SlideShare a Scribd company logo
Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace 
Dylan W. Wiseman 
Littler Mendelson, P.C. 
dwiseman@littler.com
Lingo: Dual Use Mobile Devices and BYOD 
•BYOD = Bring Your Own Device 
•Dual Use Mobile Device: Mobile device used to create, store and transmit both personal and work-related data 
•Some Other Terms: 
–BYOC: Bring Your Own Computer. Programs that add laptops to the covered devices 
–BYOA: Bring Your Own App. Per Gartner Group, 145 new mobile apps were downloaded per second in Q4 2012 
2
What Are Employees Doing? 
Consumerization of IT 
•62% of full-time workers own smartphone 
•33% of full-time workers own tablet 
•Time spent on a mobile device each day by U.S. adult has quadrupled from 2009 (22 minutes) to 2012 (88 minutes) 
(USA Today 3/7/13) 
3
What Are Employers Doing? 
•55% of IT managers have made exceptions for “specialized members,” i.e., top executives to use their choice of devices and software (2013 iPass MobileIron study) 
•55% of IT directors will actively accommodate and encourage the use of personal devices (Citrix Study 2012) 
•81% of respondents accommodate personal devices in the workplace (2013 iPass MobileIron study) 
•54% of respondents had a formalized BYOD policy (2013 iPass MobileIron study) 
4
•IBM 
–80,000 employees 
–IBM CIO: “If we didn’t support them, we figured [employees] would figure out how to support [the devices] themselves. 
•Intel 
–Started program in 2008 
–Now encompasses 24,000 devices, about 90% of these are smartphones 
–Uses multiple security levels for access to different categories of documents 
•Sybase 
–20 different phone options 
–Employees buy and own the phones, but Sybase pays for the monthly service contract 
•Citrix 
–$2,100 stipend to purchase a laptop of their choice and a 3-year warranty. 
–Company owned cost was $2,600. 
–Adoption rate of about 20%. 
Tech Companies Taking The Lead 
5
What Are Employees Doing? 
How do you use your smartphone? 
Source: The iPass Global Mobile Workforce Report, http://mobile-workforce-project.ipass.com/cpwp/wp- content/files_mf/ipass_mobileworkforcereport_q3_2011.pdf 
6
What Are Employees Doing? 
Do you use your tablet primarily as a personal or work device? 
7
Corporate Rationales 
•Reducing expenses for employers 
•Improving employee productivity 
–Intel estimates that its BYOD employees save an average of 57 minutes per day by being able to access work materials from personal devices based on three years of employee estimates 
•Improving employee engagement 
•Aiding in the recruitment of new employees 
•Solving the “two pocket problem” 
8
•All tallied, BYOD doesn’t look pretty from a cost perspective. A typical mobile BYOD environment costs 33 percent more than a well-managed wireless deployment where the company owns the devices ***.” 
–Loss of bulk purchasing power 
–Higher help desk/support costs 
–Security issues 
•The trend toward employee-owned devices isn’t saving IBM any money. (MIT Technology Review, Monday, May 21, 2012) 
Does It Really Reduce Costs? 
9
Creates Significant Risks Most Companies Are Ignoring 
•Data-Related Risks 
–Security of company data 
–Privacy of employee data 
–Records management 
–Contractual obligations 
–eDiscovery 
–Trade Secret Protection 
–Contingent Workers 
•HR-Related Risks 
–Performance management 
–Tax 
–EEO 
–Wage & Hour 
–Workplace Safety 
–Labor 
–International
•COPE 
–Corporate 
–Owned 
–Personally 
–Enabled 
There is an alternative
HR and Employment Law Issues
HR and Employment Law Issues 
•Performance management 
•Discrimination, hostile work environment, accommodation issues 
•Workplace Safety 
•Wage & Hour 
•Expense Reimbursement 
•Labor 
•International
Data Security & Privacy Issues
•Access to private information 
–Computer forensics 
–eDiscovery collection during litigation 
•Issuing a remote wipe command 
–Employees have a reasonable expectation of privacy in their personal device 
–All 50 states have computer trespass laws 
–Computer Fraud & Abuse Act 
Employee Privacy Rights
•Employee ownership of the account with the service provider will limit company access to its data 
•No contract with company 
•Obligation to “vet” security controls of vendors 
•Data may be more available to law enforcement or others 
Gateway to the cloud
•Stored Communications Act 
•Computer Trespass Laws 
•Password Protection Laws 
Accessing Employee’s Data
•“60 percent of American workers who left their employers [in 2008] took some data with them.” (Economist) 
•Misappropriation may be harder to prove 
•Use or disclosure will be the focus 
•Access to the devices will be a challenge 
Trade Secret Protection
•Locating the data 
•Access to the device 
•Collection challenges 
eDiscovery Challenges
Recommendations
•Careful Planning 
•Policies 
•Technical controls 
•Operating procedures and capabilities 
•Educate and train 
Coordinated Approach
Decide whether all employees should be permitted to participate in a BYOD program or whether certain groups should be excluded 
Recommendation
Require employees to consent to all company activities involving the personal device 
Recommendation
Modify or create Employee Agreements 
Recommendation
Restrict employees from using cloud-based apps, cloud-based backup, or synchronizing work-related data 
Recommendation
Ensure that use complies with Wage and Hour obligations by prohibiting off-the-clock work and ensuring pay for all hours worked 
Recommendation
Training 
Recommendation
Revise exit interview processes 
Recommendation
Bottom Line: BYOD creates risks and challenges for employers 
•Data-Related Risks 
–Security of company data 
–Privacy of employee data 
–Records management 
–Contractual obligations 
–eDiscovery 
–Trade Secret Protection 
–Contingent Workers 
•HR-Related Risks 
–Performance management 
–EEO 
–Wage & Hour 
–Workplace Safety 
–Labor 
–International
Questions
Go to: 
www.workplaceprivacycounsel.com 
Search: “BYOD” 
Littler BYOD White Paper
Thank You

More Related Content

What's hot

BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
Marketing Team
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Murray Security Services
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
Kaseya
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
Logicalis Australia
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
Kaseya
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
Harsh Kishore Mishra
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
CooperTechnologiesInc
 
Panel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherPanel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better Together
Ivanti
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
woodsy01
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Information Security Awareness Group
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board Members
Bill Clark
 
Sec4
Sec4Sec4
)k
)k)k
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
Troy C. Fulton
 
Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspaces
Dell World
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
mkeane
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
IJMIT JOURNAL
 

What's hot (20)

BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
Panel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherPanel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better Together
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board Members
 
Sec4
Sec4Sec4
Sec4
 
)k
)k)k
)k
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspaces
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
 

Similar to ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policies in the Workplace

PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
BrendaGraycon
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
Steve Markey
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Martin Perry
 
BYOD
BYODBYOD
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
J M
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Clever Consulting
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Barry Caplin
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
Chris Pepin
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
K Singh
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
Транслируем.бел
 
GadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentationGadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentation
Economic Alliance of Kankakee County
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
CloudUniversity
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
OracleIDM
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
John Palfreyman
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
Iron Mountain
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 

Similar to ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policies in the Workplace (20)

PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
BYOD
BYODBYOD
BYOD
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
GadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentationGadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentation
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 

More from Association for Commuter Transportation (ACT)

ACT 2014 21st Century Workplace
ACT 2014 21st Century WorkplaceACT 2014 21st Century Workplace
ACT 2014 21st Century Workplace
Association for Commuter Transportation (ACT)
 
ACT 2014 Case Studies Telework So Cal Program MSRC
ACT 2014 Case Studies Telework So Cal Program MSRCACT 2014 Case Studies Telework So Cal Program MSRC
ACT 2014 Case Studies Telework So Cal Program MSRC
Association for Commuter Transportation (ACT)
 
ACT 2014 Standing in the Intersection of the Ridematching Experience
ACT 2014 Standing in the Intersection of the Ridematching ExperienceACT 2014 Standing in the Intersection of the Ridematching Experience
ACT 2014 Standing in the Intersection of the Ridematching Experience
Association for Commuter Transportation (ACT)
 
Act 2014 Low Income Fare Program
Act 2014 Low Income Fare ProgramAct 2014 Low Income Fare Program
Act 2014 Low Income Fare Program
Association for Commuter Transportation (ACT)
 
ACT 2014 UCLA Bike Program
ACT 2014 UCLA Bike ProgramACT 2014 UCLA Bike Program
ACT 2014 Travel Options for Rural Higher Education
ACT 2014 Travel Options for Rural Higher EducationACT 2014 Travel Options for Rural Higher Education
ACT 2014 Travel Options for Rural Higher Education
Association for Commuter Transportation (ACT)
 
ACT 2014 TMA Survey
ACT 2014 TMA SurveyACT 2014 TMA Survey
ACT 2014 The Power of Lighting Clean Transportation Policy and Programs
ACT 2014 The Power of Lighting Clean Transportation Policy and ProgramsACT 2014 The Power of Lighting Clean Transportation Policy and Programs
ACT 2014 The Power of Lighting Clean Transportation Policy and Programs
Association for Commuter Transportation (ACT)
 
ACT 2014 TDM International Update from the UK
ACT 2014 TDM International Update from the UKACT 2014 TDM International Update from the UK
ACT 2014 TDM International Update from the UK
Association for Commuter Transportation (ACT)
 
ACT 2014 San Francisco Safe Routes to School Program
ACT 2014 San Francisco Safe Routes to School ProgramACT 2014 San Francisco Safe Routes to School Program
ACT 2014 San Francisco Safe Routes to School Program
Association for Commuter Transportation (ACT)
 
ACT 2014 Resources for Every TDM Professional
ACT 2014 Resources for Every TDM ProfessionalACT 2014 Resources for Every TDM Professional
ACT 2014 Resources for Every TDM Professional
Association for Commuter Transportation (ACT)
 
ACT 2014 Portland Oregon Outreach
ACT 2014 Portland Oregon OutreachACT 2014 Portland Oregon Outreach
ACT 2014 Portland Oregon Outreach
Association for Commuter Transportation (ACT)
 
ACT 2014 Policies and Program Incentives That Work or New Paradigms in Parkin...
ACT 2014 Policies and Program Incentives That Work or New Paradigms in Parkin...ACT 2014 Policies and Program Incentives That Work or New Paradigms in Parkin...
ACT 2014 Policies and Program Incentives That Work or New Paradigms in Parkin...
Association for Commuter Transportation (ACT)
 
ACT 2014 Managing Outreach and Communication for Employees and Commuters to R...
ACT 2014 Managing Outreach and Communication for Employees and Commuters to R...ACT 2014 Managing Outreach and Communication for Employees and Commuters to R...
ACT 2014 Managing Outreach and Communication for Employees and Commuters to R...
Association for Commuter Transportation (ACT)
 
ACT 2014 LEED and TDM Continuing Opportunities to Market Your TDM Services
ACT 2014 LEED and TDM Continuing Opportunities to Market Your TDM ServicesACT 2014 LEED and TDM Continuing Opportunities to Market Your TDM Services
ACT 2014 LEED and TDM Continuing Opportunities to Market Your TDM Services
Association for Commuter Transportation (ACT)
 
ACT 2014 Introduction to Shared Use Mobility-Carsharing and Bikesharing Trend...
ACT 2014 Introduction to Shared Use Mobility-Carsharing and Bikesharing Trend...ACT 2014 Introduction to Shared Use Mobility-Carsharing and Bikesharing Trend...
ACT 2014 Introduction to Shared Use Mobility-Carsharing and Bikesharing Trend...
Association for Commuter Transportation (ACT)
 
ACT 2014 Introduction to Ridesharing Overview of Definitions and Setting the ...
ACT 2014 Introduction to Ridesharing Overview of Definitions and Setting the ...ACT 2014 Introduction to Ridesharing Overview of Definitions and Setting the ...
ACT 2014 Introduction to Ridesharing Overview of Definitions and Setting the ...
Association for Commuter Transportation (ACT)
 
ACT 2014 Improving TDM Outreach
ACT 2014 Improving TDM OutreachACT 2014 Improving TDM Outreach
ACT 2014 Improving TDM Outreach
Association for Commuter Transportation (ACT)
 
ACT 2014 How We Move Around New Research on Transportation Impacts of Urban M...
ACT 2014 How We Move Around New Research on Transportation Impacts of Urban M...ACT 2014 How We Move Around New Research on Transportation Impacts of Urban M...
ACT 2014 How We Move Around New Research on Transportation Impacts of Urban M...
Association for Commuter Transportation (ACT)
 
ACT 2014 Empowering Travellers with Online Transport Information Gamification...
ACT 2014 Empowering Travellers with Online Transport Information Gamification...ACT 2014 Empowering Travellers with Online Transport Information Gamification...
ACT 2014 Empowering Travellers with Online Transport Information Gamification...
Association for Commuter Transportation (ACT)
 

More from Association for Commuter Transportation (ACT) (20)

ACT 2014 21st Century Workplace
ACT 2014 21st Century WorkplaceACT 2014 21st Century Workplace
ACT 2014 21st Century Workplace
 
ACT 2014 Case Studies Telework So Cal Program MSRC
ACT 2014 Case Studies Telework So Cal Program MSRCACT 2014 Case Studies Telework So Cal Program MSRC
ACT 2014 Case Studies Telework So Cal Program MSRC
 
ACT 2014 Standing in the Intersection of the Ridematching Experience
ACT 2014 Standing in the Intersection of the Ridematching ExperienceACT 2014 Standing in the Intersection of the Ridematching Experience
ACT 2014 Standing in the Intersection of the Ridematching Experience
 
Act 2014 Low Income Fare Program
Act 2014 Low Income Fare ProgramAct 2014 Low Income Fare Program
Act 2014 Low Income Fare Program
 
ACT 2014 UCLA Bike Program
ACT 2014 UCLA Bike ProgramACT 2014 UCLA Bike Program
ACT 2014 UCLA Bike Program
 
ACT 2014 Travel Options for Rural Higher Education
ACT 2014 Travel Options for Rural Higher EducationACT 2014 Travel Options for Rural Higher Education
ACT 2014 Travel Options for Rural Higher Education
 
ACT 2014 TMA Survey
ACT 2014 TMA SurveyACT 2014 TMA Survey
ACT 2014 TMA Survey
 
ACT 2014 The Power of Lighting Clean Transportation Policy and Programs
ACT 2014 The Power of Lighting Clean Transportation Policy and ProgramsACT 2014 The Power of Lighting Clean Transportation Policy and Programs
ACT 2014 The Power of Lighting Clean Transportation Policy and Programs
 
ACT 2014 TDM International Update from the UK
ACT 2014 TDM International Update from the UKACT 2014 TDM International Update from the UK
ACT 2014 TDM International Update from the UK
 
ACT 2014 San Francisco Safe Routes to School Program
ACT 2014 San Francisco Safe Routes to School ProgramACT 2014 San Francisco Safe Routes to School Program
ACT 2014 San Francisco Safe Routes to School Program
 
ACT 2014 Resources for Every TDM Professional
ACT 2014 Resources for Every TDM ProfessionalACT 2014 Resources for Every TDM Professional
ACT 2014 Resources for Every TDM Professional
 
ACT 2014 Portland Oregon Outreach
ACT 2014 Portland Oregon OutreachACT 2014 Portland Oregon Outreach
ACT 2014 Portland Oregon Outreach
 
ACT 2014 Policies and Program Incentives That Work or New Paradigms in Parkin...
ACT 2014 Policies and Program Incentives That Work or New Paradigms in Parkin...ACT 2014 Policies and Program Incentives That Work or New Paradigms in Parkin...
ACT 2014 Policies and Program Incentives That Work or New Paradigms in Parkin...
 
ACT 2014 Managing Outreach and Communication for Employees and Commuters to R...
ACT 2014 Managing Outreach and Communication for Employees and Commuters to R...ACT 2014 Managing Outreach and Communication for Employees and Commuters to R...
ACT 2014 Managing Outreach and Communication for Employees and Commuters to R...
 
ACT 2014 LEED and TDM Continuing Opportunities to Market Your TDM Services
ACT 2014 LEED and TDM Continuing Opportunities to Market Your TDM ServicesACT 2014 LEED and TDM Continuing Opportunities to Market Your TDM Services
ACT 2014 LEED and TDM Continuing Opportunities to Market Your TDM Services
 
ACT 2014 Introduction to Shared Use Mobility-Carsharing and Bikesharing Trend...
ACT 2014 Introduction to Shared Use Mobility-Carsharing and Bikesharing Trend...ACT 2014 Introduction to Shared Use Mobility-Carsharing and Bikesharing Trend...
ACT 2014 Introduction to Shared Use Mobility-Carsharing and Bikesharing Trend...
 
ACT 2014 Introduction to Ridesharing Overview of Definitions and Setting the ...
ACT 2014 Introduction to Ridesharing Overview of Definitions and Setting the ...ACT 2014 Introduction to Ridesharing Overview of Definitions and Setting the ...
ACT 2014 Introduction to Ridesharing Overview of Definitions and Setting the ...
 
ACT 2014 Improving TDM Outreach
ACT 2014 Improving TDM OutreachACT 2014 Improving TDM Outreach
ACT 2014 Improving TDM Outreach
 
ACT 2014 How We Move Around New Research on Transportation Impacts of Urban M...
ACT 2014 How We Move Around New Research on Transportation Impacts of Urban M...ACT 2014 How We Move Around New Research on Transportation Impacts of Urban M...
ACT 2014 How We Move Around New Research on Transportation Impacts of Urban M...
 
ACT 2014 Empowering Travellers with Online Transport Information Gamification...
ACT 2014 Empowering Travellers with Online Transport Information Gamification...ACT 2014 Empowering Travellers with Online Transport Information Gamification...
ACT 2014 Empowering Travellers with Online Transport Information Gamification...
 

Recently uploaded

Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij
 
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussionPro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Using-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptxUsing-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptx
kainatfatyma9
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
IEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdfIEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdf
Claudio Gallicchio
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
OECD Directorate for Financial and Enterprise Affairs
 
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
OECD Directorate for Financial and Enterprise Affairs
 
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
OECD Directorate for Financial and Enterprise Affairs
 
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
OECD Directorate for Financial and Enterprise Affairs
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
artemacademy2
 
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
gpww3sf4
 
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptxThe remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
JiteshKumarChoudhary2
 
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdfBRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
Robin Haunschild
 
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfWhy Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Ben Linders
 
Disaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other usesDisaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other uses
RIDHIMAGARG21
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
OECD Directorate for Financial and Enterprise Affairs
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
samililja
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
OECD Directorate for Financial and Enterprise Affairs
 

Recently uploaded (20)

Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
 
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussionPro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
 
Using-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptxUsing-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptx
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
 
IEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdfIEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdf
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
 
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
 
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
 
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
 
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
 
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptxThe remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
 
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdfBRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
 
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfWhy Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
 
Disaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other usesDisaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other uses
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
 
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
 

ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policies in the Workplace

  • 1. Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace Dylan W. Wiseman Littler Mendelson, P.C. dwiseman@littler.com
  • 2. Lingo: Dual Use Mobile Devices and BYOD •BYOD = Bring Your Own Device •Dual Use Mobile Device: Mobile device used to create, store and transmit both personal and work-related data •Some Other Terms: –BYOC: Bring Your Own Computer. Programs that add laptops to the covered devices –BYOA: Bring Your Own App. Per Gartner Group, 145 new mobile apps were downloaded per second in Q4 2012 2
  • 3. What Are Employees Doing? Consumerization of IT •62% of full-time workers own smartphone •33% of full-time workers own tablet •Time spent on a mobile device each day by U.S. adult has quadrupled from 2009 (22 minutes) to 2012 (88 minutes) (USA Today 3/7/13) 3
  • 4. What Are Employers Doing? •55% of IT managers have made exceptions for “specialized members,” i.e., top executives to use their choice of devices and software (2013 iPass MobileIron study) •55% of IT directors will actively accommodate and encourage the use of personal devices (Citrix Study 2012) •81% of respondents accommodate personal devices in the workplace (2013 iPass MobileIron study) •54% of respondents had a formalized BYOD policy (2013 iPass MobileIron study) 4
  • 5. •IBM –80,000 employees –IBM CIO: “If we didn’t support them, we figured [employees] would figure out how to support [the devices] themselves. •Intel –Started program in 2008 –Now encompasses 24,000 devices, about 90% of these are smartphones –Uses multiple security levels for access to different categories of documents •Sybase –20 different phone options –Employees buy and own the phones, but Sybase pays for the monthly service contract •Citrix –$2,100 stipend to purchase a laptop of their choice and a 3-year warranty. –Company owned cost was $2,600. –Adoption rate of about 20%. Tech Companies Taking The Lead 5
  • 6. What Are Employees Doing? How do you use your smartphone? Source: The iPass Global Mobile Workforce Report, http://mobile-workforce-project.ipass.com/cpwp/wp- content/files_mf/ipass_mobileworkforcereport_q3_2011.pdf 6
  • 7. What Are Employees Doing? Do you use your tablet primarily as a personal or work device? 7
  • 8. Corporate Rationales •Reducing expenses for employers •Improving employee productivity –Intel estimates that its BYOD employees save an average of 57 minutes per day by being able to access work materials from personal devices based on three years of employee estimates •Improving employee engagement •Aiding in the recruitment of new employees •Solving the “two pocket problem” 8
  • 9. •All tallied, BYOD doesn’t look pretty from a cost perspective. A typical mobile BYOD environment costs 33 percent more than a well-managed wireless deployment where the company owns the devices ***.” –Loss of bulk purchasing power –Higher help desk/support costs –Security issues •The trend toward employee-owned devices isn’t saving IBM any money. (MIT Technology Review, Monday, May 21, 2012) Does It Really Reduce Costs? 9
  • 10. Creates Significant Risks Most Companies Are Ignoring •Data-Related Risks –Security of company data –Privacy of employee data –Records management –Contractual obligations –eDiscovery –Trade Secret Protection –Contingent Workers •HR-Related Risks –Performance management –Tax –EEO –Wage & Hour –Workplace Safety –Labor –International
  • 11. •COPE –Corporate –Owned –Personally –Enabled There is an alternative
  • 12. HR and Employment Law Issues
  • 13. HR and Employment Law Issues •Performance management •Discrimination, hostile work environment, accommodation issues •Workplace Safety •Wage & Hour •Expense Reimbursement •Labor •International
  • 14. Data Security & Privacy Issues
  • 15. •Access to private information –Computer forensics –eDiscovery collection during litigation •Issuing a remote wipe command –Employees have a reasonable expectation of privacy in their personal device –All 50 states have computer trespass laws –Computer Fraud & Abuse Act Employee Privacy Rights
  • 16. •Employee ownership of the account with the service provider will limit company access to its data •No contract with company •Obligation to “vet” security controls of vendors •Data may be more available to law enforcement or others Gateway to the cloud
  • 17. •Stored Communications Act •Computer Trespass Laws •Password Protection Laws Accessing Employee’s Data
  • 18. •“60 percent of American workers who left their employers [in 2008] took some data with them.” (Economist) •Misappropriation may be harder to prove •Use or disclosure will be the focus •Access to the devices will be a challenge Trade Secret Protection
  • 19. •Locating the data •Access to the device •Collection challenges eDiscovery Challenges
  • 21. •Careful Planning •Policies •Technical controls •Operating procedures and capabilities •Educate and train Coordinated Approach
  • 22. Decide whether all employees should be permitted to participate in a BYOD program or whether certain groups should be excluded Recommendation
  • 23. Require employees to consent to all company activities involving the personal device Recommendation
  • 24. Modify or create Employee Agreements Recommendation
  • 25. Restrict employees from using cloud-based apps, cloud-based backup, or synchronizing work-related data Recommendation
  • 26. Ensure that use complies with Wage and Hour obligations by prohibiting off-the-clock work and ensuring pay for all hours worked Recommendation
  • 28. Revise exit interview processes Recommendation
  • 29. Bottom Line: BYOD creates risks and challenges for employers •Data-Related Risks –Security of company data –Privacy of employee data –Records management –Contractual obligations –eDiscovery –Trade Secret Protection –Contingent Workers •HR-Related Risks –Performance management –EEO –Wage & Hour –Workplace Safety –Labor –International
  • 31. Go to: www.workplaceprivacycounsel.com Search: “BYOD” Littler BYOD White Paper