BYOD Privacy and Security in Europe



Similar documents
Practical Legal Aspects of BYOD

European Privacy Reporter

BYOD BEST PRACTICES GUIDE

"choose your own device" : the employer still provides the hardware and the employee can choose e.g. the model.

BRING YOUR OWN DEVICE

"Bring Your Own Device" Brings its Own Challenges

Bring Your Own Device Security and Privacy Legal Risks

Data Protection Act Bring your own device (BYOD)

Bring Your Own Device Policy

Office of the Chief Information Officer

Future Proof Your ediscovery Practices

Third Thursday Crowell & Moring s Labor & Employment Update June 20, 2013

CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks

Future Proof Your ediscovery Practices

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )

EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, Published May An Osterman Research Executive Brief

Setting BYOD Policy: A New Partnership for IT and HR

Setting BYOD Policy: A New Partnership for IT and HR

Bring Your Own Device (BYOD) Policy

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

Cloud Computing. What is Cloud Computing?

Mobile Devices Policy

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

FRANCE. Chapter XX OVERVIEW

BYOD: Bring Your Own Device Advantage, Liability or Both?

EU Regulatory Trends in Data Protection & Cybersecurity What should be on the industry s agenda?

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

Information Governance Framework. June 2015

BYOD Policies: A Litigation Perspective

The HR Skinny: Effectively managing international employee data flows

How To Write A Mobile Device Policy

Corporate Compliance: A Global Perspective

How To Protect Your Data In The Cloud

BLACKBERRY COBO: ULTIMATE MOBILE SECURITY AND CONTROL

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

Insert Partner logo here. Financial Mobility Balancing Security and Success

trends and audit considerations

HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act

HIPAA Compliance and the Protection of Patient Health Information

Delivery date: 18 October 2014

A 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from

Inhouse Masterclass: Data Developments - Cyber Security & the Right to be Forgotten. MHC.ie

September 29, Facing The Challenges of Bring Your Own Device (BYOD) Policies in the Workplace

A White Paper from AccessData Group. The Future of Mobile E-Discovery

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

A White Paper from AccessData Group. The Future of Mobile E-Discovery

Technical Note. ForeScout MDM Data Security

and ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley (503)

BYOD Policy for [AGENCY]

Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs

The Impact of EU Data Protection Legislation. Thomas Rivera Hitachi Data Systems

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

MINNESOTA STATE STANDARD

Managing Cloud Computing Risk

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

Presentation by: Dr. Nathalie Moreno Partner. Cloud Computing and Data Protection: an Update 4 October 2012

Corporate Presentation 2016

Cloud Computing in a Government Context

AirWatch Solution Overview

plantemoran.com What School Personnel Administrators Need to know

Broker-Dealer and Investment Adviser Compliance Programs

Binding Corporate Rules ( BCR ) Summary of Third Party Rights

Align Technology. Data Protection Binding Corporate Rules Processor Policy Align Technology, Inc. All rights reserved.

My CEO wants an ipad now what? Mobile Security for the Enterprise

WHITE PAPER SPON. Making File Transfer Easier, Compliant and More Secure. Published February 2012 SPONSORED BY!!! An Osterman Research White Paper

Privacy vs Data Protection. PRESENTATION TITLE GOES HERE Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Successful ediscovery in a Bring Your Own Device Environment

By Emily Hay and Jan Dhont, Data Privacy Department, Lorenz Brussels.

Sample Mobile Device Security Policy

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

Business or Pleasure: The Challenges of Bring Your Own Device Policies in the Workplace

BYOD Strategies: Chapter I

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T

Cloud Computing: Legal Risks and Best Practices

The Importance of Privacy & Data Security in a Changing World

Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document

BYOD TRENDS IN HEALTHCARE: AN INDUSTRY SNAPSHOT 2015 SURVEY RESULTS REVEALED

WHITE PAPER SPON. Making File Transfer Easier, Compliant and More Secure. Published February 2012 SPONSORED BY!!! An Osterman Research White Paper

Policy Outsourcing and Cloud Based File Sharing

Sophos Mobile Control User guide for Android

Forthcoming EU Data Protection Law

State of Mobility Survey. France Results

Mobile Content Collaboration and its Benefits Across Your Enterprise. A Good Technology Whitepaper

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

Delivering Global Ediscovery Successfully. Emily A. Cobb, Ropes & Gray Andrew Szczech, Kroll Ontrack Thomas Sely, Kroll Ontrack

Archive Legislation: archiving in Czech Republic. The key laws that affect your business

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

Sophos Mobile Control User guide for Android. Product version: 4

Cloud security with Sage Construction Anywhere

Use of Mobile Apps in the Workplace:

WHITE PAPER Thru for Enterprise File Sync and Sharing

THE REAL BENEFITS OF BYOD

Mega Transparency Report. March Requests for Removal of Content and for User Information

Transcription:

BYOD Privacy and Security in Europe

BYOD: Overview 2

BYOD Overview 38% of companies expect to stop providing electronic devices to their employees by 2016 (1) According to a 2013 survey conducted by Cisco, approximately 90% of all workers say they use their own personal smartphones, tablets or laptops in some work-related capacity, whether the practice is officially endorsed by their employers or not (1) Wills, D. A. (2013, April 11). Bring your own device: The facts and the future. Gartner Research. Retrieved from http://www.gartner.com/displaydocument?id=2422315&ref=clientfriendlyurl. 3

Europe v. the Rest of the World (I) BYOD is less popular in Europe than in the U.S. European companies v. US companies having BYOD policy: 36% v. 68% BYOD is not significantly growing in Europe 2013 v. 2014: 10% more companies have BYOD policy but equal amount (ci. 40%) is not planning to implement one in the near future BYOD is less popular in Europe than in the rest of the world Average number of employees using own device in Asia: 78% 4

Europe v. Rest of the World (II) BYOD is less popular in Europe: Culture General expectation that employer provides tools to perform job; Employees are more sensitive about limitations of their privacy and allowing space for data management software on personal devices Legal hurdles Stricter rules on data protection and privacy result in more concerns and challenges for European enterprises when implementing BYOD. 5

Relevant Legislation: EU Privacy and Data Protection Regulation Labor law Article 8 ECHR and national constitutions of EU member states Data Protection Directive 95/46 and national laws implementing it Telecommunications regulations E-privacy directive 2002/58 as amended and national implementing acts Right to secrecy of telecommunication in Article 8 ECHR, national Constitution and/or national Telecom Acts Information security laws and standards 6

BYOD: Main Business Challenges 7

Liability: EU Liability linked to data controller capacity: BYOD: employer is the data controller Non-compliance may result in: Damages; and Sanctions. Employer responsibilities versus employee rights 8

Data Security: EU Importance: Data security is amongst the principal obligations of the management board of companies due to value of data No specific laws and regulations specifically dealing with BYOD information security adequate technical measures State-of-the-art Sensitive nature of data Measures should be in line with potential risks Data breach notification 9

Data Protection Compliance: EU Employer is responsible for processing of personal data on employee devices Important to ensure compliance with EU data protection principles as if personal devices are company owned 10

Monitoring: US v. EU US Federal law permits employers to monitor employees' internet or e-mail usage under certain conditions Common challenges to monitoring State laws EU Principal violation of employee s right to privacy and secrecy of telecommunication Balance with company s legitimate interests Conditions: Restrict to professional data Legitimate purpose Proportionality Transparency Rules on acceptable use Procedural requirements 11

Discovery Requests: US v. EU US EU Discovery requests in litigation generally demand that a litigant produce all responsive data that is within its control. When an employee s personal device contains data that is responsive to discovery requests, employers are faced with questions about whether they are required and permitted to search their employees devices for responsive data. Generally the concept of discovery requests does not exist. Processing of personal data to comply with discovery request requires legal basis Foreign legal obligation not sufficient Possibility to rely on company s legitimate interest if anticipated in BYOD policy Courts are generally reluctant to require the production of personal data on employees personal devices unless there is a compelling need to do so. 12

Post-Employment Relationship: US v. EU EU Perspective: Need to recover, destruct or restrict access to company information as soon as the employee leaves the company In a non BYOD environment: Reclaim the corporate owned devices In a BYOD environment: Device remains property of the employee and cannot be claimed by the company. Solutions: (i) remote data management (wiping the data from the device), (ii) limit access rights to company information systems, and (iii) requiring former employees to return company data Issues with these solutions: Access to, requiring to hand over, or wiping such personal information potentially constitutes a violation of the employee s right to privacy and the secrecy of telecommunication. Approach: Reduce privacy expectations and liability risks by anticipating postemployment in BYOD policy 13

Post-Employment Relationship: US v. EU US Perspective Need to recover, destruct or restrict access to company information as soon as the employee leaves the company In a BYOD environment: Device remains property of the employee and cannot be claimed by the company. Similar solutions as EU: (i) remote data management (wiping the data from the device), (ii) limit access rights to company information systems, and (iii) requiring former employees to return company data Key: Lay out post-employment process clearly in BYOD policy and follow policy including potential risks associated with wiping company data. 14

BYOD: Managing Challenges 15

Organizational: BYOD or Not? Risks Main risk is data security: Larger number of data Different device types Transfer of data Data leakage Personal use Benefits Increase of productivity and efficiency Innovation Employee satisfaction Increase of flexibility Chance to embed privacy in the core of business activities and raise privacy standards 16

Develop, Implement & Enforce Policy: Purpose Raise Awareness Ensure Policy Enforceability Limit Employee s Privacy Expectations 17

Develop, Implement & Enforce Policy: Procedure Involve HR, IT, and Legal Involvement of Employees and their Representatives Communication to Employees Training Employees Monitoring and Audit Compliance Consistency with Existing Policies 18

Overview Develop, Implement & Enforce Policy: Content (I) US: employers must clearly define employees' expectations of privacy on their personal devices used for business purposes. EU Eliminate expectation of privacy or maintain the privacy of employees' personal data by identifying: (1) when an employer may access, monitor, wipe or disable an employee's device; (2) what data or folders the employer may access. 19

Develop, Implement & Enforce Policy: Content (II) Register Devices Limitation on Types of Devices (free choice, limited choice, no choice) Acceptable Use 20

Develop, Implement & Enforce Policy: Content (III) Monitoring and Access to Data on Device Data Breach Procedure Post-Employment Procedures Reimbursement Anticipate compliance with data protection requirements 21

Technical: Data Security Measures In order to manage the risks related to BYOD the following measures should be considered: Internal security risk assessment Device configuration and settings Encryption Access controls for device and data/password protection and policy Secure transfer of data and connection to company network Maintenance and updating security on employee owned devices Use of a Data Loss Prevention System Preventing storage of data on the device or cloud environments Technical prevention of copying sensitive data on the device Data log for professional use Data loss prevention by frequent synchronization with/back up on company server. Protect the information not the device! 22

BYOD: Other Issues 23

Other Considerations Software licensing violations Tax implications Labor law issues Telework Working time restrictions Health and safety requirements Sector specific requirements 24

BYOD: Future Challenges 25

Future Challenges Evolution of BYOD Bring-Your-Own-Technology Current and future technology BYOD under the new EU Data Protection Regulation Accountability Data breach notification Right to be forgotten 26

Discussion and Q&A 27

What Client Surveys Say... Legal 500 2013 (Privacy): Lorenz business-minded team provides great service and can call on relationships with law firms in other jurisdictions when running international compliance projects. It acts for blue-chip corporates across the insurance, transport and pharmaceuticals industries. Practice head Jan Dhont is knowledgeable, responsive, has great listening skills and a practical approach. Legal500 2014 Data Privacy: Lorenz is the best of the best for data protection and privacy issues, according to one client. It advised a US pharmaceuticals company on a web-based tool relating to nutritional supplements, which included detailed work on privacy documents. Practice head Jan Dhont is the pre-eminent EU data protection expert, and all of the team s lawyers have industry depth and excellent communication skills. Legal 500 2012 (IT): Data protection is a particular area of expertise for Lorenz, which recently advised a US-based commercial insurer on ad hoc data privacy issues in human resources, international data transfers and the use of social media. Jan Dhont is the key partner. Legal 500 2011 (Privacy): Lorenz is top notch when it comes to complex EU data privacy problems, and provides prompt assistance and practical, risk-assessed advice. The team advises Fortune 100 and 500 companies on access requests and e-discovery. Practice head Jan Dhont is professional and concise. 28

We appreciate the opportunity to be of service to you. Regentlaan 37-40 Boulevard du Régent 1000 Brussels, Belgium Telephone +32 2 239 2000 - Fax +32 2 239 2002 www.lorenz-law.com 29