Вы находитесь на странице: 1из 15

Bring Your Own Device: Integrating tablet within the Enterprise

Click toTantleff Aaron edit Master subtitle style atantleff@foley.com 312.832.4367

2012 Foley & Lardner


2012 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321 N. Clark Street, Suite 2800, Chicago, IL 60654 LLP

Key Elements of a BYOD Strategy


n n n

22

Policy Training Enforcement

2012 Foley & Lardner LLP

33

Policy
n n

Business Case Developing an Approach


Anything Goes Approved Devices Only Stipend Ownership

n
LLP n

All Stakeholders Involved in Policy Development Integration with Existing Company Policies Draft and Understandable Policy

2012 Foley & Lardner

44

Training
n

Employee Training is Key

Designate a Go-To Person / Group for Questions Consider Follow-Up Emails / Memos to Highlight Key Areas

Consider when to Conduct and Repeat Training

2012 Foley & Lardner LLP

55

Enforcement
n n n n

Monitoring Compliance Employee Enforcement Technological Enforcement Ensure Related Company Policies are Followed

Litigation Holds Retention Trade Secret Protection

2012 Foley & Lardner LLP

66

Key Risks
n n n n

Mixing Business and Personal Data Information Security Software Licensing Issues Discovery/Border Searches and Seizures Repetitive Stress and Other Workplace Injuries Shared Use of Devises with NonEmployees Employee Disposal of Device

2012 Foley & Lardner LLP

Mixing Business and Personal Data


n n

77

Data Segregation the Future Privacy Concerns


Employee Third Parties

n n

Other data the Great American Novel Location Tacking Remote Wipe

2012 Foley & Lardner LLP

88

Information Security
n

n n n n

Extending Corporate Security Policy to BYOD Enforcing Security Policies on BYOD BYOD Security Software Remote Wipe Tracking Malware on Mobile Devices

2012 Foley & Lardner LLP

99

Software Licensing
n

Company Software

Which Applications? What do the Licenses Say? Ex. Microsoft Office Home

Employee Personal Software

Get Ready for Audits

2012 Foley & Lardner LLP

Discovery/Border Searches/Seizures
n

1010

BYOD are fair game in litigation


Employees must understand

n n n

Litigation hold Cost of responding to discovery Beware at the border

Data and devices can be copied or seized

2012 Foley & Lardner LLP

1111

Worker Injuries
n

n n

Repetitive Stress and other Work Related Injuries can arise from BYODs. Disclaim Liability Urge Employees to Follow Vendor Recommendations Check Insurance Coverages

2012 Foley & Lardner LLP

1212

Shared Use of Device


n n

Friends, Family, Neighbors, etc. Risk cannot be Completely Controlled


Impossible to Obtain Consent Policy Coverage

n n

Security Implications Company Proprietary and Confidential Information at Risk Privacy and other Issues

2012 Foley & Lardner LLP

1313

Employee Disposal
n n

EOL of BYOD eBay Threat, Garage Sales, Craigs List

Army hardware being sold on streets of Afghanistan Broker-Dealer Blackberry on eBay

Company Notice of Sale or Transfer

Policy Issue

2012 Foley & Lardner LLP

Terminated Employees Likely to be

1414

Summary
n n

BYOD is here to stay Develop Workable Policies that Support the Business Case Train Employees to Ensure they Understand their Obligations; Follow-up Develop and Institute Enforcement Procedures Understand Key Risks

2012 Foley & Lardner LLP

Questions & Contact Information


Aaron Tantleff Information Technology & Outsourcing Foley & Lardner LLP atantleff@foley.com 312.832.4367

1515

2012 Foley & Lardner LLP

Вам также может понравиться