BYOD is all the rage, but our MD, Daragh O Brien, has a contrarian view.
BYOD places the emphasis on the devices and technology. This is wrong. The focus needs to shift back to the reason we have this technology in the first place - accessing and processing information.
By thinking "GATOR" (Give Access to Our Resources) we can broaden our thinking about the Who, How, Where, Why, and When of our information management regardless of how the device that is accessing it was procured.
This presentation was prepared and delivered for an awareness event hosted by Netspeed (www.netspeed.ie) and Aruba
2. About Castlebridge Associates (www.castlebridge.ie)
Data
Protection
Data
Protection
Information
Quality
Consulting
Coaching/
Mentoring
Training
Data
Governance
Information
Quality
Data
Governance
Project
Management
Quality
Assured
Certified
Trainers
Qualified &
Experienced
External
QA
Audits
Irish State Approved
Training Provider
IQCP &
DP
Certified
Quality
Assured
Syllabus
Fin.
Svcs
Telco
Many
Industries
Govt
Edu
Certified
PMs
Utilities
NonProfit
6. Data Protection Angle
• DPA requires that organisations take
appropriate measures to protect data
from unauthorised access, alteration,
or disclosure.
• Applies to physical data as well as
electronic data
7. Good Characteristics
• Physically separate from rest of house
• Can lock the door when not in use (secure)
• Not accessible by others without permission
• Easy to identify boundaries
• Physically secure
• A locked down work issued device for accessing data
• Organisation must ensure appropriate security measures
are being taken for manual and electronic data.
• Securing WiFi
• Lockable filing cabinets
• Distinct and secure work environment
8. Question:
• When a Teleworker changes jobs can their employer sell
their house?
• When a teleworker has a break-in, does their employer
take all their other stuff away?
10. What is the goal?
Security of
the DATA
Why care
about the
device?
11. Other Issues
• Need to manage the risk of disclosure of private non-work
data if data is ever required to be presented in evidence in
legal proceedings.
• The “search warrant” will only cover the “workspace”.
• Constitutional and other issues arise if the private
personal space is invaded without due cause and
authority.
13. Reframe the metaphor
Create a distinct workspace on your device
Games
Family
Photos
Photos
Cat
Pictures
Work can control that and all its parameters
Work and personal segregated
Music
Work
Wipe the workspace, leave the personal
space.
14. A future conversation
Don’t worry.
We’ve wiped the workspace and locked it
Would youHi. Helpdesk here. personal
like us to wipe your
out.Cat Pictures and accessfor our data
No one can lost your device?
Oh You’ve get Music to you?
now