SlideShare a Scribd company logo
BYOD: Security 
Together 
Andrew Cormack 
Chief Regulatory Adviser, Janet 
#Janet_LegReg
A Cautionary Tale
A Cautionary Tale 
• Is this about BYOD? 
– User owned device 
– Uncertain configuration 
– Unsafe results for data 
• Just less shiny!
A Cautionary Tale 
• Is this about BYOD? 
– User owned device 
– Uncertain configuration 
– Unsafe results for data 
• Just less shiny! 
• And (we’re on audio): could it happen to you?
Opportunity: Your Device, Our Data 
• Same risks to both of us 
– Personal risk may even be greater than professional!
Opportunity: Your Device, Our Data 
• Same risks to both of us 
– Personal risk may even be greater than professional! 
• Same behaviour required to reduce those risks 
– Work out together what that is
Opportunity: Your Device, Our Data 
• Same risks to both of us 
– Personal risk may even be greater than professional! 
• Same behaviour required to reduce those risks 
– Work out together what that is 
• What that means 
– Policy compliance => Self interest 
– Safe at work/risky at home => Safer everywhere
Let’s discuss how to do... 
• Information separation 
• Remote wiping 
• Device location 
• Device security 
• Information backup
Information Separation
Information Separation 
Storage 
Policies 
Technology 
Behaviour
Information Separation 
Separate 
Storage 
Policies 
Technology 
Behaviour
Remote Wiping 
Separate 
Storage 
Policies 
Technology 
Behaviour 
When? 
Who? 
How? 
What?
Remote Wiping 
Wipe 
When? 
Who? 
How? 
What? 
Separate 
Storage 
Policies 
Technology 
Behaviour
Device Location 
Wipe 
When? 
Who? 
How? 
What? 
Who? 
When? 
How? 
Separate 
Storage 
Policies 
Technology 
Behaviour
Device Location 
Locate 
Who? 
When? 
How? 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Wipe 
When? 
Who? 
How? 
What?
Device Security 
Locate 
Who? 
When? 
How? 
Protect 
Monitor 
Download 
Configure 
Inspect 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Wipe 
When? 
Who? 
How? 
What?
Device Security 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Wipe 
When? 
Who? 
How? 
What? 
Locate 
Who? 
When? 
How?
Information Backup 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect 
How? 
Where? 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Wipe 
When? 
Who? 
How? 
What? 
Locate 
Who? 
When? 
How?
BYOD Policy? 
Backup 
How? 
Where? 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Wipe 
When? 
Who? 
How? 
What? 
Locate 
Who? 
When? 
How? 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect
Who Sets Policy? 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect 
Backup 
How? 
Where? 
Locate 
Who? 
When? 
How? 
Wipe 
When? 
Who? 
How? 
What?
Discuss/Agree 
Balance Policy and Access 
Who Sets Policy? 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect 
Backup 
How? 
Where? 
Locate 
Who? 
When? 
How? 
Wipe 
When? 
Who? 
How? 
What?
Discuss/Agree 
Balance Policy and Access 
Who Sets Policy? 
Organisation 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect 
Backup 
How? 
Where? 
Locate 
Who? 
When? 
How? 
Wipe 
When? 
Who? 
How? 
What?
Who Sets Policy? Device Owner 
Discuss/Agree 
Balance Policy and Access 
Organisation 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect 
Backup 
How? 
Where? 
Locate 
Who? 
When? 
How? 
Wipe 
When? 
Who? 
How? 
What?
Who Sets Policy? Device Owner 
Discuss/Agree 
Balance Policy and Access 
Organisation 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect 
Backup 
How? 
Where? 
Locate 
Who? 
When? 
How? 
Wipe 
When? 
Who? 
How? 
What?
Questions? 
Janet, Lumen House 
Library Avenue, Harwell Oxford 
Didcot, Oxfordshire 
t: +44 (0) 1235 822200 
f: +44 (0) 1235 822399 
e: Andrew.Cormack@ja.net 
b: https://community.ja.net/blogs/regulatory-developments

More Related Content

Viewers also liked

Preparing for internet safety day and beyond
Preparing for internet safety day and beyondPreparing for internet safety day and beyond
Preparing for internet safety day and beyond
Jisc
 
Hertford Regional College: staying safe online
Hertford Regional College: staying safe onlineHertford Regional College: staying safe online
Hertford Regional College: staying safe online
Jisc
 
Jisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learnersJisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learners
Jisc
 
Jisc legal hot e-safety topics
Jisc legal hot e-safety topics Jisc legal hot e-safety topics
Jisc legal hot e-safety topics
Jisc
 
Epping forest college interactive exhibition
Epping forest college interactive exhibitionEpping forest college interactive exhibition
Epping forest college interactive exhibition
Jisc
 
Using CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resourcesUsing CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resources
Jisc
 
St Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorialSt Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorial
Jisc
 
MidKent College: internet safety day
MidKent College: internet safety dayMidKent College: internet safety day
MidKent College: internet safety day
Jisc
 
South West College e-safety awareness
South West College e-safety awarenessSouth West College e-safety awareness
South West College e-safety awareness
Jisc
 
Weston college: approaching e-safety
Weston college: approaching e-safetyWeston college: approaching e-safety
Weston college: approaching e-safety
Jisc
 

Viewers also liked (10)

Preparing for internet safety day and beyond
Preparing for internet safety day and beyondPreparing for internet safety day and beyond
Preparing for internet safety day and beyond
 
Hertford Regional College: staying safe online
Hertford Regional College: staying safe onlineHertford Regional College: staying safe online
Hertford Regional College: staying safe online
 
Jisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learnersJisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learners
 
Jisc legal hot e-safety topics
Jisc legal hot e-safety topics Jisc legal hot e-safety topics
Jisc legal hot e-safety topics
 
Epping forest college interactive exhibition
Epping forest college interactive exhibitionEpping forest college interactive exhibition
Epping forest college interactive exhibition
 
Using CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resourcesUsing CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resources
 
St Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorialSt Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorial
 
MidKent College: internet safety day
MidKent College: internet safety dayMidKent College: internet safety day
MidKent College: internet safety day
 
South West College e-safety awareness
South West College e-safety awarenessSouth West College e-safety awareness
South West College e-safety awareness
 
Weston college: approaching e-safety
Weston college: approaching e-safetyWeston college: approaching e-safety
Weston college: approaching e-safety
 

Similar to Janet: bring your own device

A Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for NonprofitsA Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for Nonprofits
TechSoup
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
Evan Francen
 
Data security
Data securityData security
Data security
Jimmy Edwards
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
vicenteDiaz_KL
 
Windows Incident Response is hard, but doesn't have to be
Windows Incident Response is hard, but doesn't have to beWindows Incident Response is hard, but doesn't have to be
Windows Incident Response is hard, but doesn't have to be
Michael Gough
 
Sexy defense
Sexy defenseSexy defense
Sexy defense
Iftach Ian Amit
 
Information security consciousness
Information security consciousnessInformation security consciousness
Information security consciousness
Ciarán Mc Mahon
 
WordPress Security: Beyond The Plugin
WordPress Security:  Beyond The PluginWordPress Security:  Beyond The Plugin
WordPress Security: Beyond The Plugin
Stacy Clements
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
Amazon Web Services
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
John Stauffacher
 
Truth and Consequences
Truth and ConsequencesTruth and Consequences
Truth and Consequences
Mohammed Almeshekah
 
sanfranAIG3
sanfranAIG3sanfranAIG3
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Steve Werby
 
Craft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionCraft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security Precognition
Aaron Rinehart
 
Ops Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WayOps Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the Way
SeniorStoryteller
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
Ernest Staats
 
Running with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needsRunning with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needs
Michael Scheidell
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
Blake Carver
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
Jose L. Quiñones-Borrero
 
Monitorama 2017 - Who Watches the Watchers?
Monitorama 2017 - Who Watches the Watchers?Monitorama 2017 - Who Watches the Watchers?
Monitorama 2017 - Who Watches the Watchers?
brantstrand
 

Similar to Janet: bring your own device (20)

A Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for NonprofitsA Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for Nonprofits
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Data security
Data securityData security
Data security
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Windows Incident Response is hard, but doesn't have to be
Windows Incident Response is hard, but doesn't have to beWindows Incident Response is hard, but doesn't have to be
Windows Incident Response is hard, but doesn't have to be
 
Sexy defense
Sexy defenseSexy defense
Sexy defense
 
Information security consciousness
Information security consciousnessInformation security consciousness
Information security consciousness
 
WordPress Security: Beyond The Plugin
WordPress Security:  Beyond The PluginWordPress Security:  Beyond The Plugin
WordPress Security: Beyond The Plugin
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Truth and Consequences
Truth and ConsequencesTruth and Consequences
Truth and Consequences
 
sanfranAIG3
sanfranAIG3sanfranAIG3
sanfranAIG3
 
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
 
Craft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionCraft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security Precognition
 
Ops Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WayOps Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the Way
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Running with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needsRunning with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needs
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
Monitorama 2017 - Who Watches the Watchers?
Monitorama 2017 - Who Watches the Watchers?Monitorama 2017 - Who Watches the Watchers?
Monitorama 2017 - Who Watches the Watchers?
 

More from Jisc

Adobe Express Engagement Webinar (Delegate).pptx
Adobe Express Engagement Webinar (Delegate).pptxAdobe Express Engagement Webinar (Delegate).pptx
Adobe Express Engagement Webinar (Delegate).pptx
Jisc
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Jisc's value to HE: the University of Sheffield
Jisc's value to HE: the University of SheffieldJisc's value to HE: the University of Sheffield
Jisc's value to HE: the University of Sheffield
Jisc
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
Jisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
Jisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
Jisc
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
Jisc
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
Jisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
Jisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
Jisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
Jisc
 

More from Jisc (20)

Adobe Express Engagement Webinar (Delegate).pptx
Adobe Express Engagement Webinar (Delegate).pptxAdobe Express Engagement Webinar (Delegate).pptx
Adobe Express Engagement Webinar (Delegate).pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Jisc's value to HE: the University of Sheffield
Jisc's value to HE: the University of SheffieldJisc's value to HE: the University of Sheffield
Jisc's value to HE: the University of Sheffield
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 

Recently uploaded

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 

Janet: bring your own device

  • 1. BYOD: Security Together Andrew Cormack Chief Regulatory Adviser, Janet #Janet_LegReg
  • 3. A Cautionary Tale • Is this about BYOD? – User owned device – Uncertain configuration – Unsafe results for data • Just less shiny!
  • 4. A Cautionary Tale • Is this about BYOD? – User owned device – Uncertain configuration – Unsafe results for data • Just less shiny! • And (we’re on audio): could it happen to you?
  • 5. Opportunity: Your Device, Our Data • Same risks to both of us – Personal risk may even be greater than professional!
  • 6. Opportunity: Your Device, Our Data • Same risks to both of us – Personal risk may even be greater than professional! • Same behaviour required to reduce those risks – Work out together what that is
  • 7. Opportunity: Your Device, Our Data • Same risks to both of us – Personal risk may even be greater than professional! • Same behaviour required to reduce those risks – Work out together what that is • What that means – Policy compliance => Self interest – Safe at work/risky at home => Safer everywhere
  • 8. Let’s discuss how to do... • Information separation • Remote wiping • Device location • Device security • Information backup
  • 10. Information Separation Storage Policies Technology Behaviour
  • 11. Information Separation Separate Storage Policies Technology Behaviour
  • 12. Remote Wiping Separate Storage Policies Technology Behaviour When? Who? How? What?
  • 13. Remote Wiping Wipe When? Who? How? What? Separate Storage Policies Technology Behaviour
  • 14. Device Location Wipe When? Who? How? What? Who? When? How? Separate Storage Policies Technology Behaviour
  • 15. Device Location Locate Who? When? How? Separate Storage Policies Technology Behaviour Wipe When? Who? How? What?
  • 16. Device Security Locate Who? When? How? Protect Monitor Download Configure Inspect Separate Storage Policies Technology Behaviour Wipe When? Who? How? What?
  • 17. Device Security Secure Protect Monitor Download Configure Inspect Separate Storage Policies Technology Behaviour Wipe When? Who? How? What? Locate Who? When? How?
  • 18. Information Backup Secure Protect Monitor Download Configure Inspect How? Where? Separate Storage Policies Technology Behaviour Wipe When? Who? How? What? Locate Who? When? How?
  • 19. BYOD Policy? Backup How? Where? Separate Storage Policies Technology Behaviour Wipe When? Who? How? What? Locate Who? When? How? Secure Protect Monitor Download Configure Inspect
  • 20. Who Sets Policy? Separate Storage Policies Technology Behaviour Secure Protect Monitor Download Configure Inspect Backup How? Where? Locate Who? When? How? Wipe When? Who? How? What?
  • 21. Discuss/Agree Balance Policy and Access Who Sets Policy? Separate Storage Policies Technology Behaviour Secure Protect Monitor Download Configure Inspect Backup How? Where? Locate Who? When? How? Wipe When? Who? How? What?
  • 22. Discuss/Agree Balance Policy and Access Who Sets Policy? Organisation Separate Storage Policies Technology Behaviour Secure Protect Monitor Download Configure Inspect Backup How? Where? Locate Who? When? How? Wipe When? Who? How? What?
  • 23. Who Sets Policy? Device Owner Discuss/Agree Balance Policy and Access Organisation Separate Storage Policies Technology Behaviour Secure Protect Monitor Download Configure Inspect Backup How? Where? Locate Who? When? How? Wipe When? Who? How? What?
  • 24. Who Sets Policy? Device Owner Discuss/Agree Balance Policy and Access Organisation Separate Storage Policies Technology Behaviour Secure Protect Monitor Download Configure Inspect Backup How? Where? Locate Who? When? How? Wipe When? Who? How? What?
  • 25. Questions? Janet, Lumen House Library Avenue, Harwell Oxford Didcot, Oxfordshire t: +44 (0) 1235 822200 f: +44 (0) 1235 822399 e: Andrew.Cormack@ja.net b: https://community.ja.net/blogs/regulatory-developments