Bring your own device - Legal Whitepaper
|
|
|
- Felix Campbell
- 10 years ago
- Views:
Transcription
1 A Legal Whitepaper from the Technology Group Bring your own device - Legal Whitepaper The consumerisation of IT is the latest technology trend posing challenges to Australian businesses. As workplaces consider the benefits of flexible working practices allowing their employees to work from home or remotely, they increasingly face legal, technology and commercial challenges on a number of fronts. Along with cloud computing, the BYOD (Bring Your Own Device) trend is one of the key outcomes of the current shift in working practices. Organisations are facing increasing challenges as tech-savvy employees demand more flexibility about where and when they work. The traditional 9 to 5 working day based in an office is no longer the norm. Employees are working remotely, from home, from coffee shops and want to be connected 24 x 7. The Citrix Global Workshifting index found that by 2013, 93% of organisations will have implemented workshifting polices, up from 37% in It is clear that the move to BYOD is happening in every organisation whether they like it or not. Those organisations that embrace the trend are likely to reap the benefits of improved staff productivity, increased staff retention and a reduced environmental footprint. Those that do not will be playing catch up. Privacy The tension between the privacy rights of individual employees and those of the organisations they work for is perhaps best highlighted by a recent story involving an American company, Mimecast Inc. Peter Bauer, the CEO of Mimecast, was holidaying in South Africa with his family. Mid way through the trip his young daughter picked up his smart phone and after five unsuccessful password attempts, the Mimecast remote wipe capability triggered and all of the photos taken during the first half of the holiday were immediately deleted. The story is made all the more poignant as Bauer had been instrumental in instigating the Mimecast BYOD policy which approved remote wiping of smart phone devices. This story highlights the tension between effectively managing the rights of individual employees and those of their employer. With corporate owned devices, it is a lot easier to manage compliance with existing privacy laws. Employees are likely to have less expectations of privacy in relation to personal content stored on such devices. This is not necessarily the case when the devices are owned by the individuals themselves. These materials are subject to copyright which is retained by the author. No part may be reproduced, adapted or communicated in any manner without the consent of the holder of such copyright or as permitted under applicable copyright law. Copyright Madgwicks This e-alert is for the use of Madgwicks clients and friends and is intended as a general outline only to keep you up to date with important legal decisions and new legislation. It is not intended to provide formal legal advice. We strongly advise parties to contact the lawyer(s) mentioned for further information.
2 Putting in place some frameworks which manage personal information effectively as part of an organisation s BYOD policy will therefore be one of the critical issues moving forward. This is likely to become even more important with the rights of individuals to be strengthened in the first quarter of 2014 under proposed revisions to the Privacy Act 1988 (Cth). Data security Closely following the risks posed by privacy, data security risks come a close second. With a spate of data security breaches occurring in 2010 with Sony and most recently in Australia with Telstra and Billabong, data security breaches are a key risk for organisations. BYOD heightens the data security risks to organisations as mobile devices by their very nature are easier to lose, misplace or be stolen. How individual employees use their devices is particularly important in this context. The increased popularity of third party consumer applications like Evernotes and Dropbox pose particular security risks. It is therefore critical for organisations to have a firm policy on how and what types of enterprise data will be stored on such applications. Will enterprise data be segregated from personal data? Adopting mobile device management tools may allow organisations to more effectively pick and choose which information is made available to particular employees. Many organisations who adopt a virtualised approach are better able to ensure that when the device is lost or stolen there is no physical data held on the device itself. It is all accessed via the internet and the device can be switched off or killed remotely. No matter the preferred approach, organisations need to acknowledge that their employees and users are likely to store some corporate data on their devices at some point. It is then about putting in place an approach to train such employees and ensure that they take all reasonable steps to protect the security of their devices including regularly updating passwords and installing virus patches, etc. Such obligations are important to include in any BYOD program and related policies. Intellectual property issues In a past life the ownership of the content on corporate owned devices was fairly clear-cut. If you were using a corporate owned device and you created content on that device your employer was in a good position to claim the intellectual property rights in such content. That position is now no longer so straightforward. Whilst employers may lay claim to intellectual property developed in the course of employment by an end user, who owns the intellectual property where end users create materials using a personal device outside of working hours? What about contacts gathered by users on LinkedIn?
3 With the advent of BYOD there are now more and more situations which are grey rather than black and white. Organisations will need to seek advice on their existing contracts of employment and ensure that any and all intellectual property created by an employee on a BYOD device whether at work or outside work is owned by the organisation. There will always be exceptions which will conflict with the policy but not addressing the situation is likely to pose more risk to an organisation. Litigation and data retention obligations Organisations are required to comply with numerous legal obligations to retain corporate records for litigation or regulatory purposes. Organisations need to appreciate that technology is likely to impact these obligations. Where enterprise data is physically stored on a personally owned device, complying with such obligations may prove more of a challenge. Organisations need to understand the risks associated with requiring employees to grant them full and ready access to personal devices. Tech saavy employers will be able to navigate the technology hurdles whilst also effectively complying with any discovery obligations or document retention requirements. The 2011 ban by ANZ Bank on directors using Apple s ipad to manage board papers was seen at the time as a slight overreaction by many commentators. Many of the concerns about the security of documents could have been avoided by ensuring documents were able to be securely accessed virtually from the device and not physically stored on it. If the ipad was ever lost or stolen, then the device would have nothing on it which could compromise the bank. Further, there would be less risks around complying with data retention obligations as the records would be stored securely within the organisation and not physically on the device. Licensing It is quite likely that an organisation s existing software licensing arrangements may not cater for a move to BYOD. Existing licence terms may be granted on a per user or per device basis. They may apply only in respect of corporate owned or leased devices and may not extend to use of applications by employees on multiple devices including on smart phones or tablets owned by users and accessed from home or remotely. It is critical for organisations to review their existing licensing arrangements and liaise with technology vendors to update or renegotiate terms. Insurance What happens if the user owned device is lost or stolen? Will it be covered by an organisation s existing insurance policy? Who should be responsible - the employee or the organisation? These are important issues to address within any BYOD policy. It will be important to speak directly to your insurers to update any relevant policies. Many policies will currently apply only to company owned or leased equipment and do not extend to user owned devices.
4 HR issues Perhaps the greatest number of legal issues arise in an HR context. Organisations will have to come to grips with the following HR issues all of which will need to be considered in any BYOD program or policy: 1. What organisation and user responsibilities apply when users cease working as employees or contractors? How does this tie in with your organisation s existing contracts of employment or contractor services agreements? 2. Who should the organisation make the BYOD program available to? All employees or only those who meet certain criteria? Should it extend to contractors also? If to a select pool, you will need to ensure you properly comply with the relevant Commonwealth anti-discrimination laws as well as the State based equivalents. You will need to ensure you consider obligations for users with special needs including users who work part time or flexibly already. Should the program be optional or mandatory? You will need to be particularly careful in relation to the selection criteria for employees if the program is not open to everyone. 3. What minimum security measures and obligations do you need to include for users i.e. password and virus updating obligations? To what extent if any will you take responsibility for security measures and how will this flow down to your employees? 4. Will you allow users to access third party applications outside the organisation such as Dropbox or Evernotes? If so, on what basis? How will you monitor compliance? 5. What minimum support obligations will you include for the support and maintenance of BYOD devices (if any)? What about support for the applications on the devices? You may consider having an approved list of devices and providing minimal support only? Some organisations seeking to retain more control over such devices will offer to fully support them, some will not make support available at all. 6. What content and acceptable use obligations will you need to include? Users accessing inappropriate materials in the comfort of their own home is one thing. Users bringing devices into the workplace containing such material is another. You have a duty of care to your employees and others in the workplace and it will therefore be important to have clear requirements in relation to such obligations. So too with the use of personal information and confidential information of users and the organisation. Both parties will typically take on responsibilities to ensure the adequate protection, use and disclosure of such information. 7. To what extent, if any, will your other policies be affected by BYOD? Such policies may include Internet and policy, Business Continuity and Disaster Recovery Plans, Data Security policy, HR polices more broadly etc. Have you updated these policies to ensure a consistent approach across your organisation? In particular your security/ data breach policy will need to be updated to cover BYOD specifically.
5 8. Depending on the BYOD program, what payment obligations (if any) should you include in the policy? Do you intend that users will own the device outright? Who will be responsible for meeting initial device costs and ongoing costs? Will you pay a stipend? If so, how much and on what basis? Have you considered FBT or other tax implications for making such a payment? Who will be responsible for excess use or roaming charges for each device? These are just a few of the issues that are important to advise on from a legal HR perspective. So what are some of the broader implications for Australian businesses in relation to BYOD? Implications for Australian Businesses? Organisations and some technology advisers wrongly assume that BYOD is a technology issue only. This is not the case. BYOD affects the whole business and any BYOD program needs to involve representatives from technology, management, legal, finance and HR. As seen above the legal risks to Australian businesses are extensive. Any BYOD program will need to take into account the regulatory and operational requirements of the organisation and businesses would expect to have to deal with the following: Understanding the raft of employee related issues arising in relation to BYOD including in relation to existing and required changes to employment contracts and independent contractor agreements; Ensuring an effective working relationship with technology, finance and management on creating and implementing an effective policy and program which achieves the organisation s business objectives whilst also meeting any legal and compliance obligations; Identifying relevant third party arrangements and working closely with third party organisations including insurance, technology vendors (licensing) and government authorities which will impact on the BYOD program; and Putting in place frameworks and processes which protect the legitimate interests of the organisation against the rights of individual users, particularly in relation to data security, privacy, confidential information and intellectual property rights. BYOD is an exciting trend and is happening whether organisations like it or not. Those that embrace the trend and put in place effective processes and procedures to manage the likely risks are well placed to take advantage of the benefits with BYOD. Those that ignore the trend or are overly prescriptive in their approach not only put the organisation at risk at a number of different levels but risk losing the very people who will see that organisation into the future. Dudley Kneller is partner at Madgwicks Lawyers specialising in technology contracting and advice work. Dudley Kneller Partner, Madgwicks Lawyers E: [email protected]
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com
Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com
Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
Bring Your Own Device Policy
Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be
How To Make Bring Your Own Device A Plus, Not A Risk
FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES BYOD: Bring your own device How to make BYOD a PLUS, not a RISK
Bring Your Own Device (BYOD)
1. Introduction Introduction This document outlines the considerations that the Council needs to consider in relation to its decision whether or not to adopt the current trend (arising from the consumerisation
Protecting Your Data On The Network, Cloud And Virtual Servers
Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public
Bring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
Bring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning
Privacy and Security Law Report
Privacy and Security Law Report Reproduced with permission from Privacy & Security Law Report, 12 PVLR 1929, 11/18/13. Copyright 姝 2013 by The Bureau of National Affairs, Inc. (800-372-1033) http://www.bna.com
Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com
Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect
Don t Let A Security Breach Put You Out of Business
Don t Let A Security Breach Put You Out of Business Committed to providing you with the most innovative security and privacy solutions. www.boomtechit.com Bring Your Own Device (BYOD) and Mobile Device
BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence
BYOD AND ME How cell phone hacking effects your business! Richard Rigby CEO Wraith Intelligence 90% of companies will offer BYOD, or bring-your-own-device options to employees by 2014, according to Gartner.
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY
GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS
BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley [email protected] (503)276-6074
BYOD At Your Own Risk Working in the BYOD Era Shane Swilley [email protected] (503)276-6074 Remember when mobile technology was more Hollywood fantasy than reality The original Smart Phone By the
Mobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com
BYOD Bring Your Own Device - Mobile Device Management www.prooncall.com Bring Your Own Device (BYOD) Mobile Device Management People are starting to expect the ability to connect to public networks and
Remote Access and Home Working Policy London Borough of Barnet
Remote Access and Home Working Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Remote Access and Home Working Policy Document Description This policy applies to home and
BYOD Policies: A Litigation Perspective
General Counsel Panel Reveals the Real Deal BYOD Policies: A Litigation Perspective By Andrew Hinkes Reprinted with Permission BYOD Policies: A Litigation Perspective By Andrew Hinkes Bring-your-own-device
Consumer Device Policy (Smartphones / Tablets) BYOD (Bring Your Own Device)
Consumer Device Policy (Smartphones / Tablets) BYOD (Bring Your Own Device) Policy Number: 422 Supersedes: - Standards For Healthcare Services No/s 1, 5, 19 New Version Date Of Reviewer Completed Date
SourceIT User Notes. Specific Clauses. Licence and Support Contract Commercial off-the-shelf Software RELEASE VERSION 2.
SourceIT User Notes Specific Clauses Licence and Support Contract Commercial off-the-shelf Software RELEASE VERSION 2.3 DECEMBER 2012 AGIMO is part of the Department of Finance and Deregulation SourceIT
Lowanna College 2015 BYOD PROGRAM AGREEMENT. BYOD Program 2015. BYOD Student Agreement/Acceptable Use Policy/Online Services Policy
BYOD Program 2015 BYOD Student Agreement/Acceptable Use Policy/Online Services Policy The student and parent/guardian must carefully read the above contract before signing it. Any questions should be addressed
Privacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data
Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6
Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom
Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom
HP Laptop & Apple ipads
Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview
DRIVING ENTERPRISE MOBILITY. Enterprise Mobility Solutions
DRIVING ENTERPRISE MOBILITY Enterprise Mobility Solutions from Computacenter CONTENTS 03 04 05 06 09 10 The Growth of Mobility Seizing Opportunities Overcoming Adversity Computacenter Mobility Solutions
USE OF PERSONAL MOBILE DEVICES POLICY
Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Questions to ask about a cloud service. enter
Questions to ask about a cloud service enter How should this guide be used? This guide provides a list of questions you may wish to consider about a cloud service you are considering or already using.
ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0
ADRI Advice on managing the recordkeeping risks associated with cloud computing ADRI-2010-1-v1.0 Version 1.0 29 July 2010 Advice on managing the recordkeeping risks associated with cloud computing 2 Copyright
Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology
Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
Multi-factor Authentication
Multi-factor Authentication Current Usage and Trends whitepaper Executive Summary In this digital age, validating identities and controlling access is vital, which is why multifactor authentication has
Entrepreneurs Programme - Business Evaluation. Version: 3
Entrepreneurs Programme - Business Evaluation Version: 3 20 October 2015 Contents 1 Purpose of this guide... 4 2 Programme overview... 4 2.1 Business Management overview... 4 3 Business Evaluations...
BYOD (Bring your own device)
BYOD (Bring your own device) Chartered Institute for IT West London Branch Charles Brooks Principal Consultant 16 October 2012 Have you got one of these? Which one of these integrates with your work systems?
Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP
Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal
BYOD: Bring Your Own Policy. Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works.
BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works. BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already
Security and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
Bring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Document History Document Reference: Document Purpose: Date Approved: Approving Committee: To set out the technical capabilities of the chosen security solution Airwatch
WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them
Mobile Security Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for
Document Sharing on Mobile Devices. Securing Productivity on the Go! www.maas360.com
Document Sharing on Mobile Devices Securing Productivity on the Go! www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential
Board Portal Essentials for Community Banking
BoardPad Thought Leadership Series Board Portal Essentials for Community Banking Top 5 Things a Community Bank Board Needs to Know What you will learn: What is a board portal What is progressive governance
Mobilize SharePoint Securely: Top 5 Enterprise Requirements
AN ACCELLION WHITE PAPER Mobilize SharePoint Securely: Top 5 Enterprise Requirements Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto,
Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.
PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that
Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida
2015 SCCE Compliance & Ethics Institute Wednesday, October 7, 2015 (10:00 11:45) Session W14 Bring Your Own Device(BYOD) They are here and they are not going away. Understanding the benefits, risks, and
Hosted Desktop for Business
Your complete guide to Hosted Desktop Hosted Desktop for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 Hosted Desktops today... 4 What is a hosted desktop? 4 How does it work? 6 How easy
BYOD BEST PRACTICES GUIDE
BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create
Information Security Incident Management Policy September 2013
Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective
US companies experience and attitudes towards security threats
US companies experience and attitudes towards security threats Q u a n t i t a t i v e s u r v e y w i t h i n L a r g e a n d M e d i u m c o m p a n i e s i n t h e U S A Objectives Determine the existing
White Paper. Data Security. journeyapps.com
White Paper Data Security CONTENTS The JourneyApps Commitment to Security Geographic Location of Cloud Hosting Infrastructure-Level Security Protection of Data Through Encryption Data Life Cycle Management
DIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data
Nuix And EDRM Case Study: Removing PII from Nuix the and EDRM EDRM Enron Case Data Study Set Removing PII from the EDRM Enron Data Set Investigating the prevalence of unsecured financial, health and personally
Guidance on the Use of Social Networking
Guidance on the Use of Social Networking Version 1 - January 2012 Reviewed: September 2013 Version 2 Approved by SM: November 2013 Version 2 modified and approved by the PCC Board: April 2014 Overview
Protecting Your Roaming Workforce With Cloud-Based Security
Protecting Your Roaming Workforce With Cloud-Based Security How to use the cloud to secure endpoints beyond your perimeter By Tsailing Merrem, Senior Product Marketing Manager Remote and roaming workers
