Академический Документы
Профессиональный Документы
Культура Документы
22
33
Policy
n n
n
LLP n
All Stakeholders Involved in Policy Development Integration with Existing Company Policies Draft and Understandable Policy
44
Training
n
Designate a Go-To Person / Group for Questions Consider Follow-Up Emails / Memos to Highlight Key Areas
55
Enforcement
n n n n
Monitoring Compliance Employee Enforcement Technological Enforcement Ensure Related Company Policies are Followed
66
Key Risks
n n n n
Mixing Business and Personal Data Information Security Software Licensing Issues Discovery/Border Searches and Seizures Repetitive Stress and Other Workplace Injuries Shared Use of Devises with NonEmployees Employee Disposal of Device
77
n n
Other data the Great American Novel Location Tacking Remote Wipe
88
Information Security
n
n n n n
Extending Corporate Security Policy to BYOD Enforcing Security Policies on BYOD BYOD Security Software Remote Wipe Tracking Malware on Mobile Devices
99
Software Licensing
n
Company Software
Which Applications? What do the Licenses Say? Ex. Microsoft Office Home
Discovery/Border Searches/Seizures
n
1010
n n n
1111
Worker Injuries
n
n n
Repetitive Stress and other Work Related Injuries can arise from BYODs. Disclaim Liability Urge Employees to Follow Vendor Recommendations Check Insurance Coverages
1212
n n
Security Implications Company Proprietary and Confidential Information at Risk Privacy and other Issues
1313
Employee Disposal
n n
Policy Issue
1414
Summary
n n
BYOD is here to stay Develop Workable Policies that Support the Business Case Train Employees to Ensure they Understand their Obligations; Follow-up Develop and Institute Enforcement Procedures Understand Key Risks
1515