SlideShare a Scribd company logo
1 of 20
Bringing-Your-Own-Device
usage Policy for ABC
University Collage Employees.
Content
 What is the Bringing-Your-Own-Device(BYOD)…??
 Usage of Bring your own device Policy.
 Advantages in BYOD usage policy.
 Disadvantages in BYOD usage policy.
 Ethical Dimensions.
 Legal Dimensions.
 Professional Dimensions.
 Socio-Technical Dimensions.
 Recommendations.
 Investigation Plan.
 Summary
 References
What is the Bringing-Your-Own-
Device(BYOD)…??
 A BYOD policy can take many different forms. Some
organizations cut back on corporate-issued PCs and
laptops, instead giving employees a stipend to purchase
and maintain technology equipment of their choosing.
 More commonly, however, organizations will agree to
support personal mobile devices at least to some degree
in addition to corporate-issued equipment.
 The rules in a BYOD policy often vary depending on a
user’s role in the organization, his or her specific
device, application requirements and other factors.
Usage of Bring your own device Policy.
Advantages in BYOD usage policy.
 Student participation increases.
 Learning becomes student-driven.
 Student collaboration and communication Increases.
 Cost saving.
 Personalized instruction.
 A new way of Learning.
 Better Organization.
Disadvantages in BYOD usage policy.
 Overload Wireless Network.
 Possibly opens up the opportunity for cheating.
 May become a status symbol for students.
 Students may not be able to afford these devices.
 May increase the possibility of theft.
Ethical Dimensions
 When staff members and students not aware of what apps and software
are not permitted on their devices and also using other peoples devices
without their permission.
Ethical principle: Do not access files without the permission of the owner.
Article 03: Everyone has the right to life, liberty and security of person.
 Ensure staff and students maintain best practice security standards,
including strong password protection and multifactor authentication.
Ethical Principle: Users are responsible for safeguarding their User Id and
Passwords. They should not write them on paper or anywhere else for
remembrance.
Cont.
 Not using Internet ethically.
Ethical Principle: Complain about illegal communication and activities, if
found, to Internet service Providers and local law enforcement authorities.
 Be rude or using bad language while using e-Mail, chatting, blogging
and social networking.
Ethical Principle: respect others views and should not criticize anyone on
the internet and the same should be taught to children.
Cont.
 Using an Acceptable User Policy inside of the collage.
1. Not attempting to break the security of any computer network or
user.
2. Not posting commercial messages to school groups without prior
per- mission.
3. Not attempting to send junk e-mail or spam to anyone who
doesn't want to receive it.
Article 27(2): Everyone has the right to the protection of the moral
and material interests resulting from any scientific , literary or artistic
production of which he is the author.
Legal Dimensions
 Avoiding access to the confidential information of the company by third parties
or employees for non – company purposes
Intellectual property claim:
- All devices that access company network should be registered
with the company
- All devices that access company network are required to
contain specified software
- Downloading or uploading any confidential document to a personal
device is prohibited
- Using public networks or hotspots is prohibited
Cont.
 Limitations for using of BYOD devices.
1. - Using the company network or internet connection to download or
view videos and music or to access social media is prohibited.
2. - Using personal devices for playing games and entertainment
purposes within working hours is prohibited.
3. - Using the devices while driving is prohibited.
 The employer can be held liable for neglectful employee actions while
using personal devices under BYOD policy.
Cont.
 Labor and Employment laws
Fair Labor Standards Act (FLSA) Compliance
- When an hourly employee continues work after his working
hours, he is allowed to pay for overtime.
 Insurances
- Whether the company is responsible for lost or stolen devices?
 Telecommunications Act (Interception and Access)
- Employers must ensure that any ability to record
communications from a device under BYOD concept, should be
clearly revealed to employees.
Professional dimensions in Cyber
security.
 Threat to integrity, confidentiality and availability
 Security breaches
 Insider trading
 Crimes hidden
Socio – Technical Dimensions
 Employees are working with their own familiar devices, therefore less
training is required.
 Increasing productivity.
 Happy customers.
 Employee – satisfaction goes high.
 Innovation and better workplace collaboration.
 Employees using social media for harass or bully others will damage the
company.
Recommendations
 Utilize device encryption and enable remote wiping or disabling.
 Perform periodic audits to identify any security issues.
 Set access controls.
 Train employees on cyber-security best practices .
 Update security software on BYOD devices.
Investigation Plan
Task Time
Period
Starting
date
Ending date
collecting details according to the
Presentation topic.
02 days 27/05/2018 28/05/2018
structure designing 01 days 29/05/2018 30/05/2018
Starting the research and the making of
presentation
•Collecting information including images
•Reading articles and web documents
•Making the presentation
02 days 31/05/2018 01/06/2018
presenting the presentation 01 day 02/06/2018 02/06/2018
References
 Parr Brown Gee & Loveless. (2018). The Legal Side of Bring Your Own
Device (BYOD) - Parr Brown Gee & Loveless. [online] Available at:
http://parrbrown.com/the-legal-side-of-bring-your-own-device-byod/
[Accessed 1 Jun. 2018].
 ToughNickel. (2018). 5 Legal Issues Your Company’s BYOD Policy
Must Address. [online] Available at: https://toughnickel.com/business/5-
Legal-Issues-Your-Companys-BYOD-Policy-Must-Address [Accessed
1 Jun. 2018].
 León Cosgrove. (2018). Bring Your Own Device to Work: Balancing
Data Protection, Employee Privacy, and Litigation Risks - León
Cosgrove. [online] Available at: http://www.leoncosgrove.com/labor-
employment/bring-your-own-device-to-work/ [Accessed 1 Jun. 2018].
 SearchMobileComputing. (2018). Potential BYOD legal issues you may
not have thought of. [online] Available at:
https://searchmobilecomputing.techtarget.com/tip/Potential-BYOD-
legal-issues-you-may-not-have-thought-of [Accessed 1 Jun. 2018].
Cont.
 Commission, A. H. (2017, 01 27). What is the Universal Declaration
of Human Rights? Retrieved from humanrights.gov.au`:
 https://www.humanrights.gov.au/publications/what-universal-
declaration-human-rights
 https://www.humanrights.gov.au/publications/what-universal-
declaration-human-rights
 Waterfield, B. (2007, 02 13). the telegraph. Retrieved from Google to
pay £2.4m over 'copyright breach':
 http://www.telegraph.co.uk/news/worldnews/1542549/Google-to-pay-
2.4m-over-copyright-breach.html
 upurro.de. 2002. ETHICAL ISSUES OF ONLINE
COMMUNICATION RESEARCH . [ONLINE] Available at:
http://www.capurro.de/onres.htm.
 http://www.academia.edu/22784580/Legal_Ethical_and_Professional_
Issues_in_Information_Security
Any Questions?
THANK YOU!

More Related Content

What's hot

Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsDyuti Islam
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issuesMaher Al Beshlawy
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations121487
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance InformationTũi Wichets
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 

What's hot (20)

Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issues
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance Information
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ethic02
Ethic02Ethic02
Ethic02
 

Similar to Bringing your-own-device usage policy for abc university collage employees

PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_finalnykobap01
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Vijay Dalmia
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxhealdkathaleen
 
University Personal Devices (BYOD) Policy
University Personal Devices (BYOD) PolicyUniversity Personal Devices (BYOD) Policy
University Personal Devices (BYOD) Policykeyashaj
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesChantial
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology Kathirvel Ayyaswamy
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidanceGary Chambers
 

Similar to Bringing your-own-device usage policy for abc university collage employees (20)

PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
IT Policy
IT PolicyIT Policy
IT Policy
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Ethical privacy and security issues
Ethical privacy and security issuesEthical privacy and security issues
Ethical privacy and security issues
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
University Personal Devices (BYOD) Policy
University Personal Devices (BYOD) PolicyUniversity Personal Devices (BYOD) Policy
University Personal Devices (BYOD) Policy
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 
Hiring and firing in the digital age
Hiring and firing in the digital ageHiring and firing in the digital age
Hiring and firing in the digital age
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidance
 

Recently uploaded

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Bringing your-own-device usage policy for abc university collage employees

  • 1. Bringing-Your-Own-Device usage Policy for ABC University Collage Employees.
  • 2. Content  What is the Bringing-Your-Own-Device(BYOD)…??  Usage of Bring your own device Policy.  Advantages in BYOD usage policy.  Disadvantages in BYOD usage policy.  Ethical Dimensions.  Legal Dimensions.  Professional Dimensions.  Socio-Technical Dimensions.  Recommendations.  Investigation Plan.  Summary  References
  • 3. What is the Bringing-Your-Own- Device(BYOD)…??  A BYOD policy can take many different forms. Some organizations cut back on corporate-issued PCs and laptops, instead giving employees a stipend to purchase and maintain technology equipment of their choosing.  More commonly, however, organizations will agree to support personal mobile devices at least to some degree in addition to corporate-issued equipment.  The rules in a BYOD policy often vary depending on a user’s role in the organization, his or her specific device, application requirements and other factors.
  • 4. Usage of Bring your own device Policy.
  • 5. Advantages in BYOD usage policy.  Student participation increases.  Learning becomes student-driven.  Student collaboration and communication Increases.  Cost saving.  Personalized instruction.  A new way of Learning.  Better Organization.
  • 6. Disadvantages in BYOD usage policy.  Overload Wireless Network.  Possibly opens up the opportunity for cheating.  May become a status symbol for students.  Students may not be able to afford these devices.  May increase the possibility of theft.
  • 7. Ethical Dimensions  When staff members and students not aware of what apps and software are not permitted on their devices and also using other peoples devices without their permission. Ethical principle: Do not access files without the permission of the owner. Article 03: Everyone has the right to life, liberty and security of person.  Ensure staff and students maintain best practice security standards, including strong password protection and multifactor authentication. Ethical Principle: Users are responsible for safeguarding their User Id and Passwords. They should not write them on paper or anywhere else for remembrance.
  • 8. Cont.  Not using Internet ethically. Ethical Principle: Complain about illegal communication and activities, if found, to Internet service Providers and local law enforcement authorities.  Be rude or using bad language while using e-Mail, chatting, blogging and social networking. Ethical Principle: respect others views and should not criticize anyone on the internet and the same should be taught to children.
  • 9. Cont.  Using an Acceptable User Policy inside of the collage. 1. Not attempting to break the security of any computer network or user. 2. Not posting commercial messages to school groups without prior per- mission. 3. Not attempting to send junk e-mail or spam to anyone who doesn't want to receive it. Article 27(2): Everyone has the right to the protection of the moral and material interests resulting from any scientific , literary or artistic production of which he is the author.
  • 10. Legal Dimensions  Avoiding access to the confidential information of the company by third parties or employees for non – company purposes Intellectual property claim: - All devices that access company network should be registered with the company - All devices that access company network are required to contain specified software - Downloading or uploading any confidential document to a personal device is prohibited - Using public networks or hotspots is prohibited
  • 11. Cont.  Limitations for using of BYOD devices. 1. - Using the company network or internet connection to download or view videos and music or to access social media is prohibited. 2. - Using personal devices for playing games and entertainment purposes within working hours is prohibited. 3. - Using the devices while driving is prohibited.  The employer can be held liable for neglectful employee actions while using personal devices under BYOD policy.
  • 12. Cont.  Labor and Employment laws Fair Labor Standards Act (FLSA) Compliance - When an hourly employee continues work after his working hours, he is allowed to pay for overtime.  Insurances - Whether the company is responsible for lost or stolen devices?  Telecommunications Act (Interception and Access) - Employers must ensure that any ability to record communications from a device under BYOD concept, should be clearly revealed to employees.
  • 13. Professional dimensions in Cyber security.  Threat to integrity, confidentiality and availability  Security breaches  Insider trading  Crimes hidden
  • 14. Socio – Technical Dimensions  Employees are working with their own familiar devices, therefore less training is required.  Increasing productivity.  Happy customers.  Employee – satisfaction goes high.  Innovation and better workplace collaboration.  Employees using social media for harass or bully others will damage the company.
  • 15. Recommendations  Utilize device encryption and enable remote wiping or disabling.  Perform periodic audits to identify any security issues.  Set access controls.  Train employees on cyber-security best practices .  Update security software on BYOD devices.
  • 16. Investigation Plan Task Time Period Starting date Ending date collecting details according to the Presentation topic. 02 days 27/05/2018 28/05/2018 structure designing 01 days 29/05/2018 30/05/2018 Starting the research and the making of presentation •Collecting information including images •Reading articles and web documents •Making the presentation 02 days 31/05/2018 01/06/2018 presenting the presentation 01 day 02/06/2018 02/06/2018
  • 17. References  Parr Brown Gee & Loveless. (2018). The Legal Side of Bring Your Own Device (BYOD) - Parr Brown Gee & Loveless. [online] Available at: http://parrbrown.com/the-legal-side-of-bring-your-own-device-byod/ [Accessed 1 Jun. 2018].  ToughNickel. (2018). 5 Legal Issues Your Company’s BYOD Policy Must Address. [online] Available at: https://toughnickel.com/business/5- Legal-Issues-Your-Companys-BYOD-Policy-Must-Address [Accessed 1 Jun. 2018].  León Cosgrove. (2018). Bring Your Own Device to Work: Balancing Data Protection, Employee Privacy, and Litigation Risks - León Cosgrove. [online] Available at: http://www.leoncosgrove.com/labor- employment/bring-your-own-device-to-work/ [Accessed 1 Jun. 2018].  SearchMobileComputing. (2018). Potential BYOD legal issues you may not have thought of. [online] Available at: https://searchmobilecomputing.techtarget.com/tip/Potential-BYOD- legal-issues-you-may-not-have-thought-of [Accessed 1 Jun. 2018].
  • 18. Cont.  Commission, A. H. (2017, 01 27). What is the Universal Declaration of Human Rights? Retrieved from humanrights.gov.au`:  https://www.humanrights.gov.au/publications/what-universal- declaration-human-rights  https://www.humanrights.gov.au/publications/what-universal- declaration-human-rights  Waterfield, B. (2007, 02 13). the telegraph. Retrieved from Google to pay £2.4m over 'copyright breach':  http://www.telegraph.co.uk/news/worldnews/1542549/Google-to-pay- 2.4m-over-copyright-breach.html  upurro.de. 2002. ETHICAL ISSUES OF ONLINE COMMUNICATION RESEARCH . [ONLINE] Available at: http://www.capurro.de/onres.htm.  http://www.academia.edu/22784580/Legal_Ethical_and_Professional_ Issues_in_Information_Security