Use of Mobile Apps in the Workplace:



Similar documents
Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management.

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley (503)

Bring Your Own Device (BYOD) and Mobile Device Management

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

BYOD. Bring Your Own Device - Mobile Device Management.

BYOD Policy for [AGENCY]

Don t Let A Security Breach Put You Out of Business

A 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from

Mobile Health Apps 101: A Primer for Consumers. myphr.com

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

A Guide to MAM and Planning for BYOD Security in the Enterprise

BYOD BEST PRACTICES GUIDE

Hands on, field experiences with BYOD. BYOD Seminar

How To Make Bring Your Own Device A Plus, Not A Risk

Codeproof Mobile Security & SaaS MDM Platform

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

Adams County, Colorado

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Practical Legal Aspects of BYOD

Bring Your Own Device (BYOD) Policy

BYOD: Bring Your Own Device Advantage, Liability or Both?

Tuesday, June 5, 12. Mobile Device Usage

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

HIPAA Requirements and Mobile Apps

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

Jay Cawley PSU ID#: JSC5286. Erasmo Vargas Jr PSU ID#: EMV5125. Sean Bowers PSU ID#: SVB5441

Tom Schauer TrustCC cell

My CEO wants an ipad now what? Mobile Security for the Enterprise

Mobile Device Security

Mobile Device Usage and Agreement Policy

Mobile Devices Policy

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation

Deep Dive BYOD, COPE & MDM

Data Protection Act Bring your own device (BYOD)

What Is BYOD? Challenges and Opportunities

How To Manage A Mobile Device Management (Mdm) Solution

BYOD in the Enterprise

BYOD: End-to-End Security

Electronic Communication In Your Practice. How To Use & Mobile Devices While Maintaining Compliance & Security

Why Lawyers? Why Now?

EMBRACING THE AGE OF MOBILITY

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Securing Corporate on Personal Mobile Devices

Internet threats: steps to security for your small business

The Cloud-Enabled Social Mobile Enterprise. Neil Florio, Fiberlink Andrew Borg, Aberdeen Group

Do you want to mobilize your entire work process efficiently? Do you want to protect your most valuable asset data?

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Use of tablet devices in NHS environments: Good Practice Guideline

Safe-Guarding Client Information Basic Data Security Training for Lawyers

10 Quick Tips to Mobile Security

IT Resource Management vs. User Empowerment

Mitigating Bring Your Own Device (BYOD) Risk for Organisations

Mobility Impact on the Enterprise

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

A framework for auditing mobile devices

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

[BRING YOUR OWN DEVICE POLICY]

Mobile Security & BYOD Policy

Why Encryption is Essential to the Safety of Your Business

Enterprise Mobility as a Service

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

BRING YOUR OWN DEVICE. Protecting yourself when employees use their own devices for business

Mobile Security Standard

CHOOSING AN MDM PLATFORM

The CIO s Guide to HIPAA Compliant Text Messaging

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Security and Compliance challenges in Mobile environment

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

BYOD Policy. Handout

How To Understand The Bring Your Own Device To School Policy At A School

Mobile Device Security Risks and RemediaAon Approaches

RUNNING HEAD: BRING YOUR OWN DEVICE 1

HELPFUL TIPS: MOBILE DEVICE SECURITY

The Guide to Implementing a BYOD Policy at Your Company An ebook by Your Friends at UTG

Choosing an MDM Platform

Mobile Devices in Healthcare: Managing Risk. June 2012

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

If you can't beat them - secure them

Guideline on Safe BYOD Management

BYOD and Mobile Device Management

County of Grande Prairie - Information Systems

Chris Boykin VP of Professional Services

SURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Mobile Application Security Sharing Session May 2013

Cyber Security. John Leek Chief Strategist

Symantec Mobile Management Suite

IT Resource Management & Mobile Data Protection vs. User Empowerment

The Challenges of Implementing a Bring Your Own Device Policy

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

A Guide to Consumerization & Building a BYOD Policy June 2012

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE.

Transcription:

Use of Mobile Apps in the Workplace: PRIVACY & SECURITY ADAM D.H. GRANT AGRANT@ALPERTBARR.COM

Cell Phone & Tablet Ownership 91% of American adults own a cell phone 56% have smartphones Of Americans aged 16+ 35% own a tablet computer 24% own an e-reader 43% own a tablet computer OR e-reading device Source: Pew Internet Spring Tracking 2013

He s Working! Of the world s 7 billion population, 6 billion have cell phones.

Cell Phone Usage o 67% Use their smartphone everyday o 83% Don t leave home without their device o Location of use: 96% Home 84% On the go 71% Work o What percentage of people would rather give up TV than their smart phone? 36%

Cell Phone Activities The % of cell phone owners who use their cell phones to: Take a picture 82% Send or receive text messages 80% Access the internet 56% Record a video 44% Download apps 43% Source: Pew Research Center s Internet & American Life Project

Tablet Use Activities The % of tablet users who use tablets to: 84% Check Email 57% Find & Install Apps 57% Look up information 24% Manage Finances 18% View Documents Source: Google Research Understanding Tablet Use: A Multi-Method Exploration

Source: Google Our Mobile Planet USA

App Uses Originally offered for general productivity and information retrieval Email Contacts Management Calendar Weather Information Increased consumer demand = Rapid expansion into other categories GPS & Location Based Services Digital Media Publication Mobile Gaming Banking Online Purchasing Capability Social Networking

Advantages of Mobile App Use in the Workplace 1. Increased Efficiency Easy Access to Information Real Time Connectivity = Quick Response Time 2. Increased Productivity Ease of use Function specific design 3. Improved Time Management Automatic Reminders Multi-tasking capabilities

App Security Issues Source: HP - go.pronq.com

App Privacy Issues What types of data do apps typically access? Phone & Email Contacts Call Logs Internet Data Calendar Data Device Location Device Unique ID s Information about how you use the app itself Source: www.onguardonline.gov

Smartphone Owners and Security Measures Key Stats - May 2013 69% Do NOT Back Up Their Phone Data 64% Do NOT Use a Screen Lock 15% Install Antivirus Applications 22% Use Software That Can Locate Their Lost or Stolen Phone 8% Use Applications That Can Wipe Out The Content of Their Phone Remotely 39% Are NOT Using Any of the Protective Measures Outlined Source: Consumer Reports

Mobile Devices Invade the Workplace How many employees use their personal devices for business? Smart Phone 41% Tablet 37% Source: IDG Global Solutions 2013 Mobile Survey

Mobile Devices Invade the Workplace Is Your Personally / Privately Purchased / Owned Device Fully Supported by Your Company s IT Department? 46 % 54% YES NO 36% 64% Smartphone Tablet Source: IDG Global Solutions 2013 Mobile Survey

Vulnerability by the Numbers A December 2013 McAfee Survey found that: 80% of survey respondents admit to using non-approved Software-as-a-Service (SaaS) application in their jobs Nearly 35% of all SaaS applications used within the enterprise are non-approved 39% of IT respondents use unauthorized SaaS because it allows me to bypass IT processes 18% of respondents agreed that IT restrictions make it difficult to do my job

What Does This Mean for Your Company?

Potential Hazards Company Liability Breach of Security Network Protections Malware Lack of Company Control Data Safety o Handling & Storage of Consumer Data o Company Sensitive Information

How to Protect Your Company Risk: O Companies often do not know where data and other information are. Solution: Implement a centralized way of managing data Example: Mobile Device Management (MDM) Program Easier to protect the data when you know where it is Source: Enterprise Networking Planet

How to Protect Your Company Risk: O Mobile device security is usually neglected. Solution: Mandate Malware Protection Software on Mobile Devices Devices should be encrypted and authenticated The best way to stop risk is to decide what information and apps can be on the device, and if it shouldn t be there BLOCK IT. Source: Enterprise Networking Planet

How to Protect Your Company Risk: O Lack of employee knowledge and education regarding risks involved in having sensitive data on devices. Solution: Educate employees regarding: What apps and devices are authorized What apps and devices are NOT authorized Risks of using unsecured apps and devices Source: Enterprise Networking Planet

Risk: How to Protect Your Company O It is an act of trust to give sensitive information to employees specifically through their mobile device - and not all employees will honor that trust. Solution: Access should be given to only those employees who need it, when they need it. If data is highly sensitive, it should be monitored and controlled. Data transfers should be monitored and restricted. Source: Enterprise Networking Planet

Risk: How to Protect Your Company OLack of a governance framework Solution: Develop and Implement a Company Mobile Device Use Policy Implement a security policy that manages all stages of risk from installation to retirement of devices. Sample elements to include in company policy: Remote wipe capability in the event of loss or theft of device Minimum password protection/encryption standards User responsibility Enforcement of policy Employee Acceptance of Company Mobile Device Use Policy Source: Enterprise Networking Planet

Security and Protection Game Plan Implement a centralized way of managing data Mandate Malware Protection Software on ALL Mobile Devices Used for Work & Accessing Company Network Educate employees regarding risks of use of unauthorized and unsecured devices Provide lists of Whitelisted & Blacklisted Apps Protect company data by monitoring and restricting access to only those who need it

Security and Protection Game Plan And most importantly Communicate company expectations and employee responsibility by Developing and Implementing a Company Mobile Device Use Policy

BYOD: Bring Your Own Device Employer Question: How do I secure information on a device that I don t own? PROS: Employee (EE) owns devices and pays for cellular plan Employer (ER) does not necessarily provide IT support for device ER does not necessarily have to replace device if it is lost, stolen or damaged. CONS: ER does NOT have much control over devices (i.e. how it s used & who uses it) Employer does not have explicit rights to view/inspect device If EE/ER relationship terminates, it may be difficult for ER to retrieve company sensitive data

COPE: Company Owned Personal Enabled Employer Question: How can I loosen my grip for my employees to use the devices for personal use? PROS: Employer (ER) owns devices and pays for cellular plan Empoyee (EE) has privilege of using device for some personal use ER property therefore ER may implement control over device and employ tracking, remote wipe and use monitoring capabilities (with sufficient disclosure to employees usually via company policy) CONS: Expense - Cost of device (acquisition & replacement in event of loss or theft) and IT support ER may have greater liability if device is used in misbehavior

Adam D.H, Grant works with app developers across the nation to prevent litigation and ensure compliance with privacy and data security issues. If litigation escalates to trial, Adam is an experienced trial lawyer having litigated matters in both state and federal courts. His successes include obtaining a $6M jury verdict on behalf of his client after a three-week jury trial. When defending a client against a multi-million dollar lawsuit, Adam obtained a favorable verdict for his client when faced with a $3M demand at trial. Adam has considerable expertise in complex business litigation. He has presented oral arguments before the California Court of Appeals on numerous occasions. Adam D.H. Grant agrant@alpertbarr.com 818-881-5000