SlideShare a Scribd company logo
1 of 17
Bring your own device…

A misnamed concept?
About Castlebridge Associates (www.castlebridge.ie)
Data
Protection

Data
Protection
Information
Quality

Consulting

Coaching/
Mentoring

Training

Data
Governance

Information
Quality

Data
Governance

Project
Management

Quality
Assured
Certified
Trainers

Qualified &
Experienced
External
QA
Audits

Irish State Approved
Training Provider

IQCP &
DP
Certified

Quality
Assured
Syllabus
Fin.
Svcs

Telco

Many
Industries

Govt

Edu

Certified
PMs

Utilities

NonProfit
Home Workers access data..

http://www.flickr.com/photos/mernisse/4847106545/
Different ways it is accessed
Home Office

Sitting Room

Kitchen

Living room
Data Protection Angle
• DPA requires that organisations take

appropriate measures to protect data
from unauthorised access, alteration,
or disclosure.
• Applies to physical data as well as
electronic data
Good Characteristics
• Physically separate from rest of house
• Can lock the door when not in use (secure)
• Not accessible by others without permission
• Easy to identify boundaries
• Physically secure

• A locked down work issued device for accessing data
• Organisation must ensure appropriate security measures

are being taken for manual and electronic data.
• Securing WiFi

• Lockable filing cabinets
• Distinct and secure work environment
Question:

• When a Teleworker changes jobs can their employer sell

their house?
• When a teleworker has a break-in, does their employer
take all their other stuff away?
Extend the metaphor

Games

Family
Games
Photos

Photos
Music

Photos

Cat

Photos
Pictures

Photos
Work

Using personal device for work is the same
as using your personal space for work.
What happens if your personal device is lost
or stolen?
What happens to the segregation between
personal and work?
What happens when policy requires your
personal space to be invaded and wiped to
protect Work?
What is the goal?

Security of
the DATA

Why care
about the
device?
Other Issues
• Need to manage the risk of disclosure of private non-work

data if data is ever required to be presented in evidence in
legal proceedings.
• The “search warrant” will only cover the “workspace”.
• Constitutional and other issues arise if the private

personal space is invaded without due cause and
authority.
Reframe the conversation

Give Access to Our Data
Give Access to Our Resources
Regardless of who OWNS the device
Reframe the metaphor
Create a distinct workspace on your device
Games

Family
Photos

Photos

Cat
Pictures

Work can control that and all its parameters
Work and personal segregated

Music

Work

Wipe the workspace, leave the personal
space.
A future conversation
Don’t worry.
We’ve wiped the workspace and locked it
Would youHi. Helpdesk here. personal
like us to wipe your
out.Cat Pictures and accessfor our data
No one can lost your device?
Oh You’ve get Music to you?
now
Reframing

BYOD
G ive/Get
A ccess
To
O ur
R esources
What you need to do now

Define your GATOR™ strategy

(and make it snappy!!!)

(the term “GATOR” and “GATOR Strategy” are © 2013 Castlebridge Associates)
Bring Your Own Device - a Misnamed Concept?

More Related Content

Viewers also liked

Pteg g-grupo nº7-lista 8, 9, 13, 20, 49 - visita2-expo cap 2 tematratamiento...
Pteg g-grupo nº7-lista 8, 9, 13, 20, 49 - visita2-expo  cap 2 tematratamiento...Pteg g-grupo nº7-lista 8, 9, 13, 20, 49 - visita2-expo  cap 2 tematratamiento...
Pteg g-grupo nº7-lista 8, 9, 13, 20, 49 - visita2-expo cap 2 tematratamiento...sara suarez
 
Trad oh application
Trad oh applicationTrad oh application
Trad oh applicationrdjones0972
 
Хореографическая студия гимназии
Хореографическая студия гимназииХореографическая студия гимназии
Хореографическая студия гимназииDimov Viasheslav
 
May The Tweet Be With You
May The Tweet Be With YouMay The Tweet Be With You
May The Tweet Be With YouKristyn Rose
 
Listino prezzi Mercedes GLC
Listino prezzi Mercedes GLCListino prezzi Mercedes GLC
Listino prezzi Mercedes GLCdanielemancin88
 
Sleep and sleep disorder
Sleep and sleep disorderSleep and sleep disorder
Sleep and sleep disorderAachal Taywade
 
Psicología del color: Naranja
Psicología del color: NaranjaPsicología del color: Naranja
Psicología del color: NaranjaSuzpectG
 
Medicion calificacion y evaluacion
Medicion calificacion y evaluacionMedicion calificacion y evaluacion
Medicion calificacion y evaluacionLilibeth_B
 
Tailoring Next Best Offers (NBOs) using Real Time Big Data Analytics
Tailoring Next Best Offers (NBOs) using Real Time Big Data AnalyticsTailoring Next Best Offers (NBOs) using Real Time Big Data Analytics
Tailoring Next Best Offers (NBOs) using Real Time Big Data AnalyticsShubham Agarwal
 
Control de procesos clase 1
Control de procesos   clase 1Control de procesos   clase 1
Control de procesos clase 1UNEFA
 

Viewers also liked (16)

Question 5
Question 5Question 5
Question 5
 
Alumni Speak Iipm 2
Alumni Speak Iipm 2Alumni Speak Iipm 2
Alumni Speak Iipm 2
 
02
0202
02
 
2016年疾管署疫情監測週報(第15週)
2016年疾管署疫情監測週報(第15週)2016年疾管署疫情監測週報(第15週)
2016年疾管署疫情監測週報(第15週)
 
Pteg g-grupo nº7-lista 8, 9, 13, 20, 49 - visita2-expo cap 2 tematratamiento...
Pteg g-grupo nº7-lista 8, 9, 13, 20, 49 - visita2-expo  cap 2 tematratamiento...Pteg g-grupo nº7-lista 8, 9, 13, 20, 49 - visita2-expo  cap 2 tematratamiento...
Pteg g-grupo nº7-lista 8, 9, 13, 20, 49 - visita2-expo cap 2 tematratamiento...
 
Alat pendeteksi ikan
Alat pendeteksi ikanAlat pendeteksi ikan
Alat pendeteksi ikan
 
Trad oh application
Trad oh applicationTrad oh application
Trad oh application
 
Хореографическая студия гимназии
Хореографическая студия гимназииХореографическая студия гимназии
Хореографическая студия гимназии
 
May The Tweet Be With You
May The Tweet Be With YouMay The Tweet Be With You
May The Tweet Be With You
 
Listino prezzi Mercedes GLC
Listino prezzi Mercedes GLCListino prezzi Mercedes GLC
Listino prezzi Mercedes GLC
 
La transición
La transiciónLa transición
La transición
 
Sleep and sleep disorder
Sleep and sleep disorderSleep and sleep disorder
Sleep and sleep disorder
 
Psicología del color: Naranja
Psicología del color: NaranjaPsicología del color: Naranja
Psicología del color: Naranja
 
Medicion calificacion y evaluacion
Medicion calificacion y evaluacionMedicion calificacion y evaluacion
Medicion calificacion y evaluacion
 
Tailoring Next Best Offers (NBOs) using Real Time Big Data Analytics
Tailoring Next Best Offers (NBOs) using Real Time Big Data AnalyticsTailoring Next Best Offers (NBOs) using Real Time Big Data Analytics
Tailoring Next Best Offers (NBOs) using Real Time Big Data Analytics
 
Control de procesos clase 1
Control de procesos   clase 1Control de procesos   clase 1
Control de procesos clase 1
 

Similar to Bring Your Own Device - a Misnamed Concept?

How To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay ProductiveHow To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay ProductiveChristi Williams (Keating)
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Peter GEELEN ✔
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in PracticeTomppa Järvinen
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Peter GEELEN ✔
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarConcept Searching, Inc
 
Boca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanBoca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanErick Solms
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
ethical hacking in motion MODULE - II.ppt
ethical hacking in motion MODULE - II.pptethical hacking in motion MODULE - II.ppt
ethical hacking in motion MODULE - II.pptShivaniSingha1
 
Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365
Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365
Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365DavidNicholls52
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseTechSoup
 
Security & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts ExplainedSecurity & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts ExplainedAlan Eardley
 
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksTackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksIT Masterclasses
 
11. wireless-penetration-testing-training-cyber51
11. wireless-penetration-testing-training-cyber5111. wireless-penetration-testing-training-cyber51
11. wireless-penetration-testing-training-cyber51Doree Garcia, CCNA, OSWP
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss PreventionGary Bahadur
 
Blacks In Technology BMI Tech Workshop preso
Blacks In Technology BMI Tech Workshop presoBlacks In Technology BMI Tech Workshop preso
Blacks In Technology BMI Tech Workshop presoblacksintechnology
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flarezilberberg
 
Blacks In Technology for BMI Technology Workshop Presentation
Blacks In Technology for BMI Technology Workshop PresentationBlacks In Technology for BMI Technology Workshop Presentation
Blacks In Technology for BMI Technology Workshop Presentationblacksintechnology
 

Similar to Bring Your Own Device - a Misnamed Concept? (20)

How To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay ProductiveHow To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay Productive
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in Practice
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
Boca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanBoca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game Plan
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
ethical hacking in motion MODULE - II.ppt
ethical hacking in motion MODULE - II.pptethical hacking in motion MODULE - II.ppt
ethical hacking in motion MODULE - II.ppt
 
Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365
Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365
Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
 
Security & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts ExplainedSecurity & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts Explained
 
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksTackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
 
11. wireless-penetration-testing-training-cyber51
11. wireless-penetration-testing-training-cyber5111. wireless-penetration-testing-training-cyber51
11. wireless-penetration-testing-training-cyber51
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Blacks In Technology BMI Tech Workshop preso
Blacks In Technology BMI Tech Workshop presoBlacks In Technology BMI Tech Workshop preso
Blacks In Technology BMI Tech Workshop preso
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flare
 
Blacks In Technology for BMI Technology Workshop Presentation
Blacks In Technology for BMI Technology Workshop PresentationBlacks In Technology for BMI Technology Workshop Presentation
Blacks In Technology for BMI Technology Workshop Presentation
 

More from Castlebridge Associates

Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Castlebridge Associates
 
From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011Castlebridge Associates
 
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Castlebridge Associates
 
Building Information Quality from the Inside Out
Building Information Quality from the Inside OutBuilding Information Quality from the Inside Out
Building Information Quality from the Inside OutCastlebridge Associates
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumCastlebridge Associates
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCastlebridge Associates
 

More from Castlebridge Associates (9)

Daragh O Brien 2014 IAIDQ presidency
Daragh O Brien 2014 IAIDQ presidencyDaragh O Brien 2014 IAIDQ presidency
Daragh O Brien 2014 IAIDQ presidency
 
EDW Lightning Talk 2014
EDW Lightning Talk 2014EDW Lightning Talk 2014
EDW Lightning Talk 2014
 
Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)
 
From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011From Asset to Impact - Presentation to ICS Data Protection Conference 2011
From Asset to Impact - Presentation to ICS Data Protection Conference 2011
 
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
Enterprise Computing - A Vision of Future Today (Presentation to DCU students)
 
Building Information Quality from the Inside Out
Building Information Quality from the Inside OutBuilding Information Quality from the Inside Out
Building Information Quality from the Inside Out
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspective
 
Introduction to Information Quality
Introduction to Information QualityIntroduction to Information Quality
Introduction to Information Quality
 

Recently uploaded

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 

Recently uploaded (20)

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 

Bring Your Own Device - a Misnamed Concept?

  • 1. Bring your own device… A misnamed concept?
  • 2. About Castlebridge Associates (www.castlebridge.ie) Data Protection Data Protection Information Quality Consulting Coaching/ Mentoring Training Data Governance Information Quality Data Governance Project Management Quality Assured Certified Trainers Qualified & Experienced External QA Audits Irish State Approved Training Provider IQCP & DP Certified Quality Assured Syllabus Fin. Svcs Telco Many Industries Govt Edu Certified PMs Utilities NonProfit
  • 3. Home Workers access data.. http://www.flickr.com/photos/mernisse/4847106545/
  • 4. Different ways it is accessed
  • 6. Data Protection Angle • DPA requires that organisations take appropriate measures to protect data from unauthorised access, alteration, or disclosure. • Applies to physical data as well as electronic data
  • 7. Good Characteristics • Physically separate from rest of house • Can lock the door when not in use (secure) • Not accessible by others without permission • Easy to identify boundaries • Physically secure • A locked down work issued device for accessing data • Organisation must ensure appropriate security measures are being taken for manual and electronic data. • Securing WiFi • Lockable filing cabinets • Distinct and secure work environment
  • 8. Question: • When a Teleworker changes jobs can their employer sell their house? • When a teleworker has a break-in, does their employer take all their other stuff away?
  • 9. Extend the metaphor Games Family Games Photos Photos Music Photos Cat Photos Pictures Photos Work Using personal device for work is the same as using your personal space for work. What happens if your personal device is lost or stolen? What happens to the segregation between personal and work? What happens when policy requires your personal space to be invaded and wiped to protect Work?
  • 10. What is the goal? Security of the DATA Why care about the device?
  • 11. Other Issues • Need to manage the risk of disclosure of private non-work data if data is ever required to be presented in evidence in legal proceedings. • The “search warrant” will only cover the “workspace”. • Constitutional and other issues arise if the private personal space is invaded without due cause and authority.
  • 12. Reframe the conversation Give Access to Our Data Give Access to Our Resources Regardless of who OWNS the device
  • 13. Reframe the metaphor Create a distinct workspace on your device Games Family Photos Photos Cat Pictures Work can control that and all its parameters Work and personal segregated Music Work Wipe the workspace, leave the personal space.
  • 14. A future conversation Don’t worry. We’ve wiped the workspace and locked it Would youHi. Helpdesk here. personal like us to wipe your out.Cat Pictures and accessfor our data No one can lost your device? Oh You’ve get Music to you? now
  • 16. What you need to do now Define your GATOR™ strategy (and make it snappy!!!) (the term “GATOR” and “GATOR Strategy” are © 2013 Castlebridge Associates)