{"id":59766,"date":"2014-09-18T21:57:03","date_gmt":"2014-09-19T01:57:03","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-07-04T13:48:02","modified_gmt":"2021-07-04T17:48:02","slug":"10-policies-to-minimize-byod-risk","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/10-policies-to-minimize-byod-risk\/","title":{"rendered":"10 Policies to Minimize BYOD Risk"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20151124023808\/http:\/\/business.bt.com:80\/it-support-and-security\/bring-your-own-device\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-100755 alignleft\" title=\"Mandatory Authorization Process\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_redcarpet-e1566085718844-150x108.jpg?resize=124%2C89&#038;ssl=1\" alt=\"Mandatory Authorization Process\" width=\"124\" height=\"89\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_redcarpet-e1566085718844.jpg?resize=150%2C108&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_redcarpet-e1566085718844.jpg?resize=75%2C54&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_redcarpet-e1566085718844.jpg?w=199&amp;ssl=1 199w\" sizes=\"auto, (max-width: 124px) 100vw, 124px\" \/><\/a>The challenge for employers offering <a title=\"Bring your own device\" href=\"http:\/\/en.wikipedia.org\/wiki\/Bring_your_own_device\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">BYOD<\/a>, <a title=\"Bring Your Own Device Policies: 10 Practical Steps to Minimize Risk\" href=\"https:\/\/web.archive.org\/web\/20160820090758\/https:\/\/schnaderworks.com\/2013\/09\/17\/bring-your-own-device-policies-10-practical-steps-to-minimize-risk\/\" target=\"_blank\" rel=\"noopener noreferrer\">according<\/a> to\u00a0<a title=\"schnaderworks\" href=\"https:\/\/web.archive.org\/web\/20210617050840\/http:\/\/schnaderworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">schnaderworks<\/a>, a labor and employment blog from <a title=\"Schnader Harrison Segal &amp; Lewis\" href=\"https:\/\/web.archive.org\/web\/20231020185914\/https:\/\/www.schnader.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Schnader Harrison Segal &amp; Lewis LLP<\/a>, is finding the right cost\/benefit balance for their businesses. In developing an effective<strong> \u201c<\/strong>bring your own device\u201d (BYOD) policy, employers must first identify which employees will be eligible for the program according to the blog.<\/p>\n<p>Onc<a href=\"https:\/\/web.archive.org\/web\/20151124023808\/http:\/\/business.bt.com:80\/it-support-and-security\/bring-your-own-device\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-100753 alignright\" title=\"10 Policies to Minimize BYOD Risk\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_device2-e1566085628422-150x109.jpg?resize=110%2C80&#038;ssl=1\" alt=\"10 Policies to Minimize BYOD Risk\" width=\"110\" height=\"80\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_device2-e1566085628422.jpg?resize=150%2C109&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_device2-e1566085628422.jpg?resize=75%2C55&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_device2-e1566085628422.jpg?w=483&amp;ssl=1 483w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>e the basic parameters are set, the lawyers stress a written policy is essential to set up ground rules and permit enforcement to protect the company\u2019s data and other interests. They suggest the following steps are key to establishing an effective BYOD policy:<\/p>\n<p><strong><em>1. Establish a Mandatory Authorization Process:<\/em><\/strong>\u00a0 The lawyers say this should be completed before an employee can use company data and systems on a personal <a title=\"Mobile device\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_device\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">mobile device<\/a>.<\/p>\n<p><a href=\"http:\/\/www.cultofmac.com\/182733\/many-companies-supporting-employee-iphones-and-ipads-ignore-mobile-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100757 \" title=\"Require Password Protection\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/iphone-padlock-key-e1566085792225-150x81.jpg?resize=120%2C65&#038;ssl=1\" alt=\"Require Password Protection\" width=\"120\" height=\"65\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/iphone-padlock-key-e1566085792225.jpg?resize=150%2C81&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/iphone-padlock-key-e1566085792225.jpg?resize=75%2C40&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/iphone-padlock-key-e1566085792225.jpg?w=640&amp;ssl=1 640w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/><\/a><em><strong>2. Require <a title=\"Password\" href=\"http:\/\/en.wikipedia.org\/wiki\/Password\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Password<\/a> Protection:\u00a0<\/strong><\/em> Each authorized device should have the same password protection as an employer-issued device.\u00a0 According to the article, such protections include limiting the number of password entry attempts, setting the device to time out after a period of inactivity, and requiring new passwords at regular intervals.<\/p>\n<p><strong><em>3. Clarify Data Ownership<\/em><\/strong>:\u00a0 A BYOD policy should specifically address who owns the data stored on the authorized device. It should be clear that company data belongs to the employer and that all company data will be remotely wiped from the device if the employee violates the BYOD policy, terminates employment, or switches to a new device. The policy should also alert employees that it is their responsibility to backup any personal data stored on the authorized device states the article.<\/p>\n<p><strong><em><a href=\"https:\/\/web.archive.org\/web\/20141030111619\/http:\/\/techpageone.dell.com:80\/technology\/byod-technology\/remote-wipe-policy-crude-approach-byod-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100765 \" title=\"Spell Out Procedures In Case of Loss\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod-security-e1566085996951-150x108.jpg?resize=125%2C90&#038;ssl=1\" alt=\"Spell Out Procedures In Case of Loss\" width=\"125\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod-security-e1566085996951.jpg?resize=150%2C108&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod-security-e1566085996951.jpg?resize=75%2C54&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod-security-e1566085996951.jpg?w=573&amp;ssl=1 573w\" sizes=\"auto, (max-width: 125px) 100vw, 125px\" \/><\/a>4. Control the Use of Risky Applications and Third Party Storage<\/em><\/strong>:\u00a0 Schnader Harrison Segal &amp; Lewis recommends employers may want to ban the use of applications that present known <a title=\"Data security\" href=\"http:\/\/en.wikipedia.org\/wiki\/Data_security\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">data security<\/a> risks, such as the use of \u201cjailbroken\u201d or \u201crooted\u201d devices and cloud storage.<\/p>\n<p><strong><em>5. Limit Employee Privacy Expectations<\/em><\/strong> The BYOD policy should clearly disclose the extent to which the employer will have access to an employee\u2019s personal data stored on an authorized device and state whether such personal data is stored on the company\u2019s backup systems. The article recommends minimizing the co-mingling of company and personal data. Employers may want to install software that permits the \u201csegmenting\u201d of authorized devices.\u00a0 However, no matter what measures the company takes to preserve employee privacy, the policy must emphasize that the company does not guarantee employee privacy if an employee opts in to the BYOD program.<\/p>\n<p><strong><em><a href=\"https:\/\/web.archive.org\/web\/20140925023748\/http:\/\/blogs.t-systems.de:80\/index.php\/2012\/02\/19\/byod-bring-your-own-device\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100759 \" title=\"Control the Use of Risky Applications\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_dataleak.gif?resize=89%2C116&#038;ssl=1\" alt=\"Control the Use of Risky Applications\" width=\"89\" height=\"116\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_dataleak.gif?resize=115%2C150&amp;ssl=1 115w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_dataleak.gif?resize=58%2C75&amp;ssl=1 58w\" sizes=\"auto, (max-width: 89px) 100vw, 89px\" \/><\/a>6. Address Any Business-Specific <a title=\"Privacy\" href=\"http:\/\/en.wikipedia.org\/wiki\/Privacy\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Privacy Issues<\/a><\/em><\/strong>:\u00a0 Certain businesses are subject to legal requirements about the storage of private personal information (such as social security numbers, drivers\u2019 license numbers, and credit and debit card numbers, etc.) which may need to be addressed in a BYOD policy.\u00a0 The blog points out that <a title=\"Health Insurance Portability and Accountability Act\" href=\"http:\/\/en.wikipedia.org\/wiki\/Health_Insurance_Portability_and_Accountability_Act\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">HIPAA<\/a> requires native encryption on any device that holds data subject to the act. An employer may need to put in place processes prohibiting or limiting remote access for certain categories of sensitive data.<\/p>\n<p><strong><em>7. Consider Wage and Hour Issues<\/em><\/strong>:\u00a0 Permitting employees to use an authorized device for work purposes outside of the employee\u2019s regular work hours may trigger wage and hour claims. The lawyers suggest the BYOD policy should set forth the employer\u2019s expectations about after-hours use\u00a0 (such as a requirement that non-exempt employees must refrain from checking or responding to work emails, voice mail, and texts after hours) (<em>rb- Yeah<\/em>).<\/p>\n<p><strong><em><a href=\"https:\/\/community.good.com\/blogs\/industry_news\/2012\/07\/18\/byod-a-must-for-50-of-staff-by-next-year-good-technology\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100761 \" title=\"BYOD policy\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_free_lunch-2.jpeg?resize=89%2C101&#038;ssl=1\" alt=\"BYOD policy\" width=\"89\" height=\"101\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_free_lunch-2.jpeg?resize=133%2C150&amp;ssl=1 133w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_free_lunch-2.jpeg?resize=67%2C75&amp;ssl=1 67w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_free_lunch-2.jpeg?w=290&amp;ssl=1 290w\" sizes=\"auto, (max-width: 89px) 100vw, 89px\" \/><\/a>8. Ensure Compliance with Company Confidentiality Policies<\/em><\/strong>.\u00a0 The author says a BYOD policy should reiterate that an employee using an authorized device must comply with all company policies on confidentiality and the \u201cacceptable use\u201d of company information.<\/p>\n<p><strong><em>9. Spell Out Procedures In Case of Loss or Theft<\/em><\/strong>:\u00a0 The employer should set up a specific protocol to be followed in the event an authorized device is lost or stolen. The blog says the process should include the prompt reporting of a lost or stolen device and the remote wiping of the device.<\/p>\n<p><strong><em><a href=\"https:\/\/web.archive.org\/web\/20140928190156\/http:\/\/watfordoffices.com:80\/what-is-byod\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100763 \" title=\"Insure Compliance with Company Confidentiality Policies\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_man-1.jpg?resize=90%2C108&#038;ssl=1\" alt=\"Insure Compliance with Company Confidentiality Policies\" width=\"90\" height=\"108\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_man-1.jpg?resize=125%2C150&amp;ssl=1 125w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_man-1.jpg?resize=62%2C75&amp;ssl=1 62w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_man-1.jpg?w=425&amp;ssl=1 425w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a>10. Document Employee Consent<\/em><\/strong>:\u00a0 Finally the law firm, in good lawyer form, suggests the employer should get an employee\u2019s written consent to all terms and conditions of the BYOD policy.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20140922104805\/http:\/\/techpageone.dell.com:80\/technology\/where-to-start-with-byod-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Where to start with BYOD security<\/a> (techpageone.dell.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BYOD needs a written policy to set ground rules and permit enforcement to protect the company\u2019s data and other interests.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,1242,1282,55,431,209,116,185,4],"class_list":["post-59766","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-byod","tag-hipaa","tag-legal","tag-mobile","tag-password","tag-policy","tag-privacy","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=59766"}],"version-history":[{"count":16,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59766\/revisions"}],"predecessor-version":[{"id":130013,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59766\/revisions\/130013"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=59766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=59766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=59766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}