Business or Pleasure: The Challenges of Bring Your Own Device Policies in the Workplace



Similar documents
Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace

September 29, Facing The Challenges of Bring Your Own Device (BYOD) Policies in the Workplace

Mobile Devices in the Workplace: What Every Employer Needs to Know

BYOD: Bring Your Own Device Advantage, Liability or Both?

Practical Legal Aspects of BYOD

[BRING YOUR OWN DEVICE POLICY]

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

How To Make Bring Your Own Device A Plus, Not A Risk

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work

Third Thursday Crowell & Moring s Labor & Employment Update June 20, 2013

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Security and Privacy Considerations for BYOD

BYOD Policy for [AGENCY]

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Security Standard

Bring Your Own Device Policy

Data Protection Act Bring your own device (BYOD)

Kaspersky Security for Mobile

White Paper. Data Security. The Top Threat Facing Enterprises Today

THE AMERICAN LAW INSTITUTE Continuing Legal Education

"choose your own device" : the employer still provides the hardware and the employee can choose e.g. the model.

Smart Ideas for Smartphone Security

The Security Impact of Mobile Device Use by Employees

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )

White Paper. Data Security. journeyapps.com

Mobile Device Usage and Agreement Policy

Feature List for Kaspersky Security for Mobile

Bring Your Own Device

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Washwood Heath Academy Use by staff of private communication devices policy

BYOD: BRING YOUR OWN DEVICE

Use of Mobile Apps in the Workplace:

Questions And Answers

THE BRING YOUR OWN DEVICE TO WORK MOVEMENT:

Bring Your Own Device. Individual Liable User Policy Considerations

How To Protect Your Mobile Devices From Security Threats

What s Yours Is Mine. Global Results. How Employees are Putting Your Intellectual Property at Risk. Embargo until Wednesday, Feb.

THE BYOD SURVIVAL GUIDE 5TIPS FOR PRACTICING SAFE MOBILE FILE ACCESS AND COLLABORATION

How can I protect against the loss of my ID if my device is lost or stolen?

County of Grande Prairie - Information Systems

Presented by: Jason C. Gavejian

Taking Charge with Apps, Policy, Security and More. October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia

Bring your own device - Legal Whitepaper

MOBILE BANKING USER GUIDE

6 Pillars for Building a Successful BYOD Program. Protecting corporate assets while increasing employee productivity

THE BRING YOUR OWN DEVICE TO WORK MOVEMENT:

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Total Enterprise Mobility

Are you prepared for the BYOD (bring your own device) movement?

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

How To Write A Mobile Device Policy

Kaspersky Security 10 for Mobile Implementation Guide

Considerations for Outsourcing Records Storage to the Cloud

Exchange ActiveSync (EAS)

White Paper. How a cloud phone system uniquely supports your mobile workforce

Anatomy of a Cloud Computing Data Breach

BRING YOUR OWN DEVICE

Don t Let BYOD Mean Bring Your Office Disaster. Southeastern Business Law Institute October 24-25, 2013 Cumberland School of Law Samford University

Consumerization Survey Report The Consumerization of IT

Bring Your Own Device Security and Privacy Legal Risks

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

DATA AND PAYMENT SECURITY PART 1

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

BYOD Policies: A Litigation Perspective

Bring Your Own Device Mobile Security

BYOD Privacy and Security in Europe

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

RUNNING HEAD: BRING YOUR OWN DEVICE 1

Mobile Security & BYOD Policy

U.S. Cellular Mobile Data Security. User Guide Version 00.01

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks

Systems Manager Cloud Based Mobile Device Management

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

BYOD: End-to-End Security

Bell Mobile Device Management (MDM)

How to Practice Safely in an era of Cybercrime and Privacy Fears

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

Guideline on Safe BYOD Management

"Bring Your Own Device" Brings its Own Challenges

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition

Cloud Services and Business Process Outsourcing

Policy Outsourcing and Cloud Based File Sharing

STRONGER AUTHENTICATION for CA SiteMinder

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley (503)

Cloudifile: Frequently Asked Questions

A number of factors contribute to the diminished regard for security:

Mobile Content Collaboration and its Benefits Across Your Enterprise. A Good Technology Whitepaper

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida

KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE

How To Manage A Mobile Device Management (Mdm) Solution

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

5 Things You Need to Know About ipad in the Enterprise

INFORMATION SYSTEM GENERAL USAGE POLICY

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

My CEO wants an ipad now what? Mobile Security for the Enterprise

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

Top Ten Technology Risks Facing Colleges and Universities

How To Backup and Copy Data Between ios Devices

Transcription:

Business or Pleasure: The Challenges of Bring Your Own Device Policies in the Workplace Presented by: Gavin Appleby, Littler, Atlanta Dionysia Johnson-Massie, Littler, Atlanta

What Is BYOD? In the past: Companypurchased devices are linked directly to employer s computer system, employees used separate personal and work phones Current trend: Dual-Use devices used for both business and personal activities

Why Does It Matter? Ownership of the device used to store the data affects the employer s ability to control the device and the data Bring your own disaster?

Who is Doing It? Some of the largest corporations, including IBM, Kraft, Cisco & Lockheed are implementing BYOD policies BYOD is appealing to small and mid-sized employers, as well Recent survey found that 75% of companies allow employees to use their own personal devices for business (Aberdeen)

Why? Reducing expenses for employers Improving employee engagement Aiding in the recruitment of new employees Solving the two pocket problem Innovation to reduce costs and promote collaboration

Also Creates Risks and Challenges for Employers Data-Related Risks Security of company data Privacy of employee data Records management Contractual obligations ediscovery Trade Secret Protection Contingent Workers

Also Creates Risks and Challenges for Employers Behavior-Related Risks Performance management EEO Wage & Hour Workplace Safety Labor International

Recent BYOD Developments Fatal flaws: Flaw in latest update to iphone operating system (version 6.1) software causes BYOD chaos, many employers recommending against the update for BYOD devices Root of the problem: Users can unlock administrative features on devices by rooting or jailbreaking, which causes a BYOD headache for employers who may lose security control

Your Experiences with BYOD

Your Experiences with BYOD What approach has your company taken to the BYOD issue? Restricts to company-owned devices? Allows some employees to connect personal devices but process is ad hoc? Has a BYOD policy? Has a Bring Your Own Computer (BYOC) policy?

HR and Employment Law Issues

HR and Employment Law Issues

The Data Issues

Data Is Heavily Regulated Security Laws and Regulations Encryption Breach notification Secure data destruction Record retention Employee privacy rights Contractual obligations Indirectly regulated Trade secret protection ediscovery obligations

Security for Company Data Loss or theft of devices Lost and stolen equipment accounted for 31% of breaches Malware Increased use of malware targeting the Android platform Friends and family Legal risks associated with third party access to confidential information through BYOD

Security for Company Data Gateway to the cloud Applications such as Dropbox and Google Drive provide free and convenient access to the cloud, with legal risk Employee ownership of the account with the service provider will limit company access to its data

Privacy of Employee Data Wiping employee device without consent Computer Fraud and Abuse Act State computer trespass laws Accessing data stored with online service providers Stored Communications Act Inability to access data without lawful consent of account holder Apps may store access credentials Data you may not want to see Employee s privileged communications

Record Retention and Destruction Automatic deletion procedures? Data hoarding issues

Trade Secret Protection 60 percent of American workers who left their employers [in 2008] took some data with them. (Economist) Misappropriation may be harder to prove Use or disclosure will be the focus Access to the devices will be a challenge

ediscovery Challenges Locating the data Access to the device Collection challenges

Obligations Follow the Data

A Few BYOD Scenarios

What Are the Legal Risks? Scenario #1 Employees at your company are excited to learn about the new BYOD policy. John, a non-exempt administrative assistant, asks to have his Android phone connected to receive work emails so he can stay connected outside of work hours. Any problems? a) Yes, this could create an off the clock problem under the Fair Labor Standards Act (FLSA) b) No, John should be encouraged to read and respond to emails promptly c) No, responding to emails does not qualify as work time under the FLSA

What Are the Legal Risks? Scenario #1 Employees at your company are excited to learn about the new BYOD policy. John, a non-exempt administrative assistant, asks to have his Android phone connected to receive work emails so he can stay connected outside of work hours. Any problems? a) Yes, this could create an off the clock problem under the Fair Labor Standards Act (FLSA) b) No, John should be encouraged to read and respond to emails promptly c) No, responding to emails does not qualify as work time under the FLSA

What Are the Legal Risks? Scenario #2 A company plans to terminate an employee for poor performance. This employee routinely accesses the company s confidential and proprietary documents. The IT department would like to remotely wipe (i.e., erase) the employee s BYOD iphone following the termination. Any problems with that approach? a) No problem, wipe away! b) Cannot wipe personal device under any circumstances c) Depends - what does the employer s policy say?

What Are the Legal Risks? Scenario #2 A company plans to terminate an employee for poor performance. This employee routinely accesses the company s confidential and proprietary documents. The IT department would like to remotely wipe (i.e., erase) the employee s BYOD iphone following the termination. Any problems with that approach? a) No problem, wipe away! b) Cannot wipe personal device under any circumstances c) Depends - what does the employer s policy say?

What Are the Legal Risks? Scenario #3 An employee asks whether she can install the mobile game Angry Birds, Star Wars Edition on her BYOD device. What is your response? a) Go for it the employee owns the device b) Stop! Angry Birds could make the employee less productive c) Depends on whether the employee s job duties involve launching birds as projectiles

What Are the Legal Risks? Scenario #3 An employee asks whether she can install the mobile game Angry Birds, Star Wars Edition on her BYOD device. What is your response? a) Go for it the employee owns the device b) Stop! Angry Birds could make the employee less productive c) Depends on whether the employee s job duties involve launching birds as projectiles

What Are the Legal Risks? Scenario #4 An employee, Jane, claims that she is receiving explicit and harassing text messages from her co-worker, Frank. Both employees have BYOD devices but do not typically use text messages for work communications. You are conducting an investigation of Jane s allegations should you ask the IT department to remotely download text messages from Jane and/or Frank s phones? a) Yes, employers have a right to download texts from BYOD devices b) No, the texts are private, non-work communications c) No, the better approach would be to ask Jane to show you the offending texts

What Are the Legal Risks? Scenario #4 An employee, Jane, claims that she is receiving explicit and harassing text messages from her co-worker, Frank. Both employees have BYOD devices but do not typically use text messages for work communications. You are conducting an investigation of Jane s allegations should you ask the IT department to remotely download text messages from Jane and/or Frank s phones? a) Yes, employers have a right to download texts from BYOD devices b) No, the texts are private, non-work communications c) No, the better approach would be to ask Jane to show you the offending texts

Recommendations

Recommendations Plan the program Technical controls Policies Operating procedures and capabilities Educate and train

Recommendation: Decide whether all employees should be permitted to participate in a BYOD program or whether certain groups should be excluded.

Recommendation: Limit use of the cloud if employee has access to confidential/proprietary information or documents.

Recommendation: Install Mobile Device Management software on dual use devices.

Recommendation: Require employees to consent to the company s access to their data on the device.

Recommendation: Modify or create Employee Agreements.

Recommendation: Restrict employees from using cloudbased apps, cloud-based backup, or synchronizing with home PCs for work-related data.

Recommendation: No use by friends and family members.

Recommendation: Revise exit interview processes.

Questions?

Thank You! Gavin Appleby Littler Mendelson, P.C. Atlanta Office 404.760.3935 gappleby@littler.com Dionysia Johnson-Massie Littler Mendelson, P.C. Atlanta Office 404.760.3901 djmassie@littler.com