How to make sure your data doesn’t go out the door when your BYOD worker leaves the firm
The bring-your-own-device (BYOD) trend has been touted as a great workforce enabler but is equally seen as security headache for many workplaces.
Your best move is to plan ahead.
Here are some issues to consider:
- Set an appropriate and realistic definition of “acceptable business user” that will cover devices in the BYOD program and set limits on activities that directly or indirectly benefit business
- Come up with a realistic and acceptable definition and limits of “acceptable personal use.
- Define what company data and resources may be accessed with personal devices
- Now that some manufacturers offer features that segregate personal and corporate space on their mobile devices like BlackBerry’s BB10 Balance and Samsung’s Knox, company should consider how these developments will affect their BYOD policies
- Determine a schedule when devices should be handed to IT for configuration of work-related apps and accounts
- Make a list of security requirements that have to be met before personal devices are allowed on the BYOD program
- Make a list of procedures to be followed when devices are lost, stolen, misplaced. This could include procedures on what to do when an employee’s employment is terminated
Sponsor: IBM Canada
The software edge
Five key trends were identified as critical to competitiveness, each underscoring the role of effective software development in a global CEO survey undertaken to determine how organizations view top technology trends and their role in market strategy.