SlideShare a Scribd company logo
C O IT US
A look at the business, technical and regulatory challenges encountered in
                      a real life BYOD initiative
S ETTING

 Healthcare organization
     • Broader provincial public service
     • Provider of common infrastructure and key clinical application to a
       federation of organizations across the province
P RESSURES

 Department Managers showing up with iPads

 Privacy/Security reaction to the above

 Preponderance of tablet app stories within the health care sector

 Reality of working in hospital ward rooms
B OYS AND THEIR TOYS

 Influential managers start bringing their personal devices to the
office, getting wireless access and connecting to the mail system

 Initial reaction from privacy /security: “No!”

 Initial reaction from infrastructure: “How and why?”
     • Horrid reality of mail system configuration
     • Horrid reality of access to internal wireless
B OYS AND THEIR TOYS (H OW )

 Turns out the mail system (hosted by an external party) was
configured differently than we were led to believe or remembered
hearing about
     • That’s code for the “barn doors never actually closed and the horses
       have been running for quite some time”

 Access requirement for wireless access was a satisficing solution
     • Stronger options were available, but underlying infrastructure
       components to support these were not in place
B OYS AND THEIR TOYS (W HY )

 Fact: managers who spend all day in meetings don’t like lugging
Windows notebooks around all day (no real surprise)

 Also turns out that Tablet PC hardware doesn’t cut the mustard
either (also not a surprise)

 Is there a business case here? Perhaps, perhaps not
T HE BIG “N O !”

 Privacy/Security had legitimate worries about the nature of data
being circulated through email
 There were deemed to be compensating controls on managed
endpoints, including drive encryption and destruction protocols
 No real controls of any sort on these “new” endpoints*


*future investigation would reveal that this was anything but new
T HE BIG “N O !”

 Privacy /Security raised legitimate (at the time) concerns over the
encryption capabilities of these devices

 Also, concerns over jailbreaks
     • Exacerbated by security illiteracy, to wit: “jailbreaking will be
       impossible in the next version; the vendor says so, it must be true.”
     • Vendors were dropping jailbreak detection features
E VERYBODY ELSE IS DOING IT

 A glut of stories of tablet “successes” within the sector
 Interest of upper management is piqued
 Many of these cause concerns as we dug deeper
     • Clinical apps developed by students
     • Device & data management details are either unavailable or very, very
       sketchy
     • Uncertainty as to how the then-current hardware and software
       complies with PHIPA orders for the encryption of mobile devices
     • Not a lot of sharing in the community about these initiatives
E VERYBODY ELSE IS DOING IT

 Warning: this slide consists of editorial commentary

 Consensus in working group re: mobile app security in healthcare:
many talking, few doing, surpassing few doing well
T HE BUSINESS HAS A PROBLEM

 One of the federated agencies came to the table with a request to
tablet-ify one of the key systems in use province wide
 Not technically clinical data, though still dealing with PHI
 Vendor already had iOS version in the works
 New product manager had come on board with mobile solution in
portfolio
 CIO made mobile management a priority
T HE BUSINESS HAS A PROBLEM

 The root of the issue in the field was space
     • Ever been in a hospital ward room?
     • Would you want to lug a laptop around and try to use it bedside?
 Tablet form factor, weight and touch interface offered significant
improvements for field staff
 Infection protocols taken care of; there were already wraps on the
market for tablets
     • Easier to bring into compliance than traditional notebooks
T HE BIG “N O !” REDUX

 Serious privacy concerns with respect to integrated cameras
      • Notebooks issued never had webcams for this reason

 Concerns with voice recognition features shipping data hither and
yon
      • Which they do in fact do… sometimes in plain text

 “No apps!”
T HE BIG “N O !” REDUX

 That’s right.

 “No apps!”

 As a modern mobile device policy

 This wasn’t even enforced on the Blackberry fleet
     • Editorial: not that anyone would’ve wept over losing access to App
       World
T HE BUSINESS WANTS
                       SOLUTIONS

 The mobile app project was in flight, with executive approval

 The missing piece for privacy/security approval was management
of devices
     • Essentially BES for non-Blackberry devices

 MDM became a priority
M ANAGEMENT R EQUIREMENTS

 Stronger identity for network access

 Application deployment

 Application control

 Device inventory

 Enforce encryption

 Remote wipe
C HALLENGES

 Consistency of capability is a problem… for some platforms
 Managing Apple is easy
 Managing Android will make you pull your hair out and drink
blood from human skulls while you plot the annihilation of all life is
getting better
 Managing Windows Phone 7…
 Managing Symbian…
C HALLENGES

 Why care about all of these platforms?

 They all showed up in the web log accessing the mail server

 BYOD was, effectively, already happening

 There was no “pay to play”

 No idea what was on the WLAN…
“S OLUTIONS ”

 MDM solution put in place as pilot; tied into the mobile app pilot
project

 Able to offer applications to users based on their role in the
organisation

 Able to enforce controls on the app version

 Solved some issues; revealed more
N EW P ROBLEMS

 Most MDM solutions are designed after the pattern of
configuration management systems

 Works to a point

 After much discussion with Privacy/Security, their chief
requirement was isolated:

 How can we manage the data?
N EW P ROBLEMS

 Realistically speaking, managing the data on traditional endpoints
doesn’t really happen
 Many solutions exist to work around this issue
 Not many of these solutions lend themselves to a decent/usable
mobile device experience
 There is a need to manage how the applications deployed to
mobile devices handle their data
N EW P ROBLEMS

 Some device management solutions do this to a degree
 Coarse-grained solutions
 Finer control is not generally available
 Hard to audit and attest
 This is not necessarily the role of MDM
 This should probably be built in behaviour of apps
     • Especially home grown apps

More Related Content

What's hot

Group seminar 2132421
Group seminar 2132421Group seminar 2132421
Group seminar 2132421
Patricia Ang
 
Bright talk running a cloud - final
Bright talk   running a cloud - finalBright talk   running a cloud - final
Bright talk running a cloud - final
Andrew White
 
Brighttalk high scale low touch and other bedtime stories - final
Brighttalk   high scale low touch and other bedtime stories - finalBrighttalk   high scale low touch and other bedtime stories - final
Brighttalk high scale low touch and other bedtime stories - final
Andrew White
 

What's hot (20)

Project part 2 instructions
Project part 2   instructionsProject part 2   instructions
Project part 2 instructions
 
Direct manipulation is broken: O'Reilly Design Conference Jan 2016
Direct manipulation is broken: O'Reilly Design Conference Jan 2016Direct manipulation is broken: O'Reilly Design Conference Jan 2016
Direct manipulation is broken: O'Reilly Design Conference Jan 2016
 
UX Day Mannheim: UX for systems of connected products
UX Day Mannheim: UX for systems of connected productsUX Day Mannheim: UX for systems of connected products
UX Day Mannheim: UX for systems of connected products
 
Interusability: designing a coherent system UX
Interusability: designing a coherent system UXInterusability: designing a coherent system UX
Interusability: designing a coherent system UX
 
Challenges and tools of multi-screen UX
Challenges and tools of multi-screen UXChallenges and tools of multi-screen UX
Challenges and tools of multi-screen UX
 
TFT13 - Ian Aitchison, Approaching the Event Horizon
TFT13 - Ian Aitchison, Approaching the Event HorizonTFT13 - Ian Aitchison, Approaching the Event Horizon
TFT13 - Ian Aitchison, Approaching the Event Horizon
 
#TFT12: Amber Case
#TFT12: Amber Case#TFT12: Amber Case
#TFT12: Amber Case
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
UXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshopUXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshop
 
Interusability: designing a coherent system UX: NUX 23.10.15
Interusability: designing a coherent system UX: NUX 23.10.15Interusability: designing a coherent system UX: NUX 23.10.15
Interusability: designing a coherent system UX: NUX 23.10.15
 
UX for the internet of things: ThingsCon 150505
UX for the internet of things: ThingsCon 150505UX for the internet of things: ThingsCon 150505
UX for the internet of things: ThingsCon 150505
 
Getting the IoT into Tesco: Internet of things UX for the mass market - IoT 14
Getting the IoT into Tesco: Internet of things UX for the mass market -  IoT 14Getting the IoT into Tesco: Internet of things UX for the mass market -  IoT 14
Getting the IoT into Tesco: Internet of things UX for the mass market - IoT 14
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What?
 
Group seminar 2132421
Group seminar 2132421Group seminar 2132421
Group seminar 2132421
 
The future of interaction & its security challenges
The future of interaction & its security challengesThe future of interaction & its security challenges
The future of interaction & its security challenges
 
Bright talk running a cloud - final
Bright talk   running a cloud - finalBright talk   running a cloud - final
Bright talk running a cloud - final
 
Brighttalk high scale low touch and other bedtime stories - final
Brighttalk   high scale low touch and other bedtime stories - finalBrighttalk   high scale low touch and other bedtime stories - final
Brighttalk high scale low touch and other bedtime stories - final
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
 
Creativity & Innovation
Creativity & InnovationCreativity & Innovation
Creativity & Innovation
 

Similar to CoITus {TASK.to September 2012}

Security that works
Security that worksSecurity that works
Security that works
James1280
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
Caston Thomas
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
J M
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
MobiWee
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
Jim Sutter
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
K Singh
 

Similar to CoITus {TASK.to September 2012} (20)

Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Security that works
Security that worksSecurity that works
Security that works
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Be Prepared For Byod
Be Prepared For ByodBe Prepared For Byod
Be Prepared For Byod
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
Mobile Intranet for ALL - 8 Key Questions
Mobile Intranet for ALL - 8 Key QuestionsMobile Intranet for ALL - 8 Key Questions
Mobile Intranet for ALL - 8 Key Questions
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research Study
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Ransomware Mallox [EN].pdf
Ransomware         Mallox       [EN].pdfRansomware         Mallox       [EN].pdf
Ransomware Mallox [EN].pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

CoITus {TASK.to September 2012}

  • 1. C O IT US A look at the business, technical and regulatory challenges encountered in a real life BYOD initiative
  • 2. S ETTING  Healthcare organization • Broader provincial public service • Provider of common infrastructure and key clinical application to a federation of organizations across the province
  • 3. P RESSURES  Department Managers showing up with iPads  Privacy/Security reaction to the above  Preponderance of tablet app stories within the health care sector  Reality of working in hospital ward rooms
  • 4. B OYS AND THEIR TOYS  Influential managers start bringing their personal devices to the office, getting wireless access and connecting to the mail system  Initial reaction from privacy /security: “No!”  Initial reaction from infrastructure: “How and why?” • Horrid reality of mail system configuration • Horrid reality of access to internal wireless
  • 5. B OYS AND THEIR TOYS (H OW )  Turns out the mail system (hosted by an external party) was configured differently than we were led to believe or remembered hearing about • That’s code for the “barn doors never actually closed and the horses have been running for quite some time”  Access requirement for wireless access was a satisficing solution • Stronger options were available, but underlying infrastructure components to support these were not in place
  • 6. B OYS AND THEIR TOYS (W HY )  Fact: managers who spend all day in meetings don’t like lugging Windows notebooks around all day (no real surprise)  Also turns out that Tablet PC hardware doesn’t cut the mustard either (also not a surprise)  Is there a business case here? Perhaps, perhaps not
  • 7. T HE BIG “N O !”  Privacy/Security had legitimate worries about the nature of data being circulated through email  There were deemed to be compensating controls on managed endpoints, including drive encryption and destruction protocols  No real controls of any sort on these “new” endpoints* *future investigation would reveal that this was anything but new
  • 8. T HE BIG “N O !”  Privacy /Security raised legitimate (at the time) concerns over the encryption capabilities of these devices  Also, concerns over jailbreaks • Exacerbated by security illiteracy, to wit: “jailbreaking will be impossible in the next version; the vendor says so, it must be true.” • Vendors were dropping jailbreak detection features
  • 9. E VERYBODY ELSE IS DOING IT  A glut of stories of tablet “successes” within the sector  Interest of upper management is piqued  Many of these cause concerns as we dug deeper • Clinical apps developed by students • Device & data management details are either unavailable or very, very sketchy • Uncertainty as to how the then-current hardware and software complies with PHIPA orders for the encryption of mobile devices • Not a lot of sharing in the community about these initiatives
  • 10. E VERYBODY ELSE IS DOING IT  Warning: this slide consists of editorial commentary  Consensus in working group re: mobile app security in healthcare: many talking, few doing, surpassing few doing well
  • 11. T HE BUSINESS HAS A PROBLEM  One of the federated agencies came to the table with a request to tablet-ify one of the key systems in use province wide  Not technically clinical data, though still dealing with PHI  Vendor already had iOS version in the works  New product manager had come on board with mobile solution in portfolio  CIO made mobile management a priority
  • 12. T HE BUSINESS HAS A PROBLEM  The root of the issue in the field was space • Ever been in a hospital ward room? • Would you want to lug a laptop around and try to use it bedside?  Tablet form factor, weight and touch interface offered significant improvements for field staff  Infection protocols taken care of; there were already wraps on the market for tablets • Easier to bring into compliance than traditional notebooks
  • 13. T HE BIG “N O !” REDUX  Serious privacy concerns with respect to integrated cameras • Notebooks issued never had webcams for this reason  Concerns with voice recognition features shipping data hither and yon • Which they do in fact do… sometimes in plain text  “No apps!”
  • 14. T HE BIG “N O !” REDUX  That’s right.  “No apps!”  As a modern mobile device policy  This wasn’t even enforced on the Blackberry fleet • Editorial: not that anyone would’ve wept over losing access to App World
  • 15. T HE BUSINESS WANTS SOLUTIONS  The mobile app project was in flight, with executive approval  The missing piece for privacy/security approval was management of devices • Essentially BES for non-Blackberry devices  MDM became a priority
  • 16. M ANAGEMENT R EQUIREMENTS  Stronger identity for network access  Application deployment  Application control  Device inventory  Enforce encryption  Remote wipe
  • 17. C HALLENGES  Consistency of capability is a problem… for some platforms  Managing Apple is easy  Managing Android will make you pull your hair out and drink blood from human skulls while you plot the annihilation of all life is getting better  Managing Windows Phone 7…  Managing Symbian…
  • 18. C HALLENGES  Why care about all of these platforms?  They all showed up in the web log accessing the mail server  BYOD was, effectively, already happening  There was no “pay to play”  No idea what was on the WLAN…
  • 19. “S OLUTIONS ”  MDM solution put in place as pilot; tied into the mobile app pilot project  Able to offer applications to users based on their role in the organisation  Able to enforce controls on the app version  Solved some issues; revealed more
  • 20. N EW P ROBLEMS  Most MDM solutions are designed after the pattern of configuration management systems  Works to a point  After much discussion with Privacy/Security, their chief requirement was isolated:  How can we manage the data?
  • 21. N EW P ROBLEMS  Realistically speaking, managing the data on traditional endpoints doesn’t really happen  Many solutions exist to work around this issue  Not many of these solutions lend themselves to a decent/usable mobile device experience  There is a need to manage how the applications deployed to mobile devices handle their data
  • 22. N EW P ROBLEMS  Some device management solutions do this to a degree  Coarse-grained solutions  Finer control is not generally available  Hard to audit and attest  This is not necessarily the role of MDM  This should probably be built in behaviour of apps • Especially home grown apps