Risk Management
  • Home
  • Features
  • Columns
    • ForeFront
    • Last Word
    • Findings
    • Q&A
    • Time Line
    • Risk Atlas
    • Fine Print
  • Topics
    • Insurance
    • Enterprise Risk Management
    • Strategic Risk Management
    • Natural Catastrophes
    • Cyber Risk
    • Pandemics
    • Emerging Risks
    • International
  • Blog
  • Digital Issue
  • Subscribe
  • RIMS.org
  • Home
  • 2012
  • June
  • 1
  • BYOD: The Risks of Bring Your Own Device

BYOD: The Risks of Bring Your Own Device

Wayne Wong
June 1, 2012August 1, 2012 No Comments
Mobile Tech

For many employees, the line between work and personal life has grown increasingly murky. Many now use their own tech gadgets to do business as often as they use company property. On the one hand, that can save the company money on hardware and make employees more efficient. But it also presents serious security risks. Short of banning employees from accessing work files with personal equipment altogether, there are five things businesses must keep in mind when it comes to employees using their own mobile device in the workplace.

1. Have a Policy & Communicate It

Take control of managing the retention of documents, especially business-critical information. To ensure a strong, manageable approach to data retention, companies need to create and distribute a policy that outlines what is and is not acceptable for employees to do when it comes to personal mobile devices, applications and other tech tools.

Companies should also organize periodic training sessions that cover issues such as social media usage, protecting personally identifiable information, creating strong passwords and maintaining proper privacy settings so that employees can clearly understand the appropriate and inappropriate uses of their personal devices.

2. Know Regulatory Requirements

When you are utilizing an organization’s device, regulatory requirements for storing documents typically apply. This concept must also be applied to people using personal devices to do company work. Companies need to work with employees to ensure that all devices, both personal and professional, meet regulatory standards.

3. Back Up Often

Users who opt to use a personal device at work need to understand that their employer is not responsible for managing and protecting their personal data. Most consumers don’t run out and buy a backup system for their personal devices, but they should be aware of the many options available to them and proactively look for a backup scenario that works for their lifestyle.

For example, an easy and effective way to back up data is through an online system. This gives users faster recovery if an issue does occur and provides multiple access points to data so employees don’t have to carry around physical storage such as a USB stick or external hard drive. Organizations should consider creating official backup/archiving repositories that mobile devices can access, such as cloud-based storage solutions, rather than leave individuals to find their own solutions.

4. Be Aware of Your “Personas”

For most, organizing your data and respective communication accounts to support different “personas” isn’t an issue. However, business professionals should always try to keep their business and personal life separate. The advent of social media has made this more difficult, as many people now have one account where they showcase who they are in both lives. As these personas blend into one, users often make comments or post status updates before thinking about who they represent as an employee.

5. Know Who Owns What

With the evolution of personal devices, it is very easy for users to have access to multiple personas at their fingertips both in and out of the workplace. Users should be advised that any work done on a personal device related to business belongs to the business and not the user. If the employee should lose the device or it should fall into the wrong hands, the user’s workplace can reserve the right to wipe the data remotely. Organizations need to make employees aware of the policies for the authorized work-storage environment from the beginning.

Post navigation

The Strategic Disconnect
Foreign Corrupt Practices Act Claims

Related Articles

FF Insurance Cases 2020 Legal Risk

Three Key Insurance Law Decisions from 2020

Joshua Gold
December 21, 2020December 8, 2020 No Comments
FF Future RM Risk Management

COVID-19 and the Next Generation of Risk Management

Dr. Kirk D. Fleming and Candace Dowling
December 16, 2020November 24, 2020 No Comments
FF UK RTW Coronavirus

Risk Management Lessons from the U.K.’s Return to Work

Adam Penman and Dan Peyton
December 9, 2020November 24, 2020 No Comments

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

two × five =

Current Issue

Don’t Miss Out

With many continuing to work remotely, keep in mind that you can always update your mailing address by clicking here to ensure future issues of Risk Management are sent directly to you.

RSS Risk Management Monitor blog

  • How to Make the Most Out of 2021’s Virtual Conferences for Rising Risk Professionals and Employers December 30, 2020
  • After COVID, Cyberrisks Top Agenda for Risk Professionals in India, Marsh and RIMS Report December 21, 2020
  • PAID Act Becomes Law, Fixing Medicare Secondary Payer Flaw December 17, 2020
  • Three Ways to Reduce Insider Threat Risks During COVID-19 November 30, 2020
  • How Businesses Can Become More Eco-Responsible November 13, 2020
Copyright 2020. All rights reserved | Theme: OMag by LilyTurf Themes
  • About
  • Subscribe
  • Advertise
  • Contribute
  • Editorial Calendar
  • Contact