This document outlines a Bring Your Own Device (BYOD) usage policy for ABC University College employees. It discusses what BYOD is, advantages like cost savings and personalized learning, and disadvantages like increased risk of theft. It examines ethical, legal, and professional dimensions around topics like privacy, acceptable use, and liability. The document proposes an investigation plan and provides recommendations around device encryption, access controls, and security training. It concludes by listing references used to research the topic.
2. Content
What is the Bringing-Your-Own-Device(BYOD)…??
Usage of Bring your own device Policy.
Advantages in BYOD usage policy.
Disadvantages in BYOD usage policy.
Ethical Dimensions.
Legal Dimensions.
Professional Dimensions.
Socio-Technical Dimensions.
Recommendations.
Investigation Plan.
Summary
References
3. What is the Bringing-Your-Own-
Device(BYOD)…??
A BYOD policy can take many different forms. Some
organizations cut back on corporate-issued PCs and
laptops, instead giving employees a stipend to purchase
and maintain technology equipment of their choosing.
More commonly, however, organizations will agree to
support personal mobile devices at least to some degree
in addition to corporate-issued equipment.
The rules in a BYOD policy often vary depending on a
user’s role in the organization, his or her specific
device, application requirements and other factors.
5. Advantages in BYOD usage policy.
Student participation increases.
Learning becomes student-driven.
Student collaboration and communication Increases.
Cost saving.
Personalized instruction.
A new way of Learning.
Better Organization.
6. Disadvantages in BYOD usage policy.
Overload Wireless Network.
Possibly opens up the opportunity for cheating.
May become a status symbol for students.
Students may not be able to afford these devices.
May increase the possibility of theft.
7. Ethical Dimensions
When staff members and students not aware of what apps and software
are not permitted on their devices and also using other peoples devices
without their permission.
Ethical principle: Do not access files without the permission of the owner.
Article 03: Everyone has the right to life, liberty and security of person.
Ensure staff and students maintain best practice security standards,
including strong password protection and multifactor authentication.
Ethical Principle: Users are responsible for safeguarding their User Id and
Passwords. They should not write them on paper or anywhere else for
remembrance.
8. Cont.
Not using Internet ethically.
Ethical Principle: Complain about illegal communication and activities, if
found, to Internet service Providers and local law enforcement authorities.
Be rude or using bad language while using e-Mail, chatting, blogging
and social networking.
Ethical Principle: respect others views and should not criticize anyone on
the internet and the same should be taught to children.
9. Cont.
Using an Acceptable User Policy inside of the collage.
1. Not attempting to break the security of any computer network or
user.
2. Not posting commercial messages to school groups without prior
per- mission.
3. Not attempting to send junk e-mail or spam to anyone who
doesn't want to receive it.
Article 27(2): Everyone has the right to the protection of the moral
and material interests resulting from any scientific , literary or artistic
production of which he is the author.
10. Legal Dimensions
Avoiding access to the confidential information of the company by third parties
or employees for non – company purposes
Intellectual property claim:
- All devices that access company network should be registered
with the company
- All devices that access company network are required to
contain specified software
- Downloading or uploading any confidential document to a personal
device is prohibited
- Using public networks or hotspots is prohibited
11. Cont.
Limitations for using of BYOD devices.
1. - Using the company network or internet connection to download or
view videos and music or to access social media is prohibited.
2. - Using personal devices for playing games and entertainment
purposes within working hours is prohibited.
3. - Using the devices while driving is prohibited.
The employer can be held liable for neglectful employee actions while
using personal devices under BYOD policy.
12. Cont.
Labor and Employment laws
Fair Labor Standards Act (FLSA) Compliance
- When an hourly employee continues work after his working
hours, he is allowed to pay for overtime.
Insurances
- Whether the company is responsible for lost or stolen devices?
Telecommunications Act (Interception and Access)
- Employers must ensure that any ability to record
communications from a device under BYOD concept, should be
clearly revealed to employees.
13. Professional dimensions in Cyber
security.
Threat to integrity, confidentiality and availability
Security breaches
Insider trading
Crimes hidden
14. Socio – Technical Dimensions
Employees are working with their own familiar devices, therefore less
training is required.
Increasing productivity.
Happy customers.
Employee – satisfaction goes high.
Innovation and better workplace collaboration.
Employees using social media for harass or bully others will damage the
company.
15. Recommendations
Utilize device encryption and enable remote wiping or disabling.
Perform periodic audits to identify any security issues.
Set access controls.
Train employees on cyber-security best practices .
Update security software on BYOD devices.
16. Investigation Plan
Task Time
Period
Starting
date
Ending date
collecting details according to the
Presentation topic.
02 days 27/05/2018 28/05/2018
structure designing 01 days 29/05/2018 30/05/2018
Starting the research and the making of
presentation
•Collecting information including images
•Reading articles and web documents
•Making the presentation
02 days 31/05/2018 01/06/2018
presenting the presentation 01 day 02/06/2018 02/06/2018
17. References
Parr Brown Gee & Loveless. (2018). The Legal Side of Bring Your Own
Device (BYOD) - Parr Brown Gee & Loveless. [online] Available at:
http://parrbrown.com/the-legal-side-of-bring-your-own-device-byod/
[Accessed 1 Jun. 2018].
ToughNickel. (2018). 5 Legal Issues Your Company’s BYOD Policy
Must Address. [online] Available at: https://toughnickel.com/business/5-
Legal-Issues-Your-Companys-BYOD-Policy-Must-Address [Accessed
1 Jun. 2018].
León Cosgrove. (2018). Bring Your Own Device to Work: Balancing
Data Protection, Employee Privacy, and Litigation Risks - León
Cosgrove. [online] Available at: http://www.leoncosgrove.com/labor-
employment/bring-your-own-device-to-work/ [Accessed 1 Jun. 2018].
SearchMobileComputing. (2018). Potential BYOD legal issues you may
not have thought of. [online] Available at:
https://searchmobilecomputing.techtarget.com/tip/Potential-BYOD-
legal-issues-you-may-not-have-thought-of [Accessed 1 Jun. 2018].
18. Cont.
Commission, A. H. (2017, 01 27). What is the Universal Declaration
of Human Rights? Retrieved from humanrights.gov.au`:
https://www.humanrights.gov.au/publications/what-universal-
declaration-human-rights
https://www.humanrights.gov.au/publications/what-universal-
declaration-human-rights
Waterfield, B. (2007, 02 13). the telegraph. Retrieved from Google to
pay £2.4m over 'copyright breach':
http://www.telegraph.co.uk/news/worldnews/1542549/Google-to-pay-
2.4m-over-copyright-breach.html
upurro.de. 2002. ETHICAL ISSUES OF ONLINE
COMMUNICATION RESEARCH . [ONLINE] Available at:
http://www.capurro.de/onres.htm.
http://www.academia.edu/22784580/Legal_Ethical_and_Professional_
Issues_in_Information_Security