SlideShare une entreprise Scribd logo
BYOD:
Managing the Risks of
Bring Your Own Device
Policies
Prof. Jonathan I. Ezor
Director
Touro Law Center for Innovation
in Business, Law and Technology
jezor@tourolaw.edu
Nassau County Bar Association
Corporation/ Banking & Securities Law Committee
October 8, 2013
Wireless Devices
Key to Modern
Business
• Access to data
• Communications
– Colleagues
– Clients/Customers
– Others
• Mobile workforce
• 24/7/365 workcycle
• Instant responsiveness demands
jezor@tourolaw.edu
Challenges of Mobile
Implementation
• Cost
• Platform choice
• Updates/Upgrades
• Training
• Support
• Vendor changes (e.g. Blackberry)
jezor@tourolaw.edu
BYOD: Leveraging
Employee Choices
• Employees increasingly buying/updating
personal devices
• May be more sophisticated than company
standard
• Employees may cover some/all costs
• Personal familiarity may reduce training need
• Major platforms increasingly interoperate
jezor@tourolaw.edu
Balancing BYOD
Benefits and Risks
• BYOD not without risks, including
– Employee-driven vs. mission-driven
– Complexity and cost of support
– Software and licensing
– Security
– Confidentiality
– Personal vs. professional
– Compliance
– Litigation
• Must balance risks with rewards
jezor@tourolaw.edu
jezor@tourolaw.edu
• Choice of approved devices should reflect
business needs
– IT platform
– Applications & functionality
– Security
• Employee requests can conflict
• Failure to support owned devices can undermine
BYOD intention
• Consumer devices for business purposes
Employee-Driven Vs.
Mission-Driven
jezor@tourolaw.edu
Complexity And Cost
Of Support
• Diversity of hardware/OSes means almost
unlimited potential support obligation
• Everything from setup to chargers to software
• Employees may expect or demand support from
IT staff
• Refresh cycle a factor as well
jezor@tourolaw.edu
Software and
Licensing
• Organization’s software may include licensing
restrictions
– Enterprise vs. personal devices
– Number of total/concurrent users
– Expiration of licenses/versions/support
• Older licensed software may not support new
mobile platforms
• Need to consider existing licenses, negotiate new
ones with BYOD in mind
• Interoperability of software also a factor
jezor@tourolaw.edu
Security
• Multiple potential security breach vectors on
mobile devices
– Malware
– Insecure WiFi
– Unencrypted connections
– Utilities
– Older versions of OS
• Consumer devices may offer fewer security
options than business-specific ones
• Some devices support VPN, push profiles for
security settings
jezor@tourolaw.edu
Confidentiality
• Every mobile device a potential data breach
channel
– Mass storage
– Lost/stolen devices
– Backups
• Employees may share devices with family, others
• Use may violate NDAs, regulatory/legal
requirements
• Risks of accidental breaches
– GPS
– EXIF data
– Social media
jezor@tourolaw.edu
Personal Vs.
Professional
• Boundaries always a problem for mobile
workforce
• Use of personal devices exacerbates challenges
• Harder to establish, enforce limitations on
personal use
• Labor laws also potentially involved
http://ezor.org/a7k4n
Allen v. Chicago
jezor@tourolaw.edu
Compliance
• Requirements may not exclude personal devices
– Document/correspondence retention
– Security
– Privacy
– Tax
• Auditors, enforcement officials may require
access to employee devices
• Also more difficult to change practices for
new/changed regulations
jezor@tourolaw.edu
Litigation
• Discovery requests may/should include employee
devices
• True of home computers as well as BYOD
• Holds, deletion policies also face challenges
• Shared devices also an issue
• Employees may be uncomfortable opening
personal equipment to scrutiny
jezor@tourolaw.edu
Risk Management for
BYOD
• Implementation must include awareness,
management of risks
• Involve all stakeholders
– IT
– Legal
– Finance
– Operations
– HR
– Employees
• Plan, budget for training and support
• Communicate decisions and rationale to all
jezor@tourolaw.edu
• Written policy on supported devices/platforms/uses
• IT infrastructure chosen/configured to enhance security as
well as convenience
• Educational materials for most-common devices
– Setup
– Security
– Remote wiping
– Encryption
• Ongoing review of implementation, issues
• Verify insurance and other risk management coverage
Best Practices for
BYOD
Professor Jonathan I. Ezor
jezor@tourolaw.edu
@ProfJonathan on Twitter
Questions?

Contenu connexe

Tendances

Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3
jpc6760
 
Digital divide
Digital divideDigital divide
Digital divide
Roya Azimzadeh
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical IssuesMISY
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
Gregory Barnes
 
Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3jpc6760
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
Anirudhya Reevu
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
Mark Moran
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
Michael Zimmer
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHS
MisterHobbs
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud Computing
Neal Axton
 
Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2
jpc6760
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomGabriella Maree Wheeler
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)
onlineprivacy
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
Rushana Bandara
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Media technology
Media technologyMedia technology
Media technologycgscootr
 
Media technology
Media technologyMedia technology
Media technologycgscootr
 

Tendances (19)

Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3
 
Digital divide
Digital divideDigital divide
Digital divide
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHS
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud Computing
 
Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Media technology
Media technologyMedia technology
Media technology
 
Media technology
Media technologyMedia technology
Media technology
 

En vedette

Newsletter September 2011
Newsletter September 2011Newsletter September 2011
Newsletter September 2011
EducationUSA
 
Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...
Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...
Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...
Alyse Ergood McKeal
 
Testing print-fr url
Testing print-fr urlTesting print-fr url
Testing print-fr urlVivastream
 
Sentinela do Jacui - edição 390
Sentinela  do Jacui -  edição  390Sentinela  do Jacui -  edição  390
Sentinela do Jacui - edição 390
Sentinela do Jacui
 
Lib h3lp pidgin info session for staff
Lib h3lp pidgin info session for staffLib h3lp pidgin info session for staff
Lib h3lp pidgin info session for staffElizabeth Brown
 
Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)
Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)
Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)
georgios2000
 
CICLIN TICS
CICLIN TICSCICLIN TICS
CICLIN TICS
alfa6
 
Lib h3lp show
Lib h3lp showLib h3lp show
Lib h3lp show
Sarah Maximiek
 
Cuba
CubaCuba
Une Immense Prison De Verre En Autriche Fin
Une Immense Prison De Verre En Autriche FinUne Immense Prison De Verre En Autriche Fin
Une Immense Prison De Verre En Autriche Finadam eva
 
Private a-h
Private a-hPrivate a-h
Private a-h
MJ Polestico
 
Read across america
Read across americaRead across america
Read across americacreosis
 
Nueva zelanda
Nueva zelandaNueva zelanda
Nueva zelanda
Grupo Edutravel
 
Getting to Emory from Agnes Scott on the Cliff Bus
Getting to Emory from Agnes Scott on the Cliff BusGetting to Emory from Agnes Scott on the Cliff Bus
Getting to Emory from Agnes Scott on the Cliff Bus
McCain Library
 
Newsletter November 2010
Newsletter  November 2010Newsletter  November 2010
Newsletter November 2010EducationUSA
 
Newsletter December 2010
Newsletter  December 2010Newsletter  December 2010
Newsletter December 2010EducationUSA
 

En vedette (20)

Newsletter September 2011
Newsletter September 2011Newsletter September 2011
Newsletter September 2011
 
May Wan 9B1
May Wan 9B1May Wan 9B1
May Wan 9B1
 
Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...
Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...
Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...
 
Testing print-fr url
Testing print-fr urlTesting print-fr url
Testing print-fr url
 
Journal de bussy numéro 102
Journal de bussy numéro 102Journal de bussy numéro 102
Journal de bussy numéro 102
 
Sentinela do Jacui - edição 390
Sentinela  do Jacui -  edição  390Sentinela  do Jacui -  edição  390
Sentinela do Jacui - edição 390
 
Lib h3lp pidgin info session for staff
Lib h3lp pidgin info session for staffLib h3lp pidgin info session for staff
Lib h3lp pidgin info session for staff
 
Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)
Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)
Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)
 
CICLIN TICS
CICLIN TICSCICLIN TICS
CICLIN TICS
 
Lib h3lp show
Lib h3lp showLib h3lp show
Lib h3lp show
 
Cuba
CubaCuba
Cuba
 
Une Immense Prison De Verre En Autriche Fin
Une Immense Prison De Verre En Autriche FinUne Immense Prison De Verre En Autriche Fin
Une Immense Prison De Verre En Autriche Fin
 
Private a-h
Private a-hPrivate a-h
Private a-h
 
Read across america
Read across americaRead across america
Read across america
 
EEC Final PDF
EEC Final PDFEEC Final PDF
EEC Final PDF
 
Nueva zelanda
Nueva zelandaNueva zelanda
Nueva zelanda
 
Getting to Emory from Agnes Scott on the Cliff Bus
Getting to Emory from Agnes Scott on the Cliff BusGetting to Emory from Agnes Scott on the Cliff Bus
Getting to Emory from Agnes Scott on the Cliff Bus
 
Newsletter November 2010
Newsletter  November 2010Newsletter  November 2010
Newsletter November 2010
 
Newsletter December 2010
Newsletter  December 2010Newsletter  December 2010
Newsletter December 2010
 
Gazeta
GazetaGazeta
Gazeta
 

Similaire à 10-8-13 BYOD Risk Presentation for Nassau County Bar Committee

Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
Deputy it operations manager chris down -interview presentation - final
Deputy it operations manager    chris down  -interview presentation - finalDeputy it operations manager    chris down  -interview presentation - final
Deputy it operations manager chris down -interview presentation - finalchrisdown68
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
OracleIDM
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
Troy C. Fulton
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges
Jonathan Ezor
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
Huntsman Security
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
k33a
 
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Faindra Jabbar
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
Troy C. Fulton
 
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Christopher Hunt
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
Michael W. Chitwa
 
mobile application security
mobile application securitymobile application security
mobile application security
-jyothish kumar sirigidi
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya
 
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
Tarek Nader
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
Pace IT at Edmonds Community College
 

Similaire à 10-8-13 BYOD Risk Presentation for Nassau County Bar Committee (20)

Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
Deputy it operations manager chris down -interview presentation - final
Deputy it operations manager    chris down  -interview presentation - finalDeputy it operations manager    chris down  -interview presentation - final
Deputy it operations manager chris down -interview presentation - final
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
 
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
 

Plus de Jonathan Ezor

Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
Jonathan Ezor
 
Legal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in LitigationLegal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in Litigation
Jonathan Ezor
 
Privacy Pitfalls in Transactions
Privacy Pitfalls in TransactionsPrivacy Pitfalls in Transactions
Privacy Pitfalls in Transactions
Jonathan Ezor
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice
Jonathan Ezor
 
Social Media And Legal Ethics
Social Media And Legal EthicsSocial Media And Legal Ethics
Social Media And Legal Ethics
Jonathan Ezor
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
Jonathan Ezor
 
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
Jonathan Ezor
 
9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation
Jonathan Ezor
 
Social Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsSocial Media Horror Stories for Law Students
Social Media Horror Stories for Law Students
Jonathan Ezor
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
Jonathan Ezor
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation
Jonathan Ezor
 

Plus de Jonathan Ezor (11)

Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
Legal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in LitigationLegal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in Litigation
 
Privacy Pitfalls in Transactions
Privacy Pitfalls in TransactionsPrivacy Pitfalls in Transactions
Privacy Pitfalls in Transactions
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice
 
Social Media And Legal Ethics
Social Media And Legal EthicsSocial Media And Legal Ethics
Social Media And Legal Ethics
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
 
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
 
9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation
 
Social Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsSocial Media Horror Stories for Law Students
Social Media Horror Stories for Law Students
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation
 

Dernier

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Dernier (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

10-8-13 BYOD Risk Presentation for Nassau County Bar Committee

  • 1. BYOD: Managing the Risks of Bring Your Own Device Policies Prof. Jonathan I. Ezor Director Touro Law Center for Innovation in Business, Law and Technology jezor@tourolaw.edu Nassau County Bar Association Corporation/ Banking & Securities Law Committee October 8, 2013
  • 2. Wireless Devices Key to Modern Business • Access to data • Communications – Colleagues – Clients/Customers – Others • Mobile workforce • 24/7/365 workcycle • Instant responsiveness demands jezor@tourolaw.edu
  • 3.
  • 4. Challenges of Mobile Implementation • Cost • Platform choice • Updates/Upgrades • Training • Support • Vendor changes (e.g. Blackberry) jezor@tourolaw.edu
  • 5. BYOD: Leveraging Employee Choices • Employees increasingly buying/updating personal devices • May be more sophisticated than company standard • Employees may cover some/all costs • Personal familiarity may reduce training need • Major platforms increasingly interoperate jezor@tourolaw.edu
  • 6. Balancing BYOD Benefits and Risks • BYOD not without risks, including – Employee-driven vs. mission-driven – Complexity and cost of support – Software and licensing – Security – Confidentiality – Personal vs. professional – Compliance – Litigation • Must balance risks with rewards jezor@tourolaw.edu
  • 7. jezor@tourolaw.edu • Choice of approved devices should reflect business needs – IT platform – Applications & functionality – Security • Employee requests can conflict • Failure to support owned devices can undermine BYOD intention • Consumer devices for business purposes Employee-Driven Vs. Mission-Driven
  • 8. jezor@tourolaw.edu Complexity And Cost Of Support • Diversity of hardware/OSes means almost unlimited potential support obligation • Everything from setup to chargers to software • Employees may expect or demand support from IT staff • Refresh cycle a factor as well
  • 9. jezor@tourolaw.edu Software and Licensing • Organization’s software may include licensing restrictions – Enterprise vs. personal devices – Number of total/concurrent users – Expiration of licenses/versions/support • Older licensed software may not support new mobile platforms • Need to consider existing licenses, negotiate new ones with BYOD in mind • Interoperability of software also a factor
  • 10. jezor@tourolaw.edu Security • Multiple potential security breach vectors on mobile devices – Malware – Insecure WiFi – Unencrypted connections – Utilities – Older versions of OS • Consumer devices may offer fewer security options than business-specific ones • Some devices support VPN, push profiles for security settings
  • 11. jezor@tourolaw.edu Confidentiality • Every mobile device a potential data breach channel – Mass storage – Lost/stolen devices – Backups • Employees may share devices with family, others • Use may violate NDAs, regulatory/legal requirements • Risks of accidental breaches – GPS – EXIF data – Social media
  • 12. jezor@tourolaw.edu Personal Vs. Professional • Boundaries always a problem for mobile workforce • Use of personal devices exacerbates challenges • Harder to establish, enforce limitations on personal use • Labor laws also potentially involved
  • 15. jezor@tourolaw.edu Compliance • Requirements may not exclude personal devices – Document/correspondence retention – Security – Privacy – Tax • Auditors, enforcement officials may require access to employee devices • Also more difficult to change practices for new/changed regulations
  • 16. jezor@tourolaw.edu Litigation • Discovery requests may/should include employee devices • True of home computers as well as BYOD • Holds, deletion policies also face challenges • Shared devices also an issue • Employees may be uncomfortable opening personal equipment to scrutiny
  • 17. jezor@tourolaw.edu Risk Management for BYOD • Implementation must include awareness, management of risks • Involve all stakeholders – IT – Legal – Finance – Operations – HR – Employees • Plan, budget for training and support • Communicate decisions and rationale to all
  • 18. jezor@tourolaw.edu • Written policy on supported devices/platforms/uses • IT infrastructure chosen/configured to enhance security as well as convenience • Educational materials for most-common devices – Setup – Security – Remote wiping – Encryption • Ongoing review of implementation, issues • Verify insurance and other risk management coverage Best Practices for BYOD
  • 19. Professor Jonathan I. Ezor jezor@tourolaw.edu @ProfJonathan on Twitter Questions?