BYOD - the Consumerization of IT Top 10 Legal Challenges in Creating a BYOD Policy Lou Milrad BA, LLB. IT Lawyer & AbD – Municipalities Milrad Law.

Slides:



Advertisements
Similar presentations
H OGAN & H ARTSON, L.L.P.
Advertisements

Shipbuilding Intellectual Property Protection CESA/GuardSHIP Rotterdam, 4 February 2010.
EMPLOYMENT CONTRACTS: WHAT IS IMPLIED AND WHAT IS NOT? RICHARD J. GILBORN, Q.C., April 30, 2004.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com.
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
Lou Milrad B.A., LL.B. Lawyer MilradLaw. This presentation illustrates a sampling of issues relating to cloud service contracts while also providing discussion.
Developing a Records & Information Retention & Disposition Program:
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Session 3 – Information Security Policies
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Computer Security: Principles and Practice
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Four tips to mitigate Mobile fraud in the future.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
HIPAA PRIVACY AND SECURITY AWARENESS.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
LEGAL CHALLENGES & STRATEGIES IN E-PROCUREMENT IN CONSTRUCTION
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Part 2: Negotiating the Transaction. The Deal Team –Should comprise at a minimum: Corporate Finance lead; M&A Legal lead; Commercial/Business Lead; Integration.
TRADE SECRETS Presented By Joseph A. Calvaruso Orrick, Herrington & Sutcliffe LLP 1 © AIPLA 2012.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Session 8 Confidentiality and disclosure. 1 Contents Part 1: Introduction Part 2: The duty of confidentiality Part 3: The duty of disclosure Part 4: Confidentiality.
Is Your Background Check Process Compliant?. 2 © Copyright 2015 ADP, LLC. Proprietary and Confidential Information. Agenda Privileged & Confidential.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Dino Tsibouris (614) Updates on Cloud, Contracting, Privacy, Security, and International Privacy Issues Mehmet Munur (614)
Data Security and Privacy Overview and Update Peter Moldave October 28, 2015.
Protecting your Managed Services Practice: Are you at Risk?
The Law Offices of Sheila Deselich Cohen. Generally subject to the Employee Retirement Income Security Act of 1974 (“ERISA”). Two main types of plans:
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Wisconsin Department of Health Services Purchase of Services Contract Guide Julie Anstett and Lucinda Champion Friday, May 6, 2016 Wisconsin Department.
Protecting PHI & PII 12/30/2017 6:45 AM
Fusion Center ITS security and Privacy Operations Joe Thomas
E&O Risk Management: Meeting the Challenge of Change
IS4680 Security Auditing for Compliance
Privacy and Security in the Employment Relationship
Chapter 3: IRS and FTC Data Security Rules
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Move this to online module slides 11-56
Current Privacy Issues That May Affect Your Credit Union
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

BYOD - the Consumerization of IT Top 10 Legal Challenges in Creating a BYOD Policy Lou Milrad BA, LLB. IT Lawyer & AbD – Municipalities Milrad Law

In Minneapolis, BYOD is Better Bring-your-own-device policies allow government employees to use their iPads for both professional and personal purposes. Leeds City Council Opens Doors To BYOD Trend Leeds City Council has embraced the BYOD trend after it opted to become agnostic to mobile handsets iPhones and iPads have totally changed how this police department works The State of BYOD in Local Government: 3 CIOs Speak Out - If managed properly, BYOD can be a win both for IT and for end users. Guelph upgrades network for Bring Your Own Device (BYOD) policy PepsiCo took a chance and gave iPhones to 4,500 hourly employees -- and it's paying off

Legal Perspective It’s all about potentials downstream liability to 1. the organization itself, 2. its employees & external advisors, and to 3. third parties.

 AUP- Acceptable Use Policy  BYOC – Bring Your Own Computer  BYOD – Bring Your Own Device  BYOPC – Bring Your Own PC  MDM – Mobile Device Management

 1. Data Security and Protecting Data Integrity  2. Prohibition against "jail breaking" or “rooting”  3. Confidential Information  4. Electronic communications, document preservation and evidentiary obligations  5. Insurance and Liability Considerations  6. General Duty of Care  7. Privacy (Personal Information)  8. Employee – Employer relationship  9. Training & education  10. Licensing & Intellectual Property Rights

 All about the data, and not the device and separation of personal from business  Employees need to know about what constitutes acceptable use  Restricted access to Confidential Information  Up-front employee’s consent to remotely wipe  Rules about loading of third party apps – do they need to be first vetted?  Rooting & Jail breaking  Use of device by family members

 Why?  Potential third party liability to both Organization and Employee by  Bypassing digital rights management restrictions & enterprise safeguards thereby opening the gateway to  Sharing copyrighted media;  Providing direct access to the file system, user interfaces, or network- based capabilities that are otherwise hidden or locked;  Some curious-minded developers wish to gain root access to  Learn more about how the OS works, or  Scour the device and applications for exploitable vulnerabilities (and which might well include firewall bypass apps).

 Associated Concerns with Unreviewed Apps & Possible Impact  Introduction of malware  Shortened device battery life through battery drain and destabilized operating environment  Unreviewed applications with privileged access drain battery life and destabilize the operating environment;  Additional or unwanted functionality through App updating process  Possible voidance of manufacturer’s warranty or violation of the carrier’s service terms.  Potential risk of carrier throttling for BYOD.  Employees need to be briefed on underlying rationale in support of this prohibition

 How broadly or narrowly will it be defined in the policy?  Defining Characteristics of Confidential Information: Typically includes intangible assets (and associated materials) such as trade secrets, designs, processes, programs, procedures, third party Information, developments, disclosed under terms of a software license or services agreement  Breach of Confidentiality: Legal obligation of employees to respect the organization’s intangible assets, business and trade secrets etc. and maintain their confidentiality both during and after term of employment  Confidentiality & Non-Disclosure Agreements (NDA’s)  Provision for application certificates, screen protection, encryption and remote-wipe capabilities?  Geo-fencing

 IT LEADERS NEED TO BE MINDFUL OF GENERAL LEGAL REQUIREMENTS GOVERNING ELECTRONIC COMMUNICATIONS AND E-COMMERCE  Document Retention (and Destruction) laws and policies as well as those pertaining to digital evidence.  Document retention requirements arising under  private contracts, as well as under  diverse statutory schemes that include provincial and federal and corporation acts, income tax as well as privacy-related legislation.  Legal retention requirements may also apply to documents comprising  employment records,  workplace safety, and  pension benefits.  Legal Framework for introducing into evidence any Electronically stored information (ESI).  Civil or criminal matter, there’s a legal framework for introducing into evidence any electronically stored information (ESI).

 BYOD policy will need to consider how liability will be apportioned between the individual and the organization  It is necessary to identify in a BYOD policy whether the user or company will be liable for loss or theft of BYOD devices (particularly important if the organization’s insurance policies cover an employee-owned device being used under a BYOD policy.  Review applicable insurance policies for coverage/non-coverage  Pay particular attention to the protection and compliance with all Intellectual Property and licensing issues.  Is the employee or organization to be responsible for lost or stolen devices?  What about responsibility for malware or virus attacks on BYOD device?  Does the employer’s existing insurance provide coverage for employee owned devices that are part of a BYOD policy?  Who is to be specified as responsible for replacement upon theft or loss should employer’s insurance coverage not provide for employees device coverage

Our legal system recognizes that every person and every entity, whether public or private, has a general duty of care.  Early implementation of a best practices approach  Must embrace appropriate employee education and training  In addition, carefully drafted liability disclaimers can to a certain extent reduce general liability.  The BYOD strategy and resulting policy should always reflect a keen observance of this general duty of care.  May well preclude your organization from third party liability, financial or otherwise, arising through employees’ or consultants’ personal failure to comply with all applicable regulatory, privacy, IPR and confidentiality obligations.

Makings of a perfect storm with the convergence on one device of both personal and corporate data  Presents a complication - the trusteeship by the organization of personal information of the person using the BYOD device coupled with possible access, handling and disclosure of personal information of others stored on the corporate servers.  A workplace surveillance strategy may also be envisioned and in which event, employers will need to have in place, and made easily available and accessible, a data surveillance policy.  Will the company be permitted access to an employee's own s and text messages (SMS) on a personal smartphone or tablet used by that employee for work?  And what about browsing history, installed software and other data?

Employees are obligated to respect the company’s confidential information, including business and trade secrets, lists of sales leads, and other proprietary data and to keep and maintain the confidentiality of such corporate assets after termination of an employment contract.  Criminal prosecution may result from any failure to maintain the confidentiality of such information, particularly if intentionally misappropriated.  In addition, companies often require employees, consultants, contractors, and freelancers to sign confidentiality agreements (NDA’s) to establish a legal framework for non-compliance.  Organizations become challenged in gathering proof of a breach of confidentiality and enforcing policy when people store any such proprietary data on their own personal iPhones, Androids, and other smartphones or tablets.  Therefore, an absolute requirement of a BYOD policy needs to require employees (and project consultants, etc.) to permit the company to check out their device when they leave the company to make certain that all confidential information has been deleted.  The actual timing of the checking procedure becomes a critical factor.

 Implementation and adherence to a policy can only be effective if there has been proper training and education for employees and those others having access to corporate information.  Organizations are well advised to organize programs that will serve to familiarize employees with the strategy and with the thinking that preceded implementation of the BYOD policy.

 Watch out for software licensing infractions:  The enterprise’s various software applications may be licensed to the company under a variety of software proprietors’ individual or collective strategies  software and service services providers typically have fairly comprehensive and detailed fees-based licensing structures and charges that range from a per user, or per device type of license, to a number of users concurrently accessing the software from a single location, through to an enterprise wide arrangement.

 Enterprise Licenses - Review underlying licensing terms of the organization:  Critically important to spend time carefully reviewing the terms of use under such applicable licenses to ensure that corporate implementation of BYOD technologies will not breach the licensing terms in place with the software and providers.  Allowing employees to use company applications on their own devices, for example, may breach the company’s current licensing agreement.

 BYOD Licenses - Consider also the licensing terms for the BYOD applications and the accompanying licence rights:  what are the limitations, to whom do they apply (largely dependent on whether it is the company or the employee that signs up with the provider), and  are they, or will they be in violation of any existing third-party contracts or corporate policies?  It is incumbent upon the organization, as well as the employee, to mitigate against potential intellectual property and contractual claims from third parties.

Lou Milrad IT Lawyer Milrad Law Office