SlideShare a Scribd company logo
1 of 19
Download to read offline
BYOD:
Managing the Risks of
Bring Your Own Device
Policies
Prof. Jonathan I. Ezor
Director
Touro Law Center for Innovation
in Business, Law and Technology
jezor@tourolaw.edu
Nassau County Bar Association
Corporation/ Banking & Securities Law Committee
October 8, 2013
Wireless Devices
Key to Modern
Business
• Access to data
• Communications
– Colleagues
– Clients/Customers
– Others
• Mobile workforce
• 24/7/365 workcycle
• Instant responsiveness demands
jezor@tourolaw.edu
Challenges of Mobile
Implementation
• Cost
• Platform choice
• Updates/Upgrades
• Training
• Support
• Vendor changes (e.g. Blackberry)
jezor@tourolaw.edu
BYOD: Leveraging
Employee Choices
• Employees increasingly buying/updating
personal devices
• May be more sophisticated than company
standard
• Employees may cover some/all costs
• Personal familiarity may reduce training need
• Major platforms increasingly interoperate
jezor@tourolaw.edu
Balancing BYOD
Benefits and Risks
• BYOD not without risks, including
– Employee-driven vs. mission-driven
– Complexity and cost of support
– Software and licensing
– Security
– Confidentiality
– Personal vs. professional
– Compliance
– Litigation
• Must balance risks with rewards
jezor@tourolaw.edu
jezor@tourolaw.edu
• Choice of approved devices should reflect
business needs
– IT platform
– Applications & functionality
– Security
• Employee requests can conflict
• Failure to support owned devices can undermine
BYOD intention
• Consumer devices for business purposes
Employee-Driven Vs.
Mission-Driven
jezor@tourolaw.edu
Complexity And Cost
Of Support
• Diversity of hardware/OSes means almost
unlimited potential support obligation
• Everything from setup to chargers to software
• Employees may expect or demand support from
IT staff
• Refresh cycle a factor as well
jezor@tourolaw.edu
Software and
Licensing
• Organization’s software may include licensing
restrictions
– Enterprise vs. personal devices
– Number of total/concurrent users
– Expiration of licenses/versions/support
• Older licensed software may not support new
mobile platforms
• Need to consider existing licenses, negotiate new
ones with BYOD in mind
• Interoperability of software also a factor
jezor@tourolaw.edu
Security
• Multiple potential security breach vectors on
mobile devices
– Malware
– Insecure WiFi
– Unencrypted connections
– Utilities
– Older versions of OS
• Consumer devices may offer fewer security
options than business-specific ones
• Some devices support VPN, push profiles for
security settings
jezor@tourolaw.edu
Confidentiality
• Every mobile device a potential data breach
channel
– Mass storage
– Lost/stolen devices
– Backups
• Employees may share devices with family, others
• Use may violate NDAs, regulatory/legal
requirements
• Risks of accidental breaches
– GPS
– EXIF data
– Social media
jezor@tourolaw.edu
Personal Vs.
Professional
• Boundaries always a problem for mobile
workforce
• Use of personal devices exacerbates challenges
• Harder to establish, enforce limitations on
personal use
• Labor laws also potentially involved
http://ezor.org/a7k4n
Allen v. Chicago
jezor@tourolaw.edu
Compliance
• Requirements may not exclude personal devices
– Document/correspondence retention
– Security
– Privacy
– Tax
• Auditors, enforcement officials may require
access to employee devices
• Also more difficult to change practices for
new/changed regulations
jezor@tourolaw.edu
Litigation
• Discovery requests may/should include employee
devices
• True of home computers as well as BYOD
• Holds, deletion policies also face challenges
• Shared devices also an issue
• Employees may be uncomfortable opening
personal equipment to scrutiny
jezor@tourolaw.edu
Risk Management for
BYOD
• Implementation must include awareness,
management of risks
• Involve all stakeholders
– IT
– Legal
– Finance
– Operations
– HR
– Employees
• Plan, budget for training and support
• Communicate decisions and rationale to all
jezor@tourolaw.edu
• Written policy on supported devices/platforms/uses
• IT infrastructure chosen/configured to enhance security as
well as convenience
• Educational materials for most-common devices
– Setup
– Security
– Remote wiping
– Encryption
• Ongoing review of implementation, issues
• Verify insurance and other risk management coverage
Best Practices for
BYOD
Professor Jonathan I. Ezor
jezor@tourolaw.edu
@ProfJonathan on Twitter
Questions?

More Related Content

What's hot

Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3jpc6760
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical IssuesMISY
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in TechnologyGregory Barnes
 
Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3jpc6760
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterMark Moran
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHSMisterHobbs
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingNeal Axton
 
Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2jpc6760
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomGabriella Maree Wheeler
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)onlineprivacy
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Media technology
Media technologyMedia technology
Media technologycgscootr
 
Media technology
Media technologyMedia technology
Media technologycgscootr
 

What's hot (19)

Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3Casanova juanitap.~edtc6340.65copyrightrevision3
Casanova juanitap.~edtc6340.65copyrightrevision3
 
Digital divide
Digital divideDigital divide
Digital divide
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3Casanova juanitap.~edtc6340.65copyright presentation3
Casanova juanitap.~edtc6340.65copyright presentation3
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHS
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud Computing
 
Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2Casanova juanitap.~edtc6340.65copyright presentation2
Casanova juanitap.~edtc6340.65copyright presentation2
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Media technology
Media technologyMedia technology
Media technology
 
Media technology
Media technologyMedia technology
Media technology
 

Viewers also liked

Newsletter September 2011
Newsletter September 2011Newsletter September 2011
Newsletter September 2011EducationUSA
 
Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...
Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...
Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...Alyse Ergood McKeal
 
Testing print-fr url
Testing print-fr urlTesting print-fr url
Testing print-fr urlVivastream
 
Sentinela do Jacui - edição 390
Sentinela  do Jacui -  edição  390Sentinela  do Jacui -  edição  390
Sentinela do Jacui - edição 390Sentinela do Jacui
 
Lib h3lp pidgin info session for staff
Lib h3lp pidgin info session for staffLib h3lp pidgin info session for staff
Lib h3lp pidgin info session for staffElizabeth Brown
 
Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)
Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)
Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)georgios2000
 
CICLIN TICS
CICLIN TICSCICLIN TICS
CICLIN TICSalfa6
 
Une Immense Prison De Verre En Autriche Fin
Une Immense Prison De Verre En Autriche FinUne Immense Prison De Verre En Autriche Fin
Une Immense Prison De Verre En Autriche Finadam eva
 
Read across america
Read across americaRead across america
Read across americacreosis
 
Getting to Emory from Agnes Scott on the Cliff Bus
Getting to Emory from Agnes Scott on the Cliff BusGetting to Emory from Agnes Scott on the Cliff Bus
Getting to Emory from Agnes Scott on the Cliff BusMcCain Library
 
Newsletter November 2010
Newsletter  November 2010Newsletter  November 2010
Newsletter November 2010EducationUSA
 
Newsletter December 2010
Newsletter  December 2010Newsletter  December 2010
Newsletter December 2010EducationUSA
 

Viewers also liked (20)

Newsletter September 2011
Newsletter September 2011Newsletter September 2011
Newsletter September 2011
 
May Wan 9B1
May Wan 9B1May Wan 9B1
May Wan 9B1
 
Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...
Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...
Florida SULS Information Literacy Subcommittee Presentation by group:2011 Gra...
 
Testing print-fr url
Testing print-fr urlTesting print-fr url
Testing print-fr url
 
Journal de bussy numéro 102
Journal de bussy numéro 102Journal de bussy numéro 102
Journal de bussy numéro 102
 
Sentinela do Jacui - edição 390
Sentinela  do Jacui -  edição  390Sentinela  do Jacui -  edição  390
Sentinela do Jacui - edição 390
 
Lib h3lp pidgin info session for staff
Lib h3lp pidgin info session for staffLib h3lp pidgin info session for staff
Lib h3lp pidgin info session for staff
 
Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)
Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)
Θεολογική Σχολή Τιμίου Σταυρού Βοστώνης (HCHC)
 
CICLIN TICS
CICLIN TICSCICLIN TICS
CICLIN TICS
 
Lib h3lp show
Lib h3lp showLib h3lp show
Lib h3lp show
 
Cuba
CubaCuba
Cuba
 
Une Immense Prison De Verre En Autriche Fin
Une Immense Prison De Verre En Autriche FinUne Immense Prison De Verre En Autriche Fin
Une Immense Prison De Verre En Autriche Fin
 
Private a-h
Private a-hPrivate a-h
Private a-h
 
Read across america
Read across americaRead across america
Read across america
 
EEC Final PDF
EEC Final PDFEEC Final PDF
EEC Final PDF
 
Nueva zelanda
Nueva zelandaNueva zelanda
Nueva zelanda
 
Getting to Emory from Agnes Scott on the Cliff Bus
Getting to Emory from Agnes Scott on the Cliff BusGetting to Emory from Agnes Scott on the Cliff Bus
Getting to Emory from Agnes Scott on the Cliff Bus
 
Newsletter November 2010
Newsletter  November 2010Newsletter  November 2010
Newsletter November 2010
 
Newsletter December 2010
Newsletter  December 2010Newsletter  December 2010
Newsletter December 2010
 
Gazeta
GazetaGazeta
Gazeta
 

Similar to 10-8-13 BYOD Risk Presentation for Nassau County Bar Committee

Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Deputy it operations manager chris down -interview presentation - final
Deputy it operations manager    chris down  -interview presentation - finalDeputy it operations manager    chris down  -interview presentation - final
Deputy it operations manager chris down -interview presentation - finalchrisdown68
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy ChallengesJonathan Ezor
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Huntsman Security
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Faindra Jabbar
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Christopher Hunt
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)Michael W. Chitwa
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya
 
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014Tarek Nader
 

Similar to 10-8-13 BYOD Risk Presentation for Nassau County Bar Committee (20)

Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
Deputy it operations manager chris down -interview presentation - final
Deputy it operations manager    chris down  -interview presentation - finalDeputy it operations manager    chris down  -interview presentation - final
Deputy it operations manager chris down -interview presentation - final
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
 
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
 

More from Jonathan Ezor

Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterJonathan Ezor
 
Legal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in LitigationLegal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in LitigationJonathan Ezor
 
Privacy Pitfalls in Transactions
Privacy Pitfalls in TransactionsPrivacy Pitfalls in Transactions
Privacy Pitfalls in TransactionsJonathan Ezor
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practiceJonathan Ezor
 
Social Media And Legal Ethics
Social Media And Legal EthicsSocial Media And Legal Ethics
Social Media And Legal EthicsJonathan Ezor
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright PresentationJonathan Ezor
 
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media RiskJonathan Ezor
 
9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation9 23 09 140tc Security Presentation
9 23 09 140tc Security PresentationJonathan Ezor
 
Social Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsSocial Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsJonathan Ezor
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLEJonathan Ezor
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics PresentationJonathan Ezor
 

More from Jonathan Ezor (11)

Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
Legal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in LitigationLegal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in Litigation
 
Privacy Pitfalls in Transactions
Privacy Pitfalls in TransactionsPrivacy Pitfalls in Transactions
Privacy Pitfalls in Transactions
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice
 
Social Media And Legal Ethics
Social Media And Legal EthicsSocial Media And Legal Ethics
Social Media And Legal Ethics
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
 
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
 
9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation
 
Social Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsSocial Media Horror Stories for Law Students
Social Media Horror Stories for Law Students
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation
 

Recently uploaded

Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Recently uploaded (20)

Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

10-8-13 BYOD Risk Presentation for Nassau County Bar Committee

  • 1. BYOD: Managing the Risks of Bring Your Own Device Policies Prof. Jonathan I. Ezor Director Touro Law Center for Innovation in Business, Law and Technology jezor@tourolaw.edu Nassau County Bar Association Corporation/ Banking & Securities Law Committee October 8, 2013
  • 2. Wireless Devices Key to Modern Business • Access to data • Communications – Colleagues – Clients/Customers – Others • Mobile workforce • 24/7/365 workcycle • Instant responsiveness demands jezor@tourolaw.edu
  • 3.
  • 4. Challenges of Mobile Implementation • Cost • Platform choice • Updates/Upgrades • Training • Support • Vendor changes (e.g. Blackberry) jezor@tourolaw.edu
  • 5. BYOD: Leveraging Employee Choices • Employees increasingly buying/updating personal devices • May be more sophisticated than company standard • Employees may cover some/all costs • Personal familiarity may reduce training need • Major platforms increasingly interoperate jezor@tourolaw.edu
  • 6. Balancing BYOD Benefits and Risks • BYOD not without risks, including – Employee-driven vs. mission-driven – Complexity and cost of support – Software and licensing – Security – Confidentiality – Personal vs. professional – Compliance – Litigation • Must balance risks with rewards jezor@tourolaw.edu
  • 7. jezor@tourolaw.edu • Choice of approved devices should reflect business needs – IT platform – Applications & functionality – Security • Employee requests can conflict • Failure to support owned devices can undermine BYOD intention • Consumer devices for business purposes Employee-Driven Vs. Mission-Driven
  • 8. jezor@tourolaw.edu Complexity And Cost Of Support • Diversity of hardware/OSes means almost unlimited potential support obligation • Everything from setup to chargers to software • Employees may expect or demand support from IT staff • Refresh cycle a factor as well
  • 9. jezor@tourolaw.edu Software and Licensing • Organization’s software may include licensing restrictions – Enterprise vs. personal devices – Number of total/concurrent users – Expiration of licenses/versions/support • Older licensed software may not support new mobile platforms • Need to consider existing licenses, negotiate new ones with BYOD in mind • Interoperability of software also a factor
  • 10. jezor@tourolaw.edu Security • Multiple potential security breach vectors on mobile devices – Malware – Insecure WiFi – Unencrypted connections – Utilities – Older versions of OS • Consumer devices may offer fewer security options than business-specific ones • Some devices support VPN, push profiles for security settings
  • 11. jezor@tourolaw.edu Confidentiality • Every mobile device a potential data breach channel – Mass storage – Lost/stolen devices – Backups • Employees may share devices with family, others • Use may violate NDAs, regulatory/legal requirements • Risks of accidental breaches – GPS – EXIF data – Social media
  • 12. jezor@tourolaw.edu Personal Vs. Professional • Boundaries always a problem for mobile workforce • Use of personal devices exacerbates challenges • Harder to establish, enforce limitations on personal use • Labor laws also potentially involved
  • 15. jezor@tourolaw.edu Compliance • Requirements may not exclude personal devices – Document/correspondence retention – Security – Privacy – Tax • Auditors, enforcement officials may require access to employee devices • Also more difficult to change practices for new/changed regulations
  • 16. jezor@tourolaw.edu Litigation • Discovery requests may/should include employee devices • True of home computers as well as BYOD • Holds, deletion policies also face challenges • Shared devices also an issue • Employees may be uncomfortable opening personal equipment to scrutiny
  • 17. jezor@tourolaw.edu Risk Management for BYOD • Implementation must include awareness, management of risks • Involve all stakeholders – IT – Legal – Finance – Operations – HR – Employees • Plan, budget for training and support • Communicate decisions and rationale to all
  • 18. jezor@tourolaw.edu • Written policy on supported devices/platforms/uses • IT infrastructure chosen/configured to enhance security as well as convenience • Educational materials for most-common devices – Setup – Security – Remote wiping – Encryption • Ongoing review of implementation, issues • Verify insurance and other risk management coverage Best Practices for BYOD
  • 19. Professor Jonathan I. Ezor jezor@tourolaw.edu @ProfJonathan on Twitter Questions?