Tuesday, September 2, 2014

Jason Atchley : Data Security : How to Guard Against Data Breaches in a BYOD World

How to Guard Against Data Breaches in a BYOD World

While BYOD programs have many benefits for employees, they can be detrimental to an employer.
, Law Technology News
    | 0 Comments

Shot of mobile device consists of laptop computer, mobile phone, and tablet
Bring you own device doesn’t mean bring in your own security breach, said Foley & Lardner of counsel Mark Neuberger (http://www.foley.com/mark-j-neuberger/) in this recent blog post. “As technology continues to evolve, so must your policies,” he emphasized, and noted that while BYOD programs have many benefits for employees, such as increased productivity, improved communications and facilitated remote working, they can also be detrimental to a corporation.
To avoid pitfalls, Neuberger suggests that before any device is brought in, policies and guidelines have been drafted and distributed amongst the company. These should address all the uses of technology, such as how devices track and capture data and work as cameras, recorders and mobile storage units. He suggests prohibiting taking photographs inside plants to protect technology. These policies should then be signed by each employee, somewhat like an employment agreement, he said.
The next step, is preparing for the inevitable—data loss. Devise strategies and make it known companywide that employees must disclose a breach when they know of one. “Getting employees to promptly tell you they have lost their device is the first practical hurdle to overcome,” he said. The next? Getting senior executives on board. Since they’re the ones dealing with the most sensitive information, and as Neuberger says, “operate with less supervision than others,” it’s imperative they understand the BYOD policies and procedures.


Read more: http://www.lawtechnologynews.com/id=1202668502675/How-to-Guard-Against-Data-Breaches-in-a-BYOD-World#ixzz3CACW7QEz



No comments:

Post a Comment