How to make sure your data doesn’t go out the door when your BYOD worker leaves the firm
The bring-your-own-device (BYOD) trend has been touted as a great workforce enabler but is equally seen as security headache for many workplaces.
Your best move is to plan ahead.
Here are some issues to consider:
- Set an appropriate and realistic definition of “acceptable business user” that will cover devices in the BYOD program and set limits on activities that directly or indirectly benefit business
- Come up with a realistic and acceptable definition and limits of “acceptable personal use.
- Define what company data and resources may be accessed with personal devices
- Now that some manufacturers offer features that segregate personal and corporate space on their mobile devices like BlackBerry’s BB10 Balance and Samsung’s Knox, company should consider how these developments will affect their BYOD policies
- Determine a schedule when devices should be handed to IT for configuration of work-related apps and accounts
- Make a list of security requirements that have to be met before personal devices are allowed on the BYOD program
- Make a list of procedures to be followed when devices are lost, stolen, misplaced. This could include procedures on what to do when an employee’s employment is terminated
Sponsor: IBM Canada Ltd
Moving from the back office to the front lines: CIO insights from the Global C-suite Study
This report from IBM’s Institute for Business Value summarizes the results of more than 4,000 interviews with C-suite executives worldwide about the changing role of technology and the Chief Information Officer (CIO).