SlideShare a Scribd company logo
BYOD, Portable, and Mobile Devices organizational security
policies.
The contemporary organizations have allowed their employees
to carry and use their
devices to work. This use of devices has had a negative and
positive impact on the organizations
concerned. Security issues are one of the demerits that come as
a result of using these devices.
Therefore, security polices are required to give direction on the
use of the devices.
The employee devices need strong policies that govern their use
to ensure that they do not
lead to any security issues. Thus, some consideration needs to
be made. First, the organization
needs to consider the security and privacy issues that might
come with the use of the devices and
plan on how they will ensure that they will not lead to privacy
issues (Fennelly, 2012). Second,
the organization should put in place policies regarding the
management standard to monitor how
each device is used within the premises. Third, there should be
working policies regarding the
safety of data on those devices. The fourth and last
consideration is communication policies
regarding their use.
The policy development might an easy task but the enforce
might face some challenges
which can render them ineffective. Workforce policy rejection
is one of the issues that
might affect the implementation of the policies. Secondly, the
organization might lack the
necessary resources and expertise to implement the policies.
The third challenge is the
communication issues that the concerned individual in the
organization with the implementation
of the policies might face due to changing requirements of the
policies (Fennelly, 2012). The last
challenges involve management and access of the information
privileged to every device; their
use might be a target to the criminals to access the organization
data.

More Related Content

Similar to BYOD, Portable, and Mobile Devices organizational security policies..docx

Ethical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityEthical mobility policy development & sustainability
Ethical mobility policy development & sustainability
Global Business Professor
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
DMIMarketing
 
Running head JUSTIFICATION REPORT PART 3 .docx
Running head JUSTIFICATION REPORT PART 3              .docxRunning head JUSTIFICATION REPORT PART 3              .docx
Running head JUSTIFICATION REPORT PART 3 .docx
charisellington63520
 
The Three Dimensions of Security
The Three Dimensions of SecurityThe Three Dimensions of Security
The Three Dimensions of Security
CSCJournals
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_Intindolo
John Intindolo
 
Enterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comEnterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.com
PhD Assistance
 
[IJCT-V3I2P29] Authors:Karandeep Kaur
[IJCT-V3I2P29] Authors:Karandeep Kaur[IJCT-V3I2P29] Authors:Karandeep Kaur
[IJCT-V3I2P29] Authors:Karandeep Kaur
IJET - International Journal of Engineering and Techniques
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
honey690131
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
wacasr
 
Business Strategy and Policy (MHRM 612-1)1. An organization’s .docx
Business Strategy and Policy (MHRM 612-1)1. An organization’s .docxBusiness Strategy and Policy (MHRM 612-1)1. An organization’s .docx
Business Strategy and Policy (MHRM 612-1)1. An organization’s .docx
RAHUL126667
 
Security and ethical challenges of it
Security and ethical challenges of itSecurity and ethical challenges of it
Security and ethical challenges of it
Praveen Choursiya
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
damilolasunmola
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
Enov8
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
cuddietheresa
 
Safeguardsintheworkplace
SafeguardsintheworkplaceSafeguardsintheworkplace
Safeguardsintheworkplace
Adam Richards
 
Enterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comEnterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.com
PhD Assistance
 
E-environment
E-environmentE-environment
E-environment
Hem Pokhrel
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Jim Kaplan CIA CFE
 
Introduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docxIntroduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docx
normanibarber20063
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
todd271
 

Similar to BYOD, Portable, and Mobile Devices organizational security policies..docx (20)

Ethical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityEthical mobility policy development & sustainability
Ethical mobility policy development & sustainability
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Running head JUSTIFICATION REPORT PART 3 .docx
Running head JUSTIFICATION REPORT PART 3              .docxRunning head JUSTIFICATION REPORT PART 3              .docx
Running head JUSTIFICATION REPORT PART 3 .docx
 
The Three Dimensions of Security
The Three Dimensions of SecurityThe Three Dimensions of Security
The Three Dimensions of Security
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_Intindolo
 
Enterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comEnterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.com
 
[IJCT-V3I2P29] Authors:Karandeep Kaur
[IJCT-V3I2P29] Authors:Karandeep Kaur[IJCT-V3I2P29] Authors:Karandeep Kaur
[IJCT-V3I2P29] Authors:Karandeep Kaur
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Business Strategy and Policy (MHRM 612-1)1. An organization’s .docx
Business Strategy and Policy (MHRM 612-1)1. An organization’s .docxBusiness Strategy and Policy (MHRM 612-1)1. An organization’s .docx
Business Strategy and Policy (MHRM 612-1)1. An organization’s .docx
 
Security and ethical challenges of it
Security and ethical challenges of itSecurity and ethical challenges of it
Security and ethical challenges of it
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
Safeguardsintheworkplace
SafeguardsintheworkplaceSafeguardsintheworkplace
Safeguardsintheworkplace
 
Enterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comEnterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.com
 
E-environment
E-environmentE-environment
E-environment
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Introduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docxIntroduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docx
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
 

More from dewhirstichabod

CASE STUDY 2.1 W. L. Gore and AssociatesHe was ready for anythi.docx
CASE STUDY 2.1 W. L. Gore and AssociatesHe was ready for anythi.docxCASE STUDY 2.1 W. L. Gore and AssociatesHe was ready for anythi.docx
CASE STUDY 2.1 W. L. Gore and AssociatesHe was ready for anythi.docx
dewhirstichabod
 
Case Study 1Case Study 1Ms. A. is an apparently heal.docx
Case Study 1Case Study 1Ms. A. is an apparently heal.docxCase Study 1Case Study 1Ms. A. is an apparently heal.docx
Case Study 1Case Study 1Ms. A. is an apparently heal.docx
dewhirstichabod
 
Case study 1Client ProfileMrs. Harriet is a 68-year-old .docx
Case study 1Client ProfileMrs. Harriet is a 68-year-old .docxCase study 1Client ProfileMrs. Harriet is a 68-year-old .docx
Case study 1Client ProfileMrs. Harriet is a 68-year-old .docx
dewhirstichabod
 
Case Study 11.1 Why the Circus No Longer Comes to TownFor 146 y.docx
Case Study 11.1 Why the Circus No Longer Comes to TownFor 146 y.docxCase Study 11.1 Why the Circus No Longer Comes to TownFor 146 y.docx
Case Study 11.1 Why the Circus No Longer Comes to TownFor 146 y.docx
dewhirstichabod
 
Case Study 10.3 Regulating Love at the OfficeThe office has bec.docx
Case Study 10.3 Regulating Love at the OfficeThe office has bec.docxCase Study 10.3 Regulating Love at the OfficeThe office has bec.docx
Case Study 10.3 Regulating Love at the OfficeThe office has bec.docx
dewhirstichabod
 
Case Study 1 Is Business Ready for Wearable ComputersWearable .docx
Case Study 1 Is Business Ready for Wearable ComputersWearable .docxCase Study 1 Is Business Ready for Wearable ComputersWearable .docx
Case Study 1 Is Business Ready for Wearable ComputersWearable .docx
dewhirstichabod
 
Case Study 1 Headaches Neurological system and continue practicing .docx
Case Study 1 Headaches Neurological system and continue practicing .docxCase Study 1 Headaches Neurological system and continue practicing .docx
Case Study 1 Headaches Neurological system and continue practicing .docx
dewhirstichabod
 
CASE STUDY 1 HeadachesA 20-year-old male complains of exper.docx
CASE STUDY 1 HeadachesA 20-year-old male complains of exper.docxCASE STUDY 1 HeadachesA 20-year-old male complains of exper.docx
CASE STUDY 1 HeadachesA 20-year-old male complains of exper.docx
dewhirstichabod
 
Case Study - Stambovsky v. Ackley and Ellis Realty Supreme C.docx
Case Study - Stambovsky v. Ackley and Ellis Realty Supreme C.docxCase Study - Stambovsky v. Ackley and Ellis Realty Supreme C.docx
Case Study - Stambovsky v. Ackley and Ellis Realty Supreme C.docx
dewhirstichabod
 
CASE STUDY - THE SOCIAL NETWORKThe growing use of social network.docx
CASE STUDY - THE SOCIAL NETWORKThe growing use of social network.docxCASE STUDY - THE SOCIAL NETWORKThe growing use of social network.docx
CASE STUDY - THE SOCIAL NETWORKThe growing use of social network.docx
dewhirstichabod
 
Case Study #1 Probation or PrisonWrite a 12 to one page (.docx
Case Study #1 Probation or PrisonWrite a 12 to one page (.docxCase Study #1 Probation or PrisonWrite a 12 to one page (.docx
Case Study #1 Probation or PrisonWrite a 12 to one page (.docx
dewhirstichabod
 
Case Studies of Data Warehousing FailuresFour studies of data .docx
Case Studies of Data Warehousing FailuresFour studies of data .docxCase Studies of Data Warehousing FailuresFour studies of data .docx
Case Studies of Data Warehousing FailuresFour studies of data .docx
dewhirstichabod
 
Case Studies GuidelinesWhat is a Case StudyCase studies.docx
Case Studies GuidelinesWhat is a Case StudyCase studies.docxCase Studies GuidelinesWhat is a Case StudyCase studies.docx
Case Studies GuidelinesWhat is a Case StudyCase studies.docx
dewhirstichabod
 
Case Studies Focusing on Fluency StrategiesCase Scenario .docx
Case Studies Focusing on Fluency StrategiesCase Scenario .docxCase Studies Focusing on Fluency StrategiesCase Scenario .docx
Case Studies Focusing on Fluency StrategiesCase Scenario .docx
dewhirstichabod
 
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docxCase Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
dewhirstichabod
 
Case Number 7Student’s NameInstitution Affiliation.docx
Case Number 7Student’s NameInstitution Affiliation.docxCase Number 7Student’s NameInstitution Affiliation.docx
Case Number 7Student’s NameInstitution Affiliation.docx
dewhirstichabod
 
Case number #10 OVERVIEWAbstract In this case, a local chapt.docx
Case number #10 OVERVIEWAbstract In this case, a local chapt.docxCase number #10 OVERVIEWAbstract In this case, a local chapt.docx
Case number #10 OVERVIEWAbstract In this case, a local chapt.docx
dewhirstichabod
 
Case GE’s Two-Decade Transformation Jack Welch’s Leadership.docx
Case GE’s Two-Decade Transformation Jack Welch’s Leadership.docxCase GE’s Two-Decade Transformation Jack Welch’s Leadership.docx
Case GE’s Two-Decade Transformation Jack Welch’s Leadership.docx
dewhirstichabod
 
CASE BRIEF 7.2 Tiffany and Company v. Andrew 2012 W.docx
CASE BRIEF 7.2  Tiffany and Company v. Andrew 2012 W.docxCASE BRIEF 7.2  Tiffany and Company v. Andrew 2012 W.docx
CASE BRIEF 7.2 Tiffany and Company v. Andrew 2012 W.docx
dewhirstichabod
 
CASE 5Business Performance Evaluation Approaches for Thoughtf.docx
CASE 5Business Performance Evaluation Approaches for Thoughtf.docxCASE 5Business Performance Evaluation Approaches for Thoughtf.docx
CASE 5Business Performance Evaluation Approaches for Thoughtf.docx
dewhirstichabod
 

More from dewhirstichabod (20)

CASE STUDY 2.1 W. L. Gore and AssociatesHe was ready for anythi.docx
CASE STUDY 2.1 W. L. Gore and AssociatesHe was ready for anythi.docxCASE STUDY 2.1 W. L. Gore and AssociatesHe was ready for anythi.docx
CASE STUDY 2.1 W. L. Gore and AssociatesHe was ready for anythi.docx
 
Case Study 1Case Study 1Ms. A. is an apparently heal.docx
Case Study 1Case Study 1Ms. A. is an apparently heal.docxCase Study 1Case Study 1Ms. A. is an apparently heal.docx
Case Study 1Case Study 1Ms. A. is an apparently heal.docx
 
Case study 1Client ProfileMrs. Harriet is a 68-year-old .docx
Case study 1Client ProfileMrs. Harriet is a 68-year-old .docxCase study 1Client ProfileMrs. Harriet is a 68-year-old .docx
Case study 1Client ProfileMrs. Harriet is a 68-year-old .docx
 
Case Study 11.1 Why the Circus No Longer Comes to TownFor 146 y.docx
Case Study 11.1 Why the Circus No Longer Comes to TownFor 146 y.docxCase Study 11.1 Why the Circus No Longer Comes to TownFor 146 y.docx
Case Study 11.1 Why the Circus No Longer Comes to TownFor 146 y.docx
 
Case Study 10.3 Regulating Love at the OfficeThe office has bec.docx
Case Study 10.3 Regulating Love at the OfficeThe office has bec.docxCase Study 10.3 Regulating Love at the OfficeThe office has bec.docx
Case Study 10.3 Regulating Love at the OfficeThe office has bec.docx
 
Case Study 1 Is Business Ready for Wearable ComputersWearable .docx
Case Study 1 Is Business Ready for Wearable ComputersWearable .docxCase Study 1 Is Business Ready for Wearable ComputersWearable .docx
Case Study 1 Is Business Ready for Wearable ComputersWearable .docx
 
Case Study 1 Headaches Neurological system and continue practicing .docx
Case Study 1 Headaches Neurological system and continue practicing .docxCase Study 1 Headaches Neurological system and continue practicing .docx
Case Study 1 Headaches Neurological system and continue practicing .docx
 
CASE STUDY 1 HeadachesA 20-year-old male complains of exper.docx
CASE STUDY 1 HeadachesA 20-year-old male complains of exper.docxCASE STUDY 1 HeadachesA 20-year-old male complains of exper.docx
CASE STUDY 1 HeadachesA 20-year-old male complains of exper.docx
 
Case Study - Stambovsky v. Ackley and Ellis Realty Supreme C.docx
Case Study - Stambovsky v. Ackley and Ellis Realty Supreme C.docxCase Study - Stambovsky v. Ackley and Ellis Realty Supreme C.docx
Case Study - Stambovsky v. Ackley and Ellis Realty Supreme C.docx
 
CASE STUDY - THE SOCIAL NETWORKThe growing use of social network.docx
CASE STUDY - THE SOCIAL NETWORKThe growing use of social network.docxCASE STUDY - THE SOCIAL NETWORKThe growing use of social network.docx
CASE STUDY - THE SOCIAL NETWORKThe growing use of social network.docx
 
Case Study #1 Probation or PrisonWrite a 12 to one page (.docx
Case Study #1 Probation or PrisonWrite a 12 to one page (.docxCase Study #1 Probation or PrisonWrite a 12 to one page (.docx
Case Study #1 Probation or PrisonWrite a 12 to one page (.docx
 
Case Studies of Data Warehousing FailuresFour studies of data .docx
Case Studies of Data Warehousing FailuresFour studies of data .docxCase Studies of Data Warehousing FailuresFour studies of data .docx
Case Studies of Data Warehousing FailuresFour studies of data .docx
 
Case Studies GuidelinesWhat is a Case StudyCase studies.docx
Case Studies GuidelinesWhat is a Case StudyCase studies.docxCase Studies GuidelinesWhat is a Case StudyCase studies.docx
Case Studies GuidelinesWhat is a Case StudyCase studies.docx
 
Case Studies Focusing on Fluency StrategiesCase Scenario .docx
Case Studies Focusing on Fluency StrategiesCase Scenario .docxCase Studies Focusing on Fluency StrategiesCase Scenario .docx
Case Studies Focusing on Fluency StrategiesCase Scenario .docx
 
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docxCase Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
 
Case Number 7Student’s NameInstitution Affiliation.docx
Case Number 7Student’s NameInstitution Affiliation.docxCase Number 7Student’s NameInstitution Affiliation.docx
Case Number 7Student’s NameInstitution Affiliation.docx
 
Case number #10 OVERVIEWAbstract In this case, a local chapt.docx
Case number #10 OVERVIEWAbstract In this case, a local chapt.docxCase number #10 OVERVIEWAbstract In this case, a local chapt.docx
Case number #10 OVERVIEWAbstract In this case, a local chapt.docx
 
Case GE’s Two-Decade Transformation Jack Welch’s Leadership.docx
Case GE’s Two-Decade Transformation Jack Welch’s Leadership.docxCase GE’s Two-Decade Transformation Jack Welch’s Leadership.docx
Case GE’s Two-Decade Transformation Jack Welch’s Leadership.docx
 
CASE BRIEF 7.2 Tiffany and Company v. Andrew 2012 W.docx
CASE BRIEF 7.2  Tiffany and Company v. Andrew 2012 W.docxCASE BRIEF 7.2  Tiffany and Company v. Andrew 2012 W.docx
CASE BRIEF 7.2 Tiffany and Company v. Andrew 2012 W.docx
 
CASE 5Business Performance Evaluation Approaches for Thoughtf.docx
CASE 5Business Performance Evaluation Approaches for Thoughtf.docxCASE 5Business Performance Evaluation Approaches for Thoughtf.docx
CASE 5Business Performance Evaluation Approaches for Thoughtf.docx
 

Recently uploaded

writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 

Recently uploaded (20)

writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 

BYOD, Portable, and Mobile Devices organizational security policies..docx

  • 1. BYOD, Portable, and Mobile Devices organizational security policies. The contemporary organizations have allowed their employees to carry and use their devices to work. This use of devices has had a negative and positive impact on the organizations concerned. Security issues are one of the demerits that come as a result of using these devices. Therefore, security polices are required to give direction on the use of the devices. The employee devices need strong policies that govern their use to ensure that they do not lead to any security issues. Thus, some consideration needs to be made. First, the organization needs to consider the security and privacy issues that might come with the use of the devices and plan on how they will ensure that they will not lead to privacy issues (Fennelly, 2012). Second, the organization should put in place policies regarding the management standard to monitor how each device is used within the premises. Third, there should be working policies regarding the safety of data on those devices. The fourth and last consideration is communication policies
  • 2. regarding their use. The policy development might an easy task but the enforce might face some challenges which can render them ineffective. Workforce policy rejection is one of the issues that might affect the implementation of the policies. Secondly, the organization might lack the necessary resources and expertise to implement the policies. The third challenge is the communication issues that the concerned individual in the organization with the implementation of the policies might face due to changing requirements of the policies (Fennelly, 2012). The last challenges involve management and access of the information privileged to every device; their use might be a target to the criminals to access the organization data.