Jason Atchley : Data Security : How to Guard Against Data Breaches in a BYOD World


jason atchley


How to Guard Against Data Breaches in a BYOD World

While BYOD programs have many benefits for employees, they can be detrimental to an employer.

Marlisse Silver Sweeney, Law Technology News

August 29, 2014    | 0 Comments

Shot of mobile device consists of laptop computer, mobile phone, and tablet

Bring you own device doesn’t mean bring in your own security breach, said Foley & Lardner of counsel Mark Neuberger (http://www.foley.com/mark-j-neuberger/) in this recent blog post. “As technology continues to evolve, so must your policies,” he emphasized, and noted that while BYOD programs have many benefits for employees, such as increased productivity, improved communications and facilitated remote working, they can also be detrimental to a corporation.
To avoid pitfalls, Neuberger suggests that before any device is brought in, policies and guidelines have been drafted and distributed amongst the company. These should address all the uses of technology, such as how devices track and capture data and work as cameras, recorders and mobile storage units. He suggests prohibiting taking photographs inside plants to protect technology. These policies should then be signed by each employee, somewhat like an employment agreement, he said.
The next step, is preparing for the inevitable—data loss. Devise strategies and make it known companywide that employees must disclose a breach when they know of one. “Getting employees to promptly tell you they have lost their device is the first practical hurdle to overcome,” he said. The next? Getting senior executives on board. Since they’re the ones dealing with the most sensitive information, and as Neuberger says, “operate with less supervision than others,” it’s imperative they understand the BYOD policies and procedures.
Attorney Marlisse Silver Sweeney is a freelance writer based in Vancouver. Twitter: @MarlisseSS.

Read more: http://www.lawtechnologynews.com/id=1202668502675/How-to-Guard-Against-Data-Breaches-in-a-BYOD-World#ixzz3CACW7QEz


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: