A Balanced BYOD Policy is Better All RoundAdded on Nov 28, 2012 by
The addiction for tablets has gone right to the head of many organisations, with even hard-headed CEOs of global corporations falling for the style and convenience of tablet computing.
One analyst tells of a client whose CEO summoned the CIO to his office one day and demanded his iPad be supported -- right now. It was no use explaining that a Windows gadget would better fit in with the existing infrastructure and workflows -- the CIO had come face-to-face with the unmovable desire by CEOs and their staff to switch to using tablets for every business process, driving a coach and horses through all the CIO's defences -- the firewall, the codes of conduct, and the mutual concessions made when the CIO consented to letting users bring their own devices into work.
The tragedy is that CIOs will still be held responsible should personal or company information be leaked. It's not entirely their fault that a user downloaded Dropbox then unwittingly started distributing sensitive data all over the place, nor that a lawyer left his iPad in a bar and that confidential client information is now in the hands of a newspaper. But the CIO will be held legally responsible.
On the other hand, strict enforcement of company policy can put you in an equally tricky position. Wiping the boss's family photos off a mislaid iPad, though understandable from a compliance standpoint, could leave you open to legal action. Especially if they subsequently discover that their daughter borrowed it and change their story to say it was never reported lost in the first place. If you didn't record the conversation, how do you prove it wasn't your negligence that destroyed their personal property? In short, you could either face an FSA rap for compliance irregularities, or a civil case for damages from your boss.
"Until the legalities of device wiping are tested in the courts it will remain an area of uncertainty. It's one of the main factors that deters CIOs from implementing BYOD policies," says Paul Vlissidis, technical director at NCC Group.
Will the IT industry come up with an answer to this problem? Rob Sheppard, business client marketing manager at Intel, seems hopeful that the evolution of mobile technology will offer some answers.
"Towards the end of the year, when all the Android and Windows 8 devices come out, there should be much better choices available to the end user," says Sheppard of the Intel-powered devices. A shift in sentiment could help the CIO persuade users to rally around Windows, which could help the IT department regain control.
"We could see the IT department get a chance to put their foot down and specify a particular device that fits in with company workflows," says Sheppard.
Aside from raising their game on touch and user experience, Intel-based Windows tablet and smartphones could tighten up security controls with a new range of options. Lost devices could in future be stunned from the bootup process, the chipset paralysed by a remote command that would effectively turn any device into a brick. Anti-theft support developed by Intel will offer CIOs a more subtle range of options, says Sheppard. You could become a lot more selective about what you delete from a tablet, so that a departing employee wouldn't have to have their entire personal life deleted. Deep Defender technology, loaded at sub-operating system level, will identify destructive and dangerous behaviour a lot earlier too.
According to Andy Dancer, CTO at Trend Micro, the IT department's baseline security should be a combination of encryption, device partitioning and remote wiping, with users encouraged to back up personal information.
In future, promises Dancer, encryption will become part of the operating system, which will make enforcing company policy a lot easier.
Risking user revolt
The big danger is that the user experience will change, and that is when you lose the goodwill of the users. "Consumerisation and Apple's dominance of the tablet market should have taught us that user experience is everything. If we try to take the user backwards to a less optimal experience then I think they will look to find ways round it," warns Dancer.
Partitioning, while it is a logical solution, fails this usability test. Creating two devices in one, on the same hardware, means the user has to think which one they're in - which inevitably means some work will be done in the wrong part of the device. By definition it won't be easy to move your work from one device partition to the other, so there will be corporate information in the wrong place over which the company will have no control.
Education is essential for a successful mobile usage policy, says Christopher Davies, employment lawyer at national law firm Gateley. The problem is that few people understand that the content of their phone is the company's intellectual property.
"Employees' gadgets remain their property, but anything created on them for work purposes belongs to the company. That may sound obvious, but, if it is not clearly set out in a policy document it may lead to later disputes," says Davies.
You need to communicate, in as friendly a way as possible via presentations, awareness events of even by making a short film, the concept that any information created at work for work, whether documents, photos, notes or similar content, becomes the intellectual property of the company.
Mark Webber, a partner and head of technology at law firm Osborne Clarke, which specialises in advising digital businesses, has some pointers for devising policy.
Most legal traps associated with BYOD can be dealt with if there is good communication and consistent policy as long as the policy is communicated up-front, says Webber. Interfering with the end user's devices is the legal minefield you have to be wary of, and it's especially scary for those whose users are covered by European law.
"It is all too easy to fall foul of laws which prevent interception and the use of an individual's location without their consent," says Webber. "This consent ought to extend to all the possible interventions. It's not just about deleting information, it's about routine maintenance and updating software."
Any access to an employee's device ought to be subject to obtaining the prior informed consent of the employee. This should be given freely and voluntarily and employees should be fully informed up-front in a well prepared BYOD Policy.
Honest and up-front
You can protect yourself from the potential liability of wiping the boss's iPad if you have notified them up-front of aspects of BYOD policy, reminding them that the employer may exercise certain control rights like mandating strong passwords or auto-wipe of devices after a prescribed number of failed password attempts. Put it in writing that there will be no compensation in the event of loss of personal data or information from the device as a result of the employer's actions and remind people that it would be prudent to regularly back up device contents and data.
If a company allows their data to be transferred to another machine, they are responsible for it, says Norman Shaw, MD of ExactTrak. "The Information Commissioner is quite clear on this. The CIO will be ultimately held responsible for data which is lost via an employee's personal device," says Shaw.
"It is surprising that so few businesses alter their employees' contracts to reflect the BYOD trend and iron out any ambiguity over data security responsibility," says Shaw. "If employees are aware that transferring certain files onto their devices breaks their contracts, it may make them think twice before doing so."
- KPIT Partners With EMC to Transform Its Storage and Backup Environment
- HTC Launches Smartphone Ahead of Apple's Alleged iPhone Event
- Half of Australian SMBs Have Lost Work from Not Backing-up: Seagate
- Reconnaissance Code on Industrial Software Site Points to Watering Hole Attack
- China Orders Microsoft to Explain Windows, Office Practices Within 20 Days
- ISPs Offer Ways to Combat Online Copyright Infringement
- IBM and Monitise Join Forces to Offer Cloud-based Mobile Payment Platform
- Wipro Strengthens Gulf Presence Post Successful Project Implementations
- HP Enables Rapid Adoption and Deployment of SDDC Storage
- Can SDN Usher in Better IT Security?
- CryptoWall Ransom Trojan Has Infected 625,000 Systems, Says Dell SecureWorks
- As Tablet Growth Slows, Apple May Face a Year-long iPad Sales Contraction
- Intel Amps Up Desktop Performance With Its First 8-Core PC Chip
- Appeals Court Denies Oracle Request to Restore USD 1.3 Billion Judgment Against SAP
- Apple Will Keep Pushing for a Sales Ban on Samsung Products