{"id":59297,"date":"2013-09-24T19:15:34","date_gmt":"2013-09-24T23:15:34","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-07-04T13:44:37","modified_gmt":"2021-07-04T17:44:37","slug":"byod-love-affiar-waning","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/byod-love-affiar-waning\/","title":{"rendered":"BYOD Love Affair Waning?"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20150705233839\/http:\/\/cio.co.ke\/analysis\/enterprises-need-additional-mobile-device-management-tools-to-manage-byod\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-100669\" title=\"BYOD Love Affair Waning?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_free_lunch-1.jpeg?resize=98%2C110&#038;ssl=1\" alt=\"BYOD Love Affair Waning?\" width=\"98\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_free_lunch-1.jpeg?resize=133%2C150&amp;ssl=1 133w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_free_lunch-1.jpeg?resize=67%2C75&amp;ssl=1 67w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_free_lunch-1.jpeg?w=290&amp;ssl=1 290w\" sizes=\"auto, (max-width: 98px) 100vw, 98px\" \/><\/a>Tom Kaneshige at <a title=\"CIO.com\" href=\"http:\/\/www.cio.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>CIO.com<\/em><\/a> warns that the <strong>&#8220;Bring Your Own Device&#8221; love affair is coming to an abrupt and bitter end<\/strong>, and the lawyers are circling. He argues that in the early days of BYOD, say, last year, employees, especially Millennials, fell madly in love with the idea of using their own <a title=\"Apple Computers\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) iPhones, <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) <a title=\"Android\" href=\"http:\/\/www.android.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> smartphones, and newfangled <a title=\"Tablets\" href=\"http:\/\/searchmobilecomputing.techtarget.com\/definition\/tablet-PC\" target=\"_blank\" rel=\"noopener noreferrer\">tablets<\/a> for work. Finally, they could finally ditch corporate-issued\u00a0BlackBerrys (<a title=\"NASDAQ:BBRY\" href=\"https:\/\/www.tradingview.com\/symbols\/OTC-BBRYF\/\" target=\"_blank\" rel=\"noopener noreferrer\">BBRY<\/a>).<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20130911125934\/http:\/\/enterpriseinnovation.net\/article\/mdm-not-enough-byod-1152222786\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100672 \" title=\"Bring your own device\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_devices1-e1566078550359-111x150.png?resize=95%2C128&#038;ssl=1\" alt=\"Bring your own device\" width=\"95\" height=\"128\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_devices1-e1566078550359.png?resize=111%2C150&amp;ssl=1 111w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_devices1-e1566078550359.png?resize=55%2C75&amp;ssl=1 55w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_devices1-e1566078550359.png?w=116&amp;ssl=1 116w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/><\/a>BYOD ushered in a new era of consumer tech in the enterprise, one that promised employees and employers will live happily ever after. But <strong>the BYOD romance has suddenly turned sour<\/strong>. Employees are questioning <strong>corporate intrusion on their personal devices<\/strong>. Did IT turn their beloved smartphone into a spy that tracks their whereabouts? The article says employees are beginning to sense<strong> companies taking advantage of BYOD<\/strong> by intruding on personal time to get free work time.<\/p>\n<p>Now they&#8217;re<strong> thinking about suing<\/strong>. <a title=\"John Marshall\" href=\"https:\/\/web.archive.org\/web\/20140714195743\/http:\/\/www.crunchbase.com:80\/person\/john-marshall-3\" target=\"_blank\" rel=\"crunchbase noopener noreferrer\">John Marshall<\/a>, CEO at <a title=\"AirWatch\" href=\"https:\/\/web.archive.org\/web\/20220528005702\/https:\/\/www.vmware.com\/company\/acquisitions\/airwatch.html\" target=\"_blank\" rel=\"homepage noopener noreferrer\">AirWatch<\/a>, an enterprise <a title=\"mobile device management\" href=\"https:\/\/web.archive.org\/web\/20160312015336\/http:\/\/www.brianmadden.com:80\/blogs\/brianmadden\/archive\/2012\/05\/29\/what-is-mdm-mam-and-mim-and-what-s-the-difference.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">mobile device management<\/a> (MDM) vendor with 6,500 customers, told <em>CIO, <\/em>&#8220;<em>I anticipate a bunch of little [lawsuits], then something big will happen that&#8217;ll be a class action and become headline news.<\/em>&#8221;<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20220528005702\/https:\/\/www.vmware.com\/company\/acquisitions\/airwatch.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100674 size-medium\" title=\"Air Watch logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/air-watch-logo-e1566078605280-150x74.gif?resize=150%2C74&#038;ssl=1\" alt=\"Air Watch logo\" width=\"150\" height=\"74\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/air-watch-logo-e1566078605280.gif?resize=150%2C74&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/air-watch-logo-e1566078605280.gif?resize=75%2C37&amp;ssl=1 75w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>CEO Marshall reports that the suits have already started. A federal case in Chicago is winding its way through the courts which claims that the city owes some 200 police officers millions of dollars in overtime back pay. The case centers on allegations that the city pressured officers into answering work-related calls and emails over department-issued BlackBerrys during off-hours.<\/p>\n<p>There&#8217;s no question <strong>BYOD blurs the line even more between work life and personal life<\/strong>. The<a title=\"AirWatch\" href=\"http:\/\/investing.businessweek.com\/research\/stocks\/private\/snapshot.asp?privcapid=138549319\" target=\"_blank\" rel=\"noopener noreferrer\"> Airwatch<\/a> CEO not surprisingly recommends a <strong>Mobile Device Management<\/strong> (MDM) application to control email delivery to BYOD devices. This way an employer can set a business rule that won&#8217;t allow delivery of corporate email to a subset of users during off-hours. Or a CIO can address this issue in the <strong>BYOD terms-of-use agreement<\/strong>. (<em><strong>rb<\/strong>&#8211; Both would be best<\/em>)<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100676 \" title=\"Smashed BYOD\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_broken_device-e1566078732799-150x91.jpg?resize=147%2C89&#038;ssl=1\" alt=\"Smashed BYOD\" width=\"147\" height=\"89\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_broken_device-e1566078732799.jpg?resize=150%2C91&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_broken_device-e1566078732799.jpg?resize=75%2C45&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_broken_device-e1566078732799.jpg?w=590&amp;ssl=1 590w\" sizes=\"auto, (max-width: 147px) 100vw, 147px\" \/>The <em>CIO<\/em> article offers up another legal nightmare scenario: Lacking MDM tools to block out what can and cannot be seen on a BYOD smartphone, a help desk technician notices that an employee&#8217;s device has a lot of personal apps about a health problem\u2014and mentions his concern to the employee in the cafeteria.<\/p>\n<p>&#8220;<em>The employee can say, &#8216;How in the world did you know that?<\/em>&#8216;&#8221; Mr. Marshall says. &#8220;<em>All of a sudden, something that&#8217;s very benign and innocuous turns into something that&#8217;s blown out of proportion.<\/em>&#8221; (<em><strong>rb-<\/strong>\u00a0<a title=\"Help Net Security\" href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Help Net Security<\/em><\/a> cites recent U.S. <a title=\"U.S. Department of Health and Human Services\" href=\"https:\/\/www.hhs.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">DHSS<\/a> seven-figure settlements from healthcare institutions that failed to protect patients\u2019 health information under <\/em><strong><a title=\"HIPAA\" href=\"https:\/\/web.archive.org\/web\/20151206124546\/http:\/\/www.hhs.gov:80\/ocr\/privacy\/hipaa\/understanding\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\"><em>HIPAA<\/em><\/a> regs<\/strong>.)<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20221208233825\/http:\/\/thenervousbreakdown.com\/shenderson\/2010\/06\/litparks-guide-to-what-happens-after-you-sign-with-an-agent\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100678 \" title=\"terms-of-use agreement\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/contract_sign_here-e1566078805775-150x123.jpg?resize=122%2C100&#038;ssl=1\" alt=\"terms-of-use agreement\" width=\"122\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/contract_sign_here-e1566078805775.jpg?resize=150%2C123&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/contract_sign_here-e1566078805775.jpg?resize=75%2C62&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/contract_sign_here-e1566078805775.jpg?resize=768%2C631&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/contract_sign_here-e1566078805775.jpg?w=1017&amp;ssl=1 1017w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/contract_sign_here-e1566078805775.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 122px) 100vw, 122px\" \/><\/a>Mr. Marshall recommends a comprehensive <strong>BYOD terms-of-use agreement<\/strong>, along with <strong>transparency<\/strong> about the capabilities and limitations of the technology, will help ward off such scenarios. The IT staff also needs to be educated about their role in a BYOD environment.<\/p>\n<p>However, this doesn&#8217;t mean problems won&#8217;t crop up. Part of the problem, the article indicates, is that BYOD often puts business unit managers who aren&#8217;t well-versed in technical user agreements in a leadership position with <a title=\"Mobile app\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_app\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">mobile apps<\/a>. They&#8217;re likely to give the green light<strong>\u00a0to rogue mobile apps that violate such agreements<\/strong>.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20160408084236\/http:\/\/www.vervemobile.com\/technology\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100681 \" title=\"location-based services\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_location_based-e1566078860553-150x123.png?resize=122%2C100&#038;ssl=1\" alt=\"location-based services\" width=\"122\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_location_based-e1566078860553.png?resize=150%2C123&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_location_based-e1566078860553.png?resize=75%2C61&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_location_based-e1566078860553.png?w=562&amp;ssl=1 562w\" sizes=\"auto, (max-width: 122px) 100vw, 122px\" \/><\/a>For instance, employees are chiefly concerned about privacy and especially <strong><a title=\"Location-based service\" href=\"http:\/\/en.wikipedia.org\/wiki\/Location-based_service\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">location-based services<\/a><\/strong> with BYOD, and so many user agreements stipulate that apps will not collect location-based information. But someone who wants to be helpful, builds a map app for the corporate campus that allows employees to schedule conference rooms and find safety information, such as where to go if there&#8217;s a tornado. Airwatch&#8217;s Marshall explains:<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>Maybe there&#8217;s also a button on there that says where you are in the campus &#8230; <\/em><em>All of a sudden people wake up and realize that every single device using that app is collecting location-based information\u2014that&#8217;s an issue.\u00a0<\/em><em>These are really plausible scenarios &#8230; There&#8217;s so much copy and paste and reuse of all these components that these things can happen very innocently.<\/em><\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20121125011933\/http:\/\/www.insurancenetworking.com:80\/gallery\/byod-best-practices-30272-1.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100684 \" title=\"remote wipe\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Eraser-e1566078929691-150x129.jpg?resize=116%2C100&#038;ssl=1\" alt=\"remote wipe\" width=\"116\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Eraser-e1566078929691.jpg?resize=150%2C129&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Eraser-e1566078929691.jpg?resize=75%2C65&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Eraser-e1566078929691.jpg?w=422&amp;ssl=1 422w\" sizes=\"auto, (max-width: 116px) 100vw, 116px\" \/><\/a>Then there&#8217;s the dreaded<strong> <a title=\"Remote wipe\" href=\"https:\/\/web.archive.org\/web\/20150630052642\/http:\/\/searchconsumerization.techtarget.com:80\/definition\/remote-wipe\" target=\"_blank\" rel=\"noopener noreferrer\">remote wipe<\/a><\/strong>, which can land a company in some legal hot water according to the article. <em>Help Net Security<\/em> says there is little to no case law in this area. <em>CIO.com <\/em>reports that just last year, CIOs said they felt comfortable with BYOD because they held security&#8217;s holy grail: remote wipe, a scorched-earth capability for<strong> wiping all data on a mobile device<\/strong>.<\/p>\n<p>But employees weren&#8217;t happy with the idea that the company can <strong>wipe personal data on their personal device<\/strong>. Some employees refused to take part in the BYOD program for this reason. Others waited days or weeks before reporting a lost or stolen device so that IT wouldn&#8217;t wipe it.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100686 \" title=\"waited days or weeks before reporting a lost or stolen device\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/confused1-e1566079017340-150x105.jpg?resize=143%2C100&#038;ssl=1\" alt=\"waited days or weeks before reporting a lost or stolen device\" width=\"143\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/confused1-e1566079017340.jpg?resize=150%2C105&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/confused1-e1566079017340.jpg?resize=75%2C52&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/confused1-e1566079017340.jpg?w=253&amp;ssl=1 253w\" sizes=\"auto, (max-width: 143px) 100vw, 143px\" \/>MDM software advanced quickly and seemed to come up with a fix. Now companies can wipe only corporate apps from a BYOD smartphone or tablet, leaving personal apps untouched. In fact, AirWatch won&#8217;t even allow a full device wipe anymore for legal reasons. While this helps tremendously, it doesn&#8217;t completely solve the problem.<\/p>\n<p>Mr. Marshall proposed a scenario where a company buys the popular <a href=\"https:\/\/www.cloudwards.net\/best-note-taking-apps\/\" target=\"_blank\" rel=\"noopener noreferrer\">productivity app<\/a>, <a title=\"Evernote\" href=\"http:\/\/www.evernote.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Evernote<\/a>, for employees to put on their BYOD smartphones. Since the company paid for the app, the company can remove it at any time. The note-taking <strong>app collects company data but also might store personal data<\/strong>, too. An employee can use Evernote to create a shopping list, recipes, vacation plans, or perhaps something more critical to their job.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20200124043357\/http:\/\/safetycertificategoldcoast.com:80\/who-is-responsible-for-obtaining-a-certificate\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100688 \" title=\"Finger pointing\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Finger_Pointing-e1566079077973-150x85.png?resize=146%2C83&#038;ssl=1\" alt=\"Finger pointing\" width=\"146\" height=\"83\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Finger_Pointing-e1566079077973.png?resize=150%2C85&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Finger_Pointing-e1566079077973.png?resize=75%2C43&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Finger_Pointing-e1566079077973.png?w=661&amp;ssl=1 661w\" sizes=\"auto, (max-width: 146px) 100vw, 146px\" \/><\/a>Guess what happens to this personal data when the employee leaves the company? The app, along with all the data, is wiped from the device and account. If the <strong>BYOD terms-of-use agreement<\/strong> about Evernote wasn&#8217;t spelled out clearly, who is liable for the lost data?<\/p>\n<p>The bloom is off the BYOD rose, and so companies had better add protections against employee lawsuits in the BYOD terms-of-use agreement and leverage MDM to make sure the agreement is followed.<\/p>\n<p>Truth is, employees tend to get a bit emotional when their <strong>privacy is violated or their location is tracked<\/strong> via a mobile device that they personally own. They don&#8217;t like their personal data to be wiped, either. When these things happen, companies can expect the wrath of a scorned employee. &#8220;That&#8217;s where it gets tricky,&#8221; Mr. Marshall told <em>CIO.com<\/em>.<\/p>\n<p>Tony Busseri, CEO of Canadian digital security firm <a href=\"https:\/\/www.route1.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Route1<\/a>, told <em>Help Net Security<\/em>:<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><a href=\"https:\/\/web.archive.org\/web\/20200124043357\/http:\/\/safetycertificategoldcoast.com:80\/who-is-responsible-for-obtaining-a-certificate\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100691 size-medium\" title=\"Angry Boss\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Angry_Boss-e1566079130210-150x116.jpg?resize=150%2C116&#038;ssl=1\" alt=\"Angry Boss\" width=\"150\" height=\"116\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Angry_Boss-e1566079130210.jpg?resize=150%2C116&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Angry_Boss-e1566079130210.jpg?resize=75%2C58&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Angry_Boss-e1566079130210.jpg?w=380&amp;ssl=1 380w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><em>Along with security concerns, BYOD has brought the potential of major legal issues for the Enterprise &#8230; Many current BYOD corporate policies leave enterprise data unprotected in the event of a security breach and during an employee\u2019s exit from the company. <strong>The policy of tracking and wiping an employee\u2019s personal device opens the enterprise up to the potential for mass litigation<\/strong>.<\/em><\/p>\n<p><em><strong>rb-<\/strong><\/em><\/p>\n<p><em><a title=\"Misco\" href=\"http:\/\/www.misco.co.uk\/\" target=\"_blank\" rel=\"noopener noreferrer\">Misco<\/a> in the UK <a title=\"Employees Fret Over BYOD-Related Privacy Issues\" href=\"https:\/\/web.archive.org\/web\/20170315000920\/http:\/\/www.misco.co.uk\/blog\/news\/00318\/employees-fret-over-byod-related-privacy-issues\/\" target=\"_blank\" rel=\"noopener noreferrer\">reported<\/a> that the majority of employees will not cooperate with employers&#8217; BYOD efforts. According to the data:<\/em><\/p>\n<ul>\n<li><em>82% of the survey participants viewed their employer&#8217;s ability to track their location as an invasion of privacy;<\/em><\/li>\n<li><em>82% are concerned or extremely concerned about having their browsing history monitored;<\/em><\/li>\n<li><em>76% stated that they would not allow their company to view the applications installed on their personal mobile devices;<\/em><\/li>\n<li><em>75% said they would not go along with an installation made by their employer;<\/em><\/li>\n<li><em>Only 15% had no concerns about employers tracking activities.<\/em><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The BYOD love affair is coming to an abrupt and bitter end, and the lawyers are circling as employees question corporate intrusion on their personal devices<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3044,1911,1242,1909,1910,296,304,55,1834,1472,431,200,4],"class_list":["post-59297","post","type-post","status-publish","format-standard","hentry","category-security","tag-3044","tag-airwatch","tag-byod","tag-device","tag-evernote","tag-ipad","tag-iphone","tag-legal","tag-management","tag-mdm","tag-mobile","tag-risk","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=59297"}],"version-history":[{"count":30,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59297\/revisions"}],"predecessor-version":[{"id":132438,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59297\/revisions\/132438"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=59297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=59297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=59297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}