SlideShare a Scribd company logo
For	additional	articles	and	information	visit	leanmobility.ca	
Did You Issue Smartphones to All of Your Employees? Here are
Two Reasons You Are About to Be Sued
Author: Kyron Baxter, CEO, Lean Mobility
So you’ve deployed your MDM platform of choice. You have an active fleet of iOS and
Android devices. You felt it was fair to offer both BYOD and corporate device programs
to employees. All is well in your organization.
Below are two nightmare scenarios that can easily happen to your organization unless
you are careful.
Please note: If you fear potential legal repercussions because of your corporate
mobile offering, please email info@leanmobility.ca and someone will respond to you
within 24 hours.
If you are having trouble understanding any of the terms used in this article, you should
stop and first read: http://bit.ly/2aZSkwQ
For	additional	articles	and	information	visit	leanmobility.ca	
Scenario	1	-	The	Disgruntled	employee	
One day you get an email from HR that an employee is being terminated and is
disgruntled. You need to follow your standard termination processes with added
urgency. Since the employee’s device is corporately owned you wipe their device’s
data in its entirety, remotely and securely.
A week passes, you get an email from HR and management that you are CC’d on. The
employee lost personal data and is threatening to sue unless you can recover it. You
say to yourself “Huh? Our corporate offering only offers corporate apps. To top it off
how can I recover data from a device that was encrypted?”. The nightmare begins.
You find out that you were deploying a Password Keeper app that saves users’
personal passwords in an encrypted format to their device. The exported data was
encrypted using a proprietary format and so was the device it was stored on. You wave
the white flag and your company’s lawyers draw up a settlement agreement with the
former employee. Word leaks and you’re out a job.
The above story is not a hypothetical situation, I’ve seen it happen. Most companies do
not understand what it means when you offer your employees a piece of technology.
There is an expectation for support. By publishing an app to your corporate app store
you are making yourself liable unless you have covered yourself with a comprehensive
mobile policy.
BYOD devices are even worse. If you have not setup proper access controls and audit
trails, someone can accidentally wipe a BYOD device in your deployment. To make
matters worse Google and Apple have doubled down on security and likely you have
as well. You might have blocked cloud backup services like Dropbox and iCloud. You
also likely have implemented DLP (data loss prevention) software. Your BYOD user
could easily sue you if you accidentally wipe their photos of their children (which I have
also seen happen). Since Android and iOS have increased security measures, the
chances of being able to recover data are next to none.
This can make standard employee termination and device wipe processes a problem.
For	additional	articles	and	information	visit	leanmobility.ca	
Scenario	2	–	Employee	Mobile	Device	Discrimination	
You might have a complex deployment with legacy and even unreleased devices. I
have worked with clients where devices long unsupported by the manufacturer, are still
deployed in the field alongside soon to be released Android phones (very common in
telecoms).
We now live in a world where any discriminatory practice can have your company
trending on social media for days. This is not the exposure your company desires.
Imagine you have a deployment where you came up with a secure configuration
package for your mobile devices. This includes complex passwords, locking down
settings, disabling features such as Siri. For the average user this is fine. Most people
do not realize you need to have Siri enabled to have the phone dictate text to you. In
disabling Siri, you have stopped your visually impaired users from easily being able to
use the iPhone you provided them with.
One day one of your visually impaired users becomes irate with their inability to use Siri
on their company provided iPhone. You have no policy in place to make an exception
for them. You do not want to risk failing an audit. Your company takes very long to
create another group of configuration policies for them that would allow Siri. While
you’re spinning the wheels to try and resolve this issue, the visually impaired user runs
into a single parent who worked at the same company.
The single parent is struggling financially and uses an older BYOD device. They
constantly get locked out of their device because they have trouble typing in the
complex password you forced them to use on their smaller screen. Your support team
is not always the quickest in getting their device password reset. This effects their work
and they ended up getting fired.
The single parent teams up with the unhappy visually impaired user and files a
discrimination lawsuit against your company. The single parent who is now a former
employee, wouldn’t have had such an issue unlocking their iPhone if they could afford
one with a fingerprint scanner like you have provided to some of your other employees.
The two start a campaign on Twitter and generate public outcry. You lose the lawsuit
and end up paying a hefty settlement.
These are nightmare scenarios for any company.
For	additional	articles	and	information	visit	leanmobility.ca	
Solutions:	
1. A comprehensive device usage waiver. The idea is to set expectations and put
responsibilities back onto your end users.
2. Identifying holes in your BYOD, corporate owned and COPE device offerings.
3. Establishing TEM (telecom expense management) and MAM (mobile application
management). Having fair and auditable processes will help your drastically
decrease operating costs and decrease your mobile liabilities
If your company is struggling with these issues reach out to: info@leanmobility.ca
Some will reach out too you promptly to let you know how we can help you.
Also please visit http://www.leanmobility.ca/services to see if any our productized
services suit your needs.

More Related Content

Similar to Did you Issue Smartphones to all of your Employees? Here are Two Reasons you are about to be Sued

Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
IBM Software India
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
James Sutter
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
K Singh
 
Security that works
Security that worksSecurity that works
Security that works
James1280
 
Be Prepared For Byod
Be Prepared For ByodBe Prepared For Byod
Be Prepared For Byod
Nováccent
 
5 Enterprise Mobility Management nightmares
5 Enterprise Mobility Management nightmares5 Enterprise Mobility Management nightmares
5 Enterprise Mobility Management nightmares
Sprint Business
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
Marta Kusinska
 
Cosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of ByodCosac 2013 Legal Aspects of Byod
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
nexxtep
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
CloudUniversity
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
RapidScale
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
Sprint Business
 
BYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of ItBYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of It
Arlette Measures
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
wrathfulplaza6959
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
exultantwarning51
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
Icomm Technologies
 
IS201 docks
IS201 docksIS201 docks
IS201 docks
Lindsay Stuchinsky
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Barry Caplin
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
Rihab Chebbah
 

Similar to Did you Issue Smartphones to all of your Employees? Here are Two Reasons you are about to be Sued (20)

Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Security that works
Security that worksSecurity that works
Security that works
 
Be Prepared For Byod
Be Prepared For ByodBe Prepared For Byod
Be Prepared For Byod
 
5 Enterprise Mobility Management nightmares
5 Enterprise Mobility Management nightmares5 Enterprise Mobility Management nightmares
5 Enterprise Mobility Management nightmares
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Cosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of ByodCosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of Byod
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
BYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of ItBYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of It
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
IS201 docks
IS201 docksIS201 docks
IS201 docks
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

Did you Issue Smartphones to all of your Employees? Here are Two Reasons you are about to be Sued

  • 1. For additional articles and information visit leanmobility.ca Did You Issue Smartphones to All of Your Employees? Here are Two Reasons You Are About to Be Sued Author: Kyron Baxter, CEO, Lean Mobility So you’ve deployed your MDM platform of choice. You have an active fleet of iOS and Android devices. You felt it was fair to offer both BYOD and corporate device programs to employees. All is well in your organization. Below are two nightmare scenarios that can easily happen to your organization unless you are careful. Please note: If you fear potential legal repercussions because of your corporate mobile offering, please email info@leanmobility.ca and someone will respond to you within 24 hours. If you are having trouble understanding any of the terms used in this article, you should stop and first read: http://bit.ly/2aZSkwQ
  • 2. For additional articles and information visit leanmobility.ca Scenario 1 - The Disgruntled employee One day you get an email from HR that an employee is being terminated and is disgruntled. You need to follow your standard termination processes with added urgency. Since the employee’s device is corporately owned you wipe their device’s data in its entirety, remotely and securely. A week passes, you get an email from HR and management that you are CC’d on. The employee lost personal data and is threatening to sue unless you can recover it. You say to yourself “Huh? Our corporate offering only offers corporate apps. To top it off how can I recover data from a device that was encrypted?”. The nightmare begins. You find out that you were deploying a Password Keeper app that saves users’ personal passwords in an encrypted format to their device. The exported data was encrypted using a proprietary format and so was the device it was stored on. You wave the white flag and your company’s lawyers draw up a settlement agreement with the former employee. Word leaks and you’re out a job. The above story is not a hypothetical situation, I’ve seen it happen. Most companies do not understand what it means when you offer your employees a piece of technology. There is an expectation for support. By publishing an app to your corporate app store you are making yourself liable unless you have covered yourself with a comprehensive mobile policy. BYOD devices are even worse. If you have not setup proper access controls and audit trails, someone can accidentally wipe a BYOD device in your deployment. To make matters worse Google and Apple have doubled down on security and likely you have as well. You might have blocked cloud backup services like Dropbox and iCloud. You also likely have implemented DLP (data loss prevention) software. Your BYOD user could easily sue you if you accidentally wipe their photos of their children (which I have also seen happen). Since Android and iOS have increased security measures, the chances of being able to recover data are next to none. This can make standard employee termination and device wipe processes a problem.
  • 3. For additional articles and information visit leanmobility.ca Scenario 2 – Employee Mobile Device Discrimination You might have a complex deployment with legacy and even unreleased devices. I have worked with clients where devices long unsupported by the manufacturer, are still deployed in the field alongside soon to be released Android phones (very common in telecoms). We now live in a world where any discriminatory practice can have your company trending on social media for days. This is not the exposure your company desires. Imagine you have a deployment where you came up with a secure configuration package for your mobile devices. This includes complex passwords, locking down settings, disabling features such as Siri. For the average user this is fine. Most people do not realize you need to have Siri enabled to have the phone dictate text to you. In disabling Siri, you have stopped your visually impaired users from easily being able to use the iPhone you provided them with. One day one of your visually impaired users becomes irate with their inability to use Siri on their company provided iPhone. You have no policy in place to make an exception for them. You do not want to risk failing an audit. Your company takes very long to create another group of configuration policies for them that would allow Siri. While you’re spinning the wheels to try and resolve this issue, the visually impaired user runs into a single parent who worked at the same company. The single parent is struggling financially and uses an older BYOD device. They constantly get locked out of their device because they have trouble typing in the complex password you forced them to use on their smaller screen. Your support team is not always the quickest in getting their device password reset. This effects their work and they ended up getting fired. The single parent teams up with the unhappy visually impaired user and files a discrimination lawsuit against your company. The single parent who is now a former employee, wouldn’t have had such an issue unlocking their iPhone if they could afford one with a fingerprint scanner like you have provided to some of your other employees. The two start a campaign on Twitter and generate public outcry. You lose the lawsuit and end up paying a hefty settlement. These are nightmare scenarios for any company.
  • 4. For additional articles and information visit leanmobility.ca Solutions: 1. A comprehensive device usage waiver. The idea is to set expectations and put responsibilities back onto your end users. 2. Identifying holes in your BYOD, corporate owned and COPE device offerings. 3. Establishing TEM (telecom expense management) and MAM (mobile application management). Having fair and auditable processes will help your drastically decrease operating costs and decrease your mobile liabilities If your company is struggling with these issues reach out to: info@leanmobility.ca Some will reach out too you promptly to let you know how we can help you. Also please visit http://www.leanmobility.ca/services to see if any our productized services suit your needs.