How to make sure your data doesn’t go out the door when your BYOD worker leaves the firm
The bring-your-own-device (BYOD) trend has been touted as a great workforce enabler but is equally seen as security headache for many workplaces.
Your best move is to plan ahead.
Here are some issues to consider:
- Set an appropriate and realistic definition of “acceptable business user” that will cover devices in the BYOD program and set limits on activities that directly or indirectly benefit business
- Come up with a realistic and acceptable definition and limits of “acceptable personal use.
- Define what company data and resources may be accessed with personal devices
- Now that some manufacturers offer features that segregate personal and corporate space on their mobile devices like BlackBerry’s BB10 Balance and Samsung’s Knox, company should consider how these developments will affect their BYOD policies
- Determine a schedule when devices should be handed to IT for configuration of work-related apps and accounts
- Make a list of security requirements that have to be met before personal devices are allowed on the BYOD program
- Make a list of procedures to be followed when devices are lost, stolen, misplaced. This could include procedures on what to do when an employee’s employment is terminated
Sponsor: IBM Canada Ltd
Pushing the frontiers – CFO Insights from the Global C-suite Study
Based on a global survey of 576 CFO interviews, this whitepaper from IBM's Institute for Business Value provides analytical insights into the traits of leading CFOs and what they are doing to become more efficient, forward-looking and proficient at creating profitable growth.