or stolen if the state documents are not isolated? If so, that authority should be clearly spelled out for employees. In establishing security policies, the state must also balance employees desires to keep their personal information private with state laws regarding public records. In North Carolina, public records are public no matter where they are located, and employees must fully understand that when bringing their own devices to the workplace. Along the same lines, employees must be fully informed that state laws and rules dealing with disposal of records apply to state documents on their personal devices. Policies alone are only as good as employees willingness to follow them, and to practice safe computing skills Cost Technical controls and a centralized management system would increase security, but also increase costs. Even marginal costs of a few dollars per month per device would significantly impact any business case. Reimbursement As mentioned previously, many agencies already provide a stipend for employees to use their personal devices for work. The Office of State Budget and Management (OSBM) has established broad guidelines for the reimbursement, but agencies set their own policies as to who is eligible, and the amount of the stipend. A statewide approach would provide equity to the system and make administration easier. Roadmap Tackling these and other issues, while collaborating with all of those affected, is a complex task. But given the usage of personal devices today, there is no time to wait for a comprehensive plan. We Office of Information Technology Page 4
8 propose a series of steps that will lead to a sound, easily understood, secure and flexible plan for the use of personal devices in state government. This will be done in three steps. Short term By January 1, 2014, the State CIO will adopt an interim policy on the use of personal devices in state government. At a minimum, the policy will: Allow the use of personal devices by state employees to conduct state business Set minimum standards and guidelines for their use Make it clear that users of personal devices that are being used to conduct state business must comply with state laws and rules dealing with public records, records retention and confidentiality Allow agencies to determine reimbursement rates and rules, consistent with the OSBM guidelines. Middle term The State CIO will develop a broader plan and policies for BYOD across state government, expanding the security and compliance approach. This will be completed by May 1, 2014, and presented to the Joint Legislative Committee on Information Technology Oversight, pursuant to the budget bill. With approval from the committee, the State CIO will begin implementing the plan. Long term ITS will implement a more comprehensive BYOD plan, including any procurement, and begin planning for the future to align the plan with the state s overall end user strategy. Issues & Cost The following bullets summarize some of the primary challenges with a BYOD policy that need to be understood: Types of devices that will be permitted on the state s network Types of users that will be eligible to participate in a BYOD program Prohibiting confidential business information residing on endpoints or only in isolated, encrypted form, and only when absolutely necessary Office of Information Technology Page 5
9 Management of the endpoints including full or selective remote wiping of a device on the state s network Support expectations for personally owned devices and state services Should a subsidy or stipend be provided for personally owned devices and other services as the state moves towards a user centered end user computing environment Additional costs associated with hardware and software required to enable productive use of personal devices while ensuring necessary security and compliance controls Potential for cost savings associated with: o modified support levels offered for personal devices thereby reducing support staff requirements o savings associated with providing a fixed stipend for the purchase of personal devices instead of State procurement of a computer system Clear definition of device, applications and data ownership Integration of BYOD with the mobile device policy Next Steps The following actions will be taken to inform and create the strategy for the short and middle term roadmaps: Implement currently available capabilities to better secure mobile devices on the state network Work across agencies to determine BYOD needs and requirements to create enterprise level view Identify persona types for personal devices that would participate in a BYOD program and scenarios where it is inappropriate due to data security, worker type or other factors Determine how virtualization impacts a BYOD policy as the state moves to a user centered computing environment Work with other states and private sector partners that have implemented a BYOD policy for guidance and best practices Work with OSBM to understand how cost considerations of a BYOD policy that would include other endpoints such as laptops and desktops Investigate mobile device management solutions and support infrastructure for testing to securely manage endpoints Office of Information Technology Page 6
10 Appendix Section 7.18, Session Law USE OF MOBILE COMMUNICATIONS DEVICES SECTION 7.18.(a) By October 1, 2013, every State agency shall submit to the Joint Legislative Oversight Committee on Information Technology and the Fiscal Research Division a copy of the agency policy on the use of mobile communications devices. This reporting requirement is continuous such that any time a change is made to an existing policy, the agency shall submit an update immediately. SECTION 7.18.(b) Beginning October 1, 2013, each State agency shall submit a quarterly report to the Joint Legislative Oversight Committee on Information Technology, the Fiscal Research Division, and the Office of the State Chief Information Officer (CIO) on the use of mobile electronic communications devices within the agency. The report shall include the following information: (1) The total number of devices issued by the agency. (2) The total cost of mobile devices issued by the agency. (3) The number and cost of new devices issued since the last report. (4) The contracts used to obtain the devices. SECTION 7.18.(c) The Office of the State Chief Information Officer shall review current enterprise, and any individual agency mobile electronic communications contracts, to develop a plan to consolidate the contracts. By October 1, 2013, the Office of the State CIO shall submit a report on progress toward consolidating State agency mobile communications device contracts to the Joint Legislative Oversight Committee on Information Technology and the Fiscal Research Division. SECTION 7.18.(d) The Office of the State CIO shall develop a policy for implementing a "bring your own device" plan for State employees. By September 1, 2013, the State CIO shall report to the Joint Legislative Oversight Committee on Information Technology and the Fiscal Research Division on how the plan is to be implemented, as well as on potential issues and costs. Following consultation with the Joint Legislative Oversight Committee on Information Technology, the State CIO may implement the "bring your own device" plan. Office of Information Technology Page 7
BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS
BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS Damian Bach AirWatch Session ID: SPO-T038 Session Classification: Intermediate Current & Future Mobile Landscape Number of mobile
Bring your own device freedom
Bring your own device freedom BYOD solutions for federal government enterprises The Digital Government Strategy, issued by Federal Chief Information Officer (CIO) Steven VanRoekel on May 23, 2012, called
How To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com
Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com
Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
Bring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT
Mobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution.
Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution Global July 2012 Contents Section Slide Numbers Executive Summary 4 Market
Bring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
State of South Carolina Policy Guidance and Training
State of South Carolina Policy Guidance and Training Policy Workshop All Agency Mobile Security July 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy Overview: Mobile Security
North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP
Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal
The Challenge of Securing and Managing Data While Meeting Compliance
ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst
User-Based Licensing for Endpoint Protection and BYOD
User-Based Licensing for Endpoint Protection and BYOD Five reasons why you should license by employee, not devices Contents Can Smarter Licensing Improve Security?. 1 Why Per-Device Licensing No Longer
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
How To Make Bring Your Own Device A Plus, Not A Risk
FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES BYOD: Bring your own device How to make BYOD a PLUS, not a RISK
Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com
Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect
Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014
Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014 Agenda Introduction / Session Overview HIT Budgeting 101 Security and Compliance EHR budgeting HIT Where Are We Going Q & A 2 Copyright
Don t Let A Security Breach Put You Out of Business
Don t Let A Security Breach Put You Out of Business Committed to providing you with the most innovative security and privacy solutions. www.boomtechit.com Bring Your Own Device (BYOD) and Mobile Device
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
2011 Forrester Research, Inc. Reproduction Prohibited
1 Developing A Successful Mobile Strategy Christian Kane Analyst Forrester Research May 31, 2012 2 2011 2009 Forrester Research, Inc. Reproduction Prohibited Agenda Workforce trends for supporting mobile
A guide to enterprise mobile device management.
WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review
BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com
BYOD Bring Your Own Device - Mobile Device Management www.prooncall.com Bring Your Own Device (BYOD) Mobile Device Management People are starting to expect the ability to connect to public networks and
trends and audit considerations
Bring your own device (BYOD) trends and audit considerations SIFMA IT audit session 4 October 2012 Disclaimer Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited,
Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology
20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business
NSW Government. Wireless services (WiFi) Standard
NSW Government Wireless services (WiFi) Standard May 2014 CONTENTS 1. CONTEXT 2 1.1. Background 2 1.2. Purpose 2 1.3. Scope and application 2 2. STANDARDS GOVERNANCE 2 2.1. Standards to support the ICT
BEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD How Smart Enterprises Are Making It Work Whitepaper Whitepaper 2 In a recent report, research firm Ovum concludes that: It is clear that when it comes to planning and implementing
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
IT TECHNOLOGY ACCESS POLICY
IT TECHNOLOGY ACCESS POLICY Effective Date May 19, 2016 Cross- Reference 1. IT Access Control and User Access Management Policy Responsibility Director, Information 2. IT Acceptable Use Policy Technology
Acceptable Use Guidelines
Attachment to the Computer and Information Security and Information Management Policies Acceptable Use Guidelines NZQA Quality Management System Supporting Document Purpose These Acceptable Use Guidelines
10 Threats to Successful. Enterprise Endpoint Backup
10 Threats to Successful Enterprise Endpoint Backup Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise in endpoints,
How To Backup From Your Computer To Your Phone Or Tablet Or Computer
MARCH 2013 Top 10 Endpoint Backup Mistakes And how to avoid them Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise
03/06/2014. Bring Your Own Device: A Framework for Audit. Acknowledgement
Bring Your Own Device: A Framework for Audit Emily A Knopp, CPA, CISA Audit Director Angelo State University, Member of Texas Tech University System March 6, 2014 Texas Association of College of University
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T
The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices
Hengtian Information Security White Paper
Hengtian Information Security White Paper March, 2012 Contents Overview... 1 1. Security Policy... 2 2. Organization of information security... 2 3. Asset management... 3 4. Human Resources Security...
28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets
MARCH 2013 Top 10 Endpoint Backup Mistakes And how to avoid them Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise
State of Montana Strategic Plan for Information Technology 2014
State of Montana Strategic Plan for Information Technology 2014 This document is prepared under the authority of the Montana Information Technology Act of 2001. It is published biennially unless special
How To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy
2009 NASCIO Recognition Awards Nomination A. Title: Sensitive Data Protection with Endpoint Encryption Category: Information Security and Privacy State: Ohio B. Executive Summary Protecting the confidentiality
The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER
The BYOD Opportunity Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER Table of Contents Abstract.... 3 Introduction.... 3 A New Approach to BYOD... 3 Positive Results....
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
State of the States: IT Trends, Priorities and Issues
State of the States: IT Trends, Priorities and Issues OSC Financial Conference 2012 Doug Robinson, Executive Director National Association of State Chief Information Officers Fiscal recovery: budgets are
CONSUMERIZATION OF IT BYOD and Cloud-based File Storage
CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Moderator: John Payne, Principal Consultant, Pueblo Technology Group, Inc. Speakers: Royce Holden, Director of Information Technology, Greater Asheville
ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM
ENTERPRISE BYOD BEST PRACTICES 1 ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM BYOD, Bring Your Own Device, is a rapidly growing trend in which
Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses
Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses October 2014 A Pilot Survey to Compile Cybersecurity Information In July 2014, the Ohio Division of Securities participated
Enterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
A number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
Enterprise Electronic Forms and Digital Signatures. Report to the Joint Legislative Oversight Committee on Information Technology
Enterprise Electronic Forms and Digital Signatures Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology
STATE OF NORTH CAROLINA
STATE OF NORTH CAROLINA PERFORMANCE AUDIT OFFICE OF INFORMATION TECHNOLOGY SERVICES STATE TERM CONTRACT FOR MICROCOMPUTERS AND PERIPHERALS JULY 2013 OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA STATE
Mobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015
Mobility Exploiting and Maintaining the New Face of Engagement Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained
Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 June 2, 2016 M-16-12 MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung United States Chief
BYOD BEST PRACTICES GUIDE
BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create
BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
2012 NCSA / Symantec. National Small Business Study
2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
'Namgis Information Technology Policies
'Namgis Information Technology Policies Summary August 8th 2011 Government Security Policies CONFIDENTIAL Page 2 of 17 Contents... 5 Architecture Policy... 5 Backup Policy... 6 Data Policy... 7 Data Classification
Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.
Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in
GOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
A Bring Your Own Device (BYOD) Overview
A Bring Your Own Device (BYOD) Overview As Presented At AMARC Workshop: Developing A BYOD Framework March 6, 2014 All copyrightable text and graphics, the selection, arrangement, and presentation of all
