Mobile Devices, BYOD, and the Workforce: Responsible Mobile Computing,

Slides:



Advertisements
Similar presentations
BRING YOUR OWN DEVICE Presenter: Rachelle R. Green Duffy & Sweeney, Ltd.
Advertisements

Security for Mobile Devices
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.
Driving change in information risk within the financial services industry Subtitle Date.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
© Clearwater Compliance LLC | All Rights Reserved Copyright Notice 1 Copyright Notice. All materials contained within this document are protected by United.
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq
BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Emerging Risks in a Mobile.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Steps to Compliance: Bring Your Own Device PRESENTED BY.
Mobile Data Management (MDM) July 24, 2013 Lance M. Calisch.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Security considerations for mobile devices in GoRTT
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Workshifting Transform your business – empower your people.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
© 2016 Paychex, Inc. All rights reserved. © 2016, PAYCHEX, Inc. All rights reserved. Independent Contractor or Employee: How Do You Know? Paychex HR Services.
What is Cloud Computing?
The BEST Citrix/Microsoft RDS alternative
Law Firm Data Security: What In-house Counsel Need to Know
Protecting PHI & PII 12/30/2017 6:45 AM
The time to address enterprise mobility is now
Hybrid Cloud Web Filtering Platform
Using Office 365 Across All Your Devices
Protection of CONSUMER information
Using Technology to Manage Information
Challenges facing Enterprise Mobility
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Now What??? Stefanie Walker HR Consultant
Securing Information Systems
Chapter 3: IRS and FTC Data Security Rules
Securely run and grow your business with Microsoft 365 Business
Which is right for your business, Office 365 or Microsoft 365?
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Which is right for your business, Office 365 or Microsoft 365?
Introduction to BYOD EIT, Author Gay Robertson, 2017.
CompTIA Security+ Study Guide (SY0-401)
AMERICAN TIME AND LABOR COMPANY ENGAGEMENT
Building a Vertical Around Regulated Industries to Increase Your Business
System Center Marketing
BTEC level 3 Learning Aim D.
CALIFORNIA TIME AND LABOR COMPANY ENGAGEMENT
E-Safety.
COMPLETE BUSINESS TEXTING SOLUTION
Mobile Commerce and Ubiquitous Computing
Personal Mobile Device Acceptable Use Policy Training Slideshow
New Employee Handbook Orientation
Presentation transcript:

Mobile Devices, BYOD, and the Workforce: Responsible Mobile Computing, AICP GREAT LAKES CHAPTER May 18, 2017 Dan Cotter, Butler Rubin Saltarelli & Boyd dcotter@butlerrubin.com 312-696-4497

DISCLAIMER The materials in this presentation are intended to provide a general overview of the issues contained herein and are not intended nor should they be construed to provide specific legal or regulatory guidance or advice. If you have any questions or issues of a specific nature, you should consult with appropriate legal or regulatory counsel to review the specific circumstances involved. Views expressed are those of the speaker and are not to be attributed to his firm or clients.

GOALS OF SESSION This session will discuss compliance issues and some best practices for addressing the increasing prevalence of BYOD. Learn what constitutes “your own device” (smartphones, tablets, laptops, desktops, others?) and opportunities and challenges permitting BYOD create, including use while in transit, overtime issues, and other things that compliance should be thinking about.

AGENDA Define BYOD Why does it matter? Labor and Employment Issues Cyber/Privacy Issues E-discovery/Due diligence issues

DEFINITION BRING YOUR OWN DEVICE

IBM DEFINITION Bring your own device (BYOD) is an IT policy where employees are allowed or encouraged to use their personal mobile devices—and, increasingly, notebook PCs—to access enterprise data and systems

DEFINITION (CONT’D) Easy, right?

STATISTICS 2013 – 181.4 million United States users 2017- was expected to climb to 222.4 million users

OR IS IT? What about:

OR THIS?

WHAT ABOUT THIS?

WATCH, ANYONE?

AND?

WHY DOES IT MATTER? Benefits: Ability to be productive everywhere Reduces costs for the employer Responsiveness Risks: Loss/theft Malware Other exposures

FORMS IT MIGHT TAKE Company owned, business only Bring your own device Choose your own device Company owned, personally enabled

HOW MANY OF YOUR ORGANIZATIONS HAVE A BYOD POLICY?

THE TRADITIONAL BYOD POLICY Acceptable Use Support business Nothing illegal Devices and Support Smart phones Tablets Reimbursement We do not reimburse ,or We will reimburse X Security Passwords Remote wipe ActiveSync

THE TRADITIONAL BYOD POLICY (CONT’D) Good start, but…. Not Complete.

WHAT IS MISSING? USE BY NON-EXEMPT? AFTER HOURS? USE IN TRANSIT? DRIVING CAR? ON PUBLIC TRANSPORTATION? PUBLIC PLACES? DEFINITION OF BYOD? WHAT DOES YOUR ORGANIZATION SUPPORT?

LABOR AND EMPLOYMENT ISSUES

SCOTUS and Independent Contractors (3) The amount of the worker's investment in facilities and equipment Examples: Is the worker reimbursed for any purchases or materials, supplies, etc.? Does the worker use his or her own tools or equipment?

The Continuing Debate

EMPLOYEE ISSUES (CONT’D) Exempt/Non-Exempt? Do you have non-exempt with access who can answer at all hours of day and night? Overtime? BYOD/Employee Handbook? Distracted driving/walking? Hours of Use? Ability to monitor? What happens when leave employment?

CYBER/PRIVACY ISSUES

APPLICABLE LAWS FTC Privacy Protections HIPAA Gramm-Leach-Bliley Computer Fraud & Abuse Act Stored Communications Act

WHAT PLATFORM ON? IOS Much safer if have a password vs. hacking What password protocol do you have? Android Need to install additional safeguards Such as DFNDR

WIFI? Public use? What access does one have on smartphone/other devices?

LOCAL ADMINISTRATOR RIGHTS?

PORTAL ACCESS? - Shutoff or on for laptops?

ENCRYPTION? - What protections does it afford?

E-DISCOVERY/DUE DILIGENCE ISSUES Does anyone remember when Outlook asked if you wanted to archive? Something like this? Or a shorter message?

E-DISCOVERY (CONT’D) If you said yes, you then saved to .pst files, right?

E-DISCOVERY (CONT’D) Know where those went? Personal drives, thumb drives, etc. Anyone ever have to sign off on a production response as it being “complete” and “producing all responsive documents and information?”

Questions

Mobile Devices, BYOD, and the Workforce: Responsible Mobile Computing, AICP GREAT LAKES CHAPTER May 18, 2017 Dan Cotter, Butler Rubin Saltarelli & Boyd