First Reference company logo

Inside Internal Controls

News and discussion on implementing risk management

machine cogs image

Bring-your-own-device

How much should big brother monitor (and other BYOD considerations)

Given the popularity and prevalence of mobile devices such as smart phones and tablets in today’s world, it is no surprise that Bring Your Own Device (“BYOD”) programs have become an increasingly common arrangement for organizations. BYOD programs allow employees to use their own mobile devices for both personal and business purposes, blurring the traditional line between work and play. A recent report indicates that more than 75% of Canadian businesses support employee–purchased smartphones and tablets in the workplace.

 

, , , , , , , ,

Office of the Information and Privacy Commissioners bring your own device program guidelines

iphone-ipad-bring-your-own-device

Using personal devices at work to conduct business (BYOD or “bring your own device”) has become commonplace in the last couple of years. Employers are implementing BYOD policies left, right and centre to try to control the privacy challenges this practice can bring about when employers access these devices to protect their data contained on them.

 

, , , , , , , ,

BYOD: you’re probably already doing it, but are you doing it smart?

By now, countless businesses have had to address some issue relating to an employee using her or his personal digital device for work purposes (“bring your own device” or BYOD). An employee wants to access the office wireless network on her laptop so she can work while away from her desk; another wants to store and view work documents on his tablet; another just wants to check her work email from her smartphone. These are just a few of the many ways workers are using personal digital devices to perform work-related tasks.

 

, , , , , , , , , , , , , , , , , , , , , , , , , , ,

BYOD: Bring your own device is a growing business trend

iphone-ipad-bring-your-own-device

Since well before Information Technology PolicyPro was first published and for good reasons considering the technologies available at the time, it made sense to restrict devices connected to the corporate network to those owned and controlled by the enterprise and configured by IT. This is no longer the case.

 

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,