Bring Your Own Device - a Misnamed Concept?


Published on

BYOD is all the rage, but our MD, Daragh O Brien, has a contrarian view.
BYOD places the emphasis on the devices and technology. This is wrong. The focus needs to shift back to the reason we have this technology in the first place - accessing and processing information.
By thinking "GATOR" (Give Access to Our Resources) we can broaden our thinking about the Who, How, Where, Why, and When of our information management regardless of how the device that is accessing it was procured.

This presentation was prepared and delivered for an awareness event hosted by Netspeed ( and Aruba

Published in: Business, Technology, Career
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Bring Your Own Device - a Misnamed Concept?

  1. 1. Bring your own device… A misnamed concept?
  2. 2. About Castlebridge Associates ( Data Protection Data Protection Information Quality Consulting Coaching/ Mentoring Training Data Governance Information Quality Data Governance Project Management Quality Assured Certified Trainers Qualified & Experienced External QA Audits Irish State Approved Training Provider IQCP & DP Certified Quality Assured Syllabus Fin. Svcs Telco Many Industries Govt Edu Certified PMs Utilities NonProfit
  3. 3. Home Workers access data..
  4. 4. Different ways it is accessed
  5. 5. Home Office Sitting Room Kitchen Living room
  6. 6. Data Protection Angle • DPA requires that organisations take appropriate measures to protect data from unauthorised access, alteration, or disclosure. • Applies to physical data as well as electronic data
  7. 7. Good Characteristics • Physically separate from rest of house • Can lock the door when not in use (secure) • Not accessible by others without permission • Easy to identify boundaries • Physically secure • A locked down work issued device for accessing data • Organisation must ensure appropriate security measures are being taken for manual and electronic data. • Securing WiFi • Lockable filing cabinets • Distinct and secure work environment
  8. 8. Question: • When a Teleworker changes jobs can their employer sell their house? • When a teleworker has a break-in, does their employer take all their other stuff away?
  9. 9. Extend the metaphor Games Family Games Photos Photos Music Photos Cat Photos Pictures Photos Work Using personal device for work is the same as using your personal space for work. What happens if your personal device is lost or stolen? What happens to the segregation between personal and work? What happens when policy requires your personal space to be invaded and wiped to protect Work?
  10. 10. What is the goal? Security of the DATA Why care about the device?
  11. 11. Other Issues • Need to manage the risk of disclosure of private non-work data if data is ever required to be presented in evidence in legal proceedings. • The “search warrant” will only cover the “workspace”. • Constitutional and other issues arise if the private personal space is invaded without due cause and authority.
  12. 12. Reframe the conversation Give Access to Our Data Give Access to Our Resources Regardless of who OWNS the device
  13. 13. Reframe the metaphor Create a distinct workspace on your device Games Family Photos Photos Cat Pictures Work can control that and all its parameters Work and personal segregated Music Work Wipe the workspace, leave the personal space.
  14. 14. A future conversation Don’t worry. We’ve wiped the workspace and locked it Would youHi. Helpdesk here. personal like us to wipe your out.Cat Pictures and accessfor our data No one can lost your device? Oh You’ve get Music to you? now
  15. 15. Reframing BYOD G ive/Get A ccess To O ur R esources
  16. 16. What you need to do now Define your GATOR™ strategy (and make it snappy!!!) (the term “GATOR” and “GATOR Strategy” are © 2013 Castlebridge Associates)