SlideShare a Scribd company logo
Mobile Device Management
and BYOD
Charlie Hales and Nigel Robson
28th February 2014
Agenda
• What is Mobile Device Management
• Strategy
• What is a Mobile Device?
• Mobile Device Management vs Mobile Application
Management
• What is BYOD
• What can MDM/BYOD do for business?
• Where is your Data?
• Acceptable usage policy
• Defining the right solution
• Some solutions available
What is Mobile Device
Management?
• Secures, monitors, manages and supports
mobile devices of multiple operating systems,
service providers and enterprises
• Covers corporate and end user devices
• Includes anything that is mobile (could
include laptops, and non-windows devices).
Enabler for users to access internal systems
securely from any device and anywhere
• Enables BYOD
Part of Overall Strategy
• Build upon and integrate with existing policies
– Desktop
– Flexible and remote working
– Application
• Do you just use Windows devices?
• Need to manage any type of device?
• Any data management/classification in place
currently?
Part of Overall Strategy – Many
Devices, one solution?
Client Management MDM
Source Gartner
Virtualisation
What are mobile devices?
What are mobile devices?
This?
What are mobile devices?
This?
What are mobile devices?
This?
What are mobile devices?
Or this?
What are mobile devices?
It can be any of these!
What are mobile devices?
But also these!
Mobile Device Management vs
Mobile Application Management
MAM
• App delivery
• App security
• App updating
• User authentication
• User authorization
• Version checking
• Push services
• Reporting and tracking
MDM
• All previous plus…
• Remote Configuration
• Security –including identifying
compromised devices
• Backup/Restore
• Network Usage and Support
• Mobile asset tracking and
management
• Remote Lock and Wipe
• Device Provisioning
• Software Installation
• Troubleshooting and Diagnostic
Tools
• Policy Application
• Logging and Reporting
• Remote Control and Administration
What is BYOD?
• Save money
– Reduce costs
– Enable Flexible working
– Increase Productivity
– Increase Job satisfaction
• Reduces risk and increase Security
– Where is your data?
– Consider this also for existing laptops
What can MDM/BYOD do
for business?
Survey
• Who doesn’t have a smartphone?
• Who has a BlackBerry?
• Who uses their own smartphone for work
purposes?
• Is it managed by work?
• Are you sure?
BYOD Business Survey
Fully embrace
and support
12%
Embrace, but
user self support
39%
Limited BYOD
Strategy
21%
Trialing BYOD
18%
Do not support
BYOD 10%
Source: zkresearch.com
Where is your Data?
ICO Website
ICO Website
ICO Website
Data Classifications
Information
Category
Description Example Information Assets
Public Information which is or can be made public. Advertisements
Public web content
Proprietary Information which is restricted to internal access and protected from
external access. Unauthorised access could cause a drop in customer
confidence, could influence operational effectiveness, cause financial loss
or provide gain for competitors.
Internal presentations
Performance data
Source code
Proprietary knowledge
Confidential Information received from Customers, or sensitive information about
Customers and Staff.
Customer Data
Customer intellectual property
Customer documents
Customer backups
Internal reports
Restricted Highly sensitive information
Limited access to specific individuals
Passwords
HR & Payroll
Backups
Card Data
DPA Information
Data Classifications
Category Public Proprietary Confidential Restricted
Description: Prevent easy access without prolonged or
determined access to the device
Prevent access even with prolonged and
determined access to device
As per confidential and access is
restricted to specific individuals
Physical Media or Device
Printed Media ok In possession of staff or customer In possession of staff or customer, within
property
Held in the safe or secure ICT Server
room
Mobile Phone ok PIN Coded PIN Coded & Remote Wipe not normally acceptable
Laptop / Tablet ok User authentication Authentication & Encryption not normally acceptable
Portable Storage ok Encryption Encryption Held in a safe
PC ok User authentication Physically Secured within property or
Encrypted
Physically secured within property
Cloud Storage ok Encrypted Encrypted not normally acceptable
Encryption
• Device Encryption
– Technology and Device dependant
– The latest Windows devices will work with internal
PKI or external Certs
– IOS devices will work with Apple provided Certs
which can be imported into most MDM solutions
– Android has limitations
• Application encryption
– Managed through application development and
provisioning
Design your BYOD Acceptable Use
Policy
• Privacy
• Who pays for what
• Third Parties
• Work vs Play
– Out of hours
– During hours
• Company responsibilities for personal data
• Licencing
• HR
• Device Disposal
• Litigation
Defining the right solution
• What do you want to manage on the
device?
– Types of devices
– PIN
– Remote Wipe/Selective Wipe
– Apps
– Device/App Encryption
Defining the right solution
• What do you want to manage on the device?
– Integration with enterprise
applications
– Multi user profiles
– Separation of personal and work
data
– Internet access
– Advanced features
• Data usage
• GPS tracking
Example of device functionality
Content removed when
retiring a device
Windows 8.1 Windows Phone 8 iOS Android
Company apps and
associated data installed by
using Configuration
Manager and Windows
Intune
Uninstalled and sideloading
keys are removed.
In addition any apps using
Windows Selective Wipe
will have the encryption key
revoked and data will no
longer be accessible.
Uninstalled and data
removed.
Uninstalled and data
removed.
Apps and data remain
installed.
VPN and Wi-Fi profiles Removed. Not applicable. Removed.
VPN: Not applicable.
Wi-Fi: Not removed.
Certificates Removed and revoked. Not applicable. Removed and revoked. Revoked.
Settings Requirements removed. Requirements removed. Requirements removed. Requirements removed.
Management Client
Not applicable.
Management agent is built-
in.
Not applicable.
Management agent is built-
in.
Management profile is
removed.
Device Administrator
privilege is revoked.
Example for SCCM and Intune
Lots of solutions available
• Dependant on requirements
• Leverage what you already have if possible
• Exchange Active Sync
• SCCM with Intune
• Other MDM providers
– Apple device manager (IOS 7.1 still will have
limitations though)
– SaaS or on-premise
– Some examples. Good Technology, Citrix,
MobileIron, AirWatch (VMWare recent purchase)
Summary
• Develop the right strategy
• Define the requirements
• What can MDM/BYOD do for your
business?
• Data Classification Policy
• Acceptable usage policy
• Defining the right solution
• Choose the solution
Future Seminars
• Use what you already have to enable MDM
and BYOD on 25th April
• MDM and BYOD technology providers and
solutions on 23rd May
• ‘Joining the dots’ of your applications and
systems – The benefits of system integration
on 14th March
Questions?
Keep in Touch….
charlie.hales@waterstons.com
nigel.robson@waterstons.com
http://www.waterstons.com
@WaterstonsLtd

More Related Content

PPTX
Mobile device management and byod – major players
PPTX
Mobile device management and BYOD – simple changes, big benefits
PPTX
Enterprise Mobile Device Management (MDM)
PDF
Learnings while building Mobile Device Management [MDM]
PPT
Mobile Device Management
PPTX
A strategic view of mobile device management
PPTX
Mobile Device Managment
PDF
MDM- Mobile Device Management
Mobile device management and byod – major players
Mobile device management and BYOD – simple changes, big benefits
Enterprise Mobile Device Management (MDM)
Learnings while building Mobile Device Management [MDM]
Mobile Device Management
A strategic view of mobile device management
Mobile Device Managment
MDM- Mobile Device Management

What's hot (20)

PDF
Mobile Device Management for Dummies
PPTX
MDM - airwatch
PPTX
Pros and Cons of Mobile Device Management
PDF
Mobile Device Management for Office 365 - Atidan
PDF
Mobile device management ( MDM ) Software Solution
PPTX
Mobile device management presentation
PDF
Mobile Device Management (MDM)
PDF
Airwatch od VMware
PDF
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
PDF
Mobile Devices & BYOD Security – Deployment & Best Practices
PDF
Mobile Device Management Guide
PDF
Best practices of mobile technology leaders: Airwatch Connect 2013
PDF
AirWatch Solution Overview
PPTX
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
PPTX
10 Benefits of Mobile Device Managment
PPTX
Business Case Of Bring Your Own Device[ BYOD]
PDF
Mobile device management key components
PPTX
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
PPTX
LML Technologie offre les solutions de SOTI
ODP
Mobile Device Management for Dummies
MDM - airwatch
Pros and Cons of Mobile Device Management
Mobile Device Management for Office 365 - Atidan
Mobile device management ( MDM ) Software Solution
Mobile device management presentation
Mobile Device Management (MDM)
Airwatch od VMware
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Device Management Guide
Best practices of mobile technology leaders: Airwatch Connect 2013
AirWatch Solution Overview
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
10 Benefits of Mobile Device Managment
Business Case Of Bring Your Own Device[ BYOD]
Mobile device management key components
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
LML Technologie offre les solutions de SOTI
Ad

Viewers also liked (9)

KEY
Beyond App Store - Distribution of iOS Applications
PDF
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
PDF
Attacking and Defending Apple iOS Devices
PDF
Mobility at Work: Mobile Device Management
PDF
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
PPTX
Deploying windows 10 in the Enterprise
PDF
System Center Configuration Manager and Mobile Device Management
PDF
The Android vs. Apple iOS Security Showdown
PPTX
BYOD: Bring Your Own Device Implementation and Security Issues
Beyond App Store - Distribution of iOS Applications
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
Attacking and Defending Apple iOS Devices
Mobility at Work: Mobile Device Management
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
Deploying windows 10 in the Enterprise
System Center Configuration Manager and Mobile Device Management
The Android vs. Apple iOS Security Showdown
BYOD: Bring Your Own Device Implementation and Security Issues
Ad

Similar to Preparing for Mobile Device Management & Bring your Own Device (20)

PPT
OC CIO BYOD
PPT
OC CIO Roundtable BYOD
PPTX
Bring Your Own Device (BYOD)
PDF
Bring Your Own Device (BYOD)
PPTX
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
PDF
Security that works
PPTX
15Payne Presentation Mobile Best Practicestotal.pptx
PPTX
PPTX
Mobile Device Security
PPTX
Vmware-Vsat-MDM-AlphaAlliance_part3.pptx
PDF
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
PDF
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
PDF
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
PPTX
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
PDF
Mti byod wp_uk
 
PDF
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
PDF
The key business drivers for Enterprise Mobility
PDF
Web version-ab cs-book-bangalore
PDF
Web version-ab cs-book-bangalore
OC CIO BYOD
OC CIO Roundtable BYOD
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Security that works
15Payne Presentation Mobile Best Practicestotal.pptx
Mobile Device Security
Vmware-Vsat-MDM-AlphaAlliance_part3.pptx
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
Mti byod wp_uk
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
The key business drivers for Enterprise Mobility
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangalore

More from Waterstons Ltd (16)

PPTX
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
PDF
The Future of Work - Mike Waterston
PPTX
Collaboration in the Post SharePoint Era
PPTX
The Magical Project Manager
PPTX
BI: Beyond Intelligence
PPTX
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
PDF
North East Change Management Network- Organising building information so it i...
PPT
North East Change Management Network- Changing from paper based health record...
PPTX
How to Achieve Unified Communications Success
PPTX
‘Joining the dots’ of your applications and systems – the benefits of Integra...
PPTX
Consumer Experiences for Enterprise
PPTX
Capturing the Real Value of IT Service Management
PPTX
Mobile for business
PPTX
Messaging: Harnessing The Cloud
PPTX
Messaging:Protecting your Data and your Reputation
PPTX
Messaging: Zero Downtime Communications
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
The Future of Work - Mike Waterston
Collaboration in the Post SharePoint Era
The Magical Project Manager
BI: Beyond Intelligence
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
North East Change Management Network- Organising building information so it i...
North East Change Management Network- Changing from paper based health record...
How to Achieve Unified Communications Success
‘Joining the dots’ of your applications and systems – the benefits of Integra...
Consumer Experiences for Enterprise
Capturing the Real Value of IT Service Management
Mobile for business
Messaging: Harnessing The Cloud
Messaging:Protecting your Data and your Reputation
Messaging: Zero Downtime Communications

Recently uploaded (20)

PDF
Layer23-Switch.com The Cisco Catalyst 9300 Series is Cisco’s flagship stackab...
PPTX
ATL_Arduino_Complete_Presentation_AI_Visuals.pptx
PPTX
ERP good ERP good ERP good ERP good good ERP good ERP good
PPTX
Lecture-3-Computer-programming for BS InfoTech
PDF
How NGOs Save Costs with Affordable IT Rentals
PPTX
PROGRAMMING-QUARTER-2-PYTHON.pptxnsnsndn
PPTX
Fundamentals of Computer.pptx Computer BSC
PDF
Cableado de Controladores Logicos Programables
PPTX
English grade 10 st augusitne eoeoknkklm
PPTX
Embeded System for Artificial intelligence 2.pptx
PDF
Smarter Security: How Door Access Control Works with Alarms & CCTV
PPTX
quadraticequations-111211090004-phpapp02.pptx
PPTX
Syllabus Computer Six class curriculum s
PDF
Prescription1 which to be used for periodo
PPTX
02fdgfhfhfhghghhhhhhhhhhhhhhhhhhhhh.pptx
PPT
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
PPTX
title _yeOPC_Poisoning_Presentation.pptx
PPTX
STEEL- intro-1.pptxhejwjenwnwnenemwmwmwm
PDF
Colorful Illustrative Digital Education For Children Presentation.pdf
PDF
Chapter -24-By Dr Sajid Ali Ansari 2021.pdf
Layer23-Switch.com The Cisco Catalyst 9300 Series is Cisco’s flagship stackab...
ATL_Arduino_Complete_Presentation_AI_Visuals.pptx
ERP good ERP good ERP good ERP good good ERP good ERP good
Lecture-3-Computer-programming for BS InfoTech
How NGOs Save Costs with Affordable IT Rentals
PROGRAMMING-QUARTER-2-PYTHON.pptxnsnsndn
Fundamentals of Computer.pptx Computer BSC
Cableado de Controladores Logicos Programables
English grade 10 st augusitne eoeoknkklm
Embeded System for Artificial intelligence 2.pptx
Smarter Security: How Door Access Control Works with Alarms & CCTV
quadraticequations-111211090004-phpapp02.pptx
Syllabus Computer Six class curriculum s
Prescription1 which to be used for periodo
02fdgfhfhfhghghhhhhhhhhhhhhhhhhhhhh.pptx
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
title _yeOPC_Poisoning_Presentation.pptx
STEEL- intro-1.pptxhejwjenwnwnenemwmwmwm
Colorful Illustrative Digital Education For Children Presentation.pdf
Chapter -24-By Dr Sajid Ali Ansari 2021.pdf

Preparing for Mobile Device Management & Bring your Own Device

  • 1. Mobile Device Management and BYOD Charlie Hales and Nigel Robson 28th February 2014
  • 2. Agenda • What is Mobile Device Management • Strategy • What is a Mobile Device? • Mobile Device Management vs Mobile Application Management • What is BYOD • What can MDM/BYOD do for business? • Where is your Data? • Acceptable usage policy • Defining the right solution • Some solutions available
  • 3. What is Mobile Device Management? • Secures, monitors, manages and supports mobile devices of multiple operating systems, service providers and enterprises • Covers corporate and end user devices • Includes anything that is mobile (could include laptops, and non-windows devices). Enabler for users to access internal systems securely from any device and anywhere • Enables BYOD
  • 4. Part of Overall Strategy • Build upon and integrate with existing policies – Desktop – Flexible and remote working – Application • Do you just use Windows devices? • Need to manage any type of device? • Any data management/classification in place currently?
  • 5. Part of Overall Strategy – Many Devices, one solution? Client Management MDM Source Gartner Virtualisation
  • 6. What are mobile devices?
  • 7. What are mobile devices? This?
  • 8. What are mobile devices? This?
  • 9. What are mobile devices? This?
  • 10. What are mobile devices? Or this?
  • 11. What are mobile devices? It can be any of these!
  • 12. What are mobile devices? But also these!
  • 13. Mobile Device Management vs Mobile Application Management MAM • App delivery • App security • App updating • User authentication • User authorization • Version checking • Push services • Reporting and tracking MDM • All previous plus… • Remote Configuration • Security –including identifying compromised devices • Backup/Restore • Network Usage and Support • Mobile asset tracking and management • Remote Lock and Wipe • Device Provisioning • Software Installation • Troubleshooting and Diagnostic Tools • Policy Application • Logging and Reporting • Remote Control and Administration
  • 15. • Save money – Reduce costs – Enable Flexible working – Increase Productivity – Increase Job satisfaction • Reduces risk and increase Security – Where is your data? – Consider this also for existing laptops What can MDM/BYOD do for business?
  • 16. Survey • Who doesn’t have a smartphone? • Who has a BlackBerry? • Who uses their own smartphone for work purposes? • Is it managed by work? • Are you sure?
  • 17. BYOD Business Survey Fully embrace and support 12% Embrace, but user self support 39% Limited BYOD Strategy 21% Trialing BYOD 18% Do not support BYOD 10% Source: zkresearch.com
  • 18. Where is your Data?
  • 22. Data Classifications Information Category Description Example Information Assets Public Information which is or can be made public. Advertisements Public web content Proprietary Information which is restricted to internal access and protected from external access. Unauthorised access could cause a drop in customer confidence, could influence operational effectiveness, cause financial loss or provide gain for competitors. Internal presentations Performance data Source code Proprietary knowledge Confidential Information received from Customers, or sensitive information about Customers and Staff. Customer Data Customer intellectual property Customer documents Customer backups Internal reports Restricted Highly sensitive information Limited access to specific individuals Passwords HR & Payroll Backups Card Data DPA Information
  • 23. Data Classifications Category Public Proprietary Confidential Restricted Description: Prevent easy access without prolonged or determined access to the device Prevent access even with prolonged and determined access to device As per confidential and access is restricted to specific individuals Physical Media or Device Printed Media ok In possession of staff or customer In possession of staff or customer, within property Held in the safe or secure ICT Server room Mobile Phone ok PIN Coded PIN Coded & Remote Wipe not normally acceptable Laptop / Tablet ok User authentication Authentication & Encryption not normally acceptable Portable Storage ok Encryption Encryption Held in a safe PC ok User authentication Physically Secured within property or Encrypted Physically secured within property Cloud Storage ok Encrypted Encrypted not normally acceptable
  • 24. Encryption • Device Encryption – Technology and Device dependant – The latest Windows devices will work with internal PKI or external Certs – IOS devices will work with Apple provided Certs which can be imported into most MDM solutions – Android has limitations • Application encryption – Managed through application development and provisioning
  • 25. Design your BYOD Acceptable Use Policy • Privacy • Who pays for what • Third Parties • Work vs Play – Out of hours – During hours • Company responsibilities for personal data • Licencing • HR • Device Disposal • Litigation
  • 26. Defining the right solution • What do you want to manage on the device? – Types of devices – PIN – Remote Wipe/Selective Wipe – Apps – Device/App Encryption
  • 27. Defining the right solution • What do you want to manage on the device? – Integration with enterprise applications – Multi user profiles – Separation of personal and work data – Internet access – Advanced features • Data usage • GPS tracking
  • 28. Example of device functionality Content removed when retiring a device Windows 8.1 Windows Phone 8 iOS Android Company apps and associated data installed by using Configuration Manager and Windows Intune Uninstalled and sideloading keys are removed. In addition any apps using Windows Selective Wipe will have the encryption key revoked and data will no longer be accessible. Uninstalled and data removed. Uninstalled and data removed. Apps and data remain installed. VPN and Wi-Fi profiles Removed. Not applicable. Removed. VPN: Not applicable. Wi-Fi: Not removed. Certificates Removed and revoked. Not applicable. Removed and revoked. Revoked. Settings Requirements removed. Requirements removed. Requirements removed. Requirements removed. Management Client Not applicable. Management agent is built- in. Not applicable. Management agent is built- in. Management profile is removed. Device Administrator privilege is revoked. Example for SCCM and Intune
  • 29. Lots of solutions available • Dependant on requirements • Leverage what you already have if possible • Exchange Active Sync • SCCM with Intune • Other MDM providers – Apple device manager (IOS 7.1 still will have limitations though) – SaaS or on-premise – Some examples. Good Technology, Citrix, MobileIron, AirWatch (VMWare recent purchase)
  • 30. Summary • Develop the right strategy • Define the requirements • What can MDM/BYOD do for your business? • Data Classification Policy • Acceptable usage policy • Defining the right solution • Choose the solution
  • 31. Future Seminars • Use what you already have to enable MDM and BYOD on 25th April • MDM and BYOD technology providers and solutions on 23rd May • ‘Joining the dots’ of your applications and systems – The benefits of system integration on 14th March

Editor's Notes

  • #4: Blured line – mobilily is already part of the major workforces, it is no longer a question of whether to do/alow it or not, it is more which devices/OS’s are supported
  • #10: NR
  • #17: Not either or.. Highlight Myths MDM Corp – MAM BYOD – it’s not necessarily the case Apps need to be developed
  • #18: Bring your own device (BYOD) (also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own PC (BYOPC)) refers to the policy of permitting employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace, and to use those devices to access privileged company information and applications.[1] The term is also used to describe the same practice applied to students using personally owned devices in education settings http://en.wikipedia.org/wiki/BYOD
  • #20: CH
  • #21: BYOD is happening! Mobility is already part of the major workforces, it is no longer a question of whether to do/allow it or not, it is more which devices/OS’s are supported 10% who do not support are probably still being bypassed!
  • #22: Emails Laptops Devices USB Direct Access/VPN Work folders (New to Windows 8) From the “cloud”. E.g. Office 365/Google Apps Rights Management Data classification User policies help, but without technology to enforce user error or misuse can still happen
  • #23: DPA penalties and the ICO (Information Commissioners Office) – up to £500,000 and can lead to prison sentances http://ico.org.uk/enforcement/fines
  • #28: NR
  • #29: http://www.microsoft.com/en-gb/business/community/hints-and-tips/design-your-byod-acceptable-use-policy Lawyers are still arguing over the intricacies of BYOD Acceptable Use Policies (AUP). In truth, it is probably impossible to define a watertight legal framework at this moment. However, even the smallest company can benefit from identifying the challenges and mitigate them by having clarity on paper where possible. Our experts, Cesare Garlati (CG) and Jessica Keyes, Ph.D. (JK) offer this powerful Top Ten as a starting point: Privacy (CG). Mobile Device Management tools are the software which secure company information when it’s on a mobile device, whether connected to the company network or not. That’s fine when it’s a company computer, but what if you’re monitoring traffic on an employee’s PC? Without clear rights and responsibilities, this represents an invasion of privacy, or possibly even hacking. Who pays for what? (JK). When an employee uses their own device for both work and play, overages of both phone and data usage can easily occur. Who pays for what must be clearly spelled out. Your policy should precisely define which categories the business will cover, and which not. This will also indemnify you against any potential fringe benefit tax issues. Third Parties (CG). Personal devices are often shared around the family – think of the laptop or tablet which Dad shares with the kids, for example. Even a watertight acceptable use policy can’t be signed on behalf of other family members. Your employees cannot be held responsible for their kids’ use of a family device: if that affects your attitude to data, then it also ought to affect your attitude to BYOD. Work v. Play: what we do after hours (JK). The fundamental challenge of BYOD is differentiating between work activities and what employees do when off the clock. As ever, on a company-purchased device, AUPs can clearly define what users may do. On an employee-owned device, things are much less clearly defined. There are plenty of situations where an employee may be using their device, in their own time, and therefore the relevance of their actions may only be apparent because the company has been able to discover it at a later date; a discovery which would not have been possible if the home/work gulf had not been breached. What, for example, if an employee makes a defamatory or discriminatory remark on a social network, or even in a private email? Work v. Play: what we do in work (JK). The same issues apply on the job. Even on their own device, it’s unacceptable for an employee to engage in harassment, or to compromise workplace safety (for example by texting whilst driving). Company responsibility for personal data (CG). Garlati notes that his own son woke up one morning and, in an understandably desperate bid to play Angry Birds, tried multiple passwords on a tablet and thus triggered the Remote Wipe security function. That’s a great security tool, rightly mandated by the company to protect its data. But when the wipe occurred, what about all the personal photos etc. on the machine? It is arguable that the business could be responsible for them – even if the wipe was caused by a genuine thief! Licensing (CG). Home computers usually include home-use licensing of software. If that software is then used for commercial purposes, not only is the employee breaching the terms of their license, but the company can be accountable as an accessory to the license infringement. Microsoft offers licenses of Office software under Office 365 Small Business Premium to resolve precisely this problem. Your HR Conduct (JK). The electronic record of an employee’s device usage may be used against you- especially after acrimonious terminations. It could, for example, show that an employee is working all hours of the day and night (even without your knowledge) – which might bring up issues of liability for unrecorded overtime, or minimum wage problems. Device Disposal (CG). It’s an employee’s right to dispose of their old property however they want. There are apocryphal stories of phones left on planes and in taxis ending up on eBay. Businesses must, of course, require Remote Wipe functions to be activated, and an AUP should also include the condition that company data is rigorously removed before planned disposal. Litigation (CG). Finally, if your company should find itself mired in litigation, the court can seize devices for ‘e-discovery’; i.e. the hunt for electronic evidence; even if it’s a personally owned device. Your employee probably won’t get it back soon, if at all; and their personal content will likely be exposed.
  • #33: http://www.macrumors.com/2014/02/17/ios-7-1-mdm/
  • #34: CH