SlideShare a Scribd company logo
1 of 17
What's on your E RADAR?
Using personally-owned devices at work
Will Roebuck
Founder and CEO, E RADAR
4 Themes
● Data Access
● What data, when, how and by whom?
● Device Risk
● Abuse and misuse, malware, by-passing in house security
● Management Risk
● Monitoring threats, responding to alerts
● Evaluating new operating systems and devices
● Awareness
● Staff policies and procedures
Important Points
● The 'bottom line'
● Corporate and personal liability
● Digital evidence
● Misuse of personal devices
● Monitoring networked communications
● Workers and personal data
● Stored networked communications
● Implementing a policy
The 'Bottom Line'
● Enterprise, innovation and competition
● Balancing supply and demand with risk management
● Deploying resources carefully
● Smarter business management
● Developing and using the right people skills
● Improving business processes; supply and demand chains
● Opening up new markets
● Investment in enabling technology
● Enabling laws and regulations, standards
Corporate and personal liability
● Legal and regulatory requirements
● Registering, filing and retaining records and information
– e.g. Company Annual Returns / VAT Returns
– e.g. Notifying under Data Protection / WEEE record retention
● Vicarious liability
● Duty of 'reasonable' care towards employee
● Prevent improper or illegal activities over business systems
● Personal liability
● Directors failing to undertake duties implied by law or as
additional duties in their contract
Evidence – basic concepts
● Evidence (in legal terms) is the way that a fact is proved or
disproved in a court or tribunal.
● Law of evidence regulates what is admissible in a court of
law or tribunal
● An organisation may need evidence for
● Dealing with claims of unfair dismissal of employee
● Proving IPR on invention
● Proving existence of agreement in disagreement with a
customer
Types of evidence
● Oral testimony
● Real evidence in material form (e.g. documents)
● Primary = signed original contract
● Secondary = unsigned draft of that contract
● Electronic evidence (primary or secondary)
● Hearsay
● Evidence given by a person as to what another person said
● Less reliable than first person account but admissible
● Rules much tighter in criminal cases
Burden and standard of proof
● Civil cases
● Burden of proof is with claimant
● Defendants may also need to prove something in case to
rebut accusations
● Standard of proof is 'balance of probabilities'
● Criminal Cases
● Burden of proof is with prosecution
● 'Beyond reasonable doubt'
Digital evidence
● Evidence in electronic format is admissible
● Electronic Communications Act 2000
● Civil Evidence Act / Youth Justice and Criminal Evidence Act
● Documents can be copied onto own personal devices
● Technology neutral
Admissibility, weight and credibility
● Digital evidence may be legally acceptable but may not be
admissible.
● Admissible document must be sufficiently relevant
● Court must decide and may give different weight to primary
or secondary evidence
● In civil cases, evidence usually presumed admissible
without further proof
● British Standards Code for Legal Admissibility and
Evidential Weight of Information Stored Electronically.
Misuse of Personal Devices
● Abuse and misuse (Illegal, illicit or wrong)
● Defamatory remarks
● Breach of confidentiality
● Using and abusing copyright without permission
● Negligence in sending viruses to other business
● Sexual or racial harassment
● Criminal Offences
● e.g. downloading child pornography
● Other illegal images
Monitoring Communications
● Right to privacy – even at work
● Regulation of Investigatory Powers Act 2000
● Lawful Business Practice Regulations 2000
● Inform monitoring for lawful business purposes
● Quality, training and security
● How do you 'monitor' remote workers?
● Blanket monitoring of employees not acceptable
● Must be justified
● Other alternatives?
Data protection
● 8 data protection principles
● Principle 7 – adequate security measures
● Principle 8 – international transfers
● Cloud computing
● Where is personal data
● Information Commissioner's Guidance
● Sensitive personal data
● Encryption
Retention, deletion and retrieval
● Organisations must have evidence to rely upon it!
● Information management policy covering
● Retention, access and exchange (including security),
deletion and retrieval
● Why a policy?
● Business (cost, time and risk management)
● Legal (e.g. accounting records = 6 years, criminal penalties)
● Regulatory (FSA Rules, Food Standards etc)
Key observations
● 3 important elements
● Managing IPR including data, information and proprietary
software
● Controlling worker behaviour
● Security
● Appropriate policies
● Linked to employment contract to enable disciplinary
● Otherwise just a management policy
● Don't panic – get on with your business!
About eradar.eu™
● Championing enterprise and the online economy
● Promote enabling legal and regulatory environment
● Business networking and compliance hub
● Membership Services (over 400 briefing papers/articles)
● Referencing
● E-contracting Legal Group
● Premium tracking and scrutiny
● Audits and training
Thank you!
will@eradar.eu
http://www.eradar.eu

More Related Content

What's hot

Presentation for the LSEC GDPR event - 20171130
Presentation for the LSEC GDPR event - 20171130Presentation for the LSEC GDPR event - 20171130
Presentation for the LSEC GDPR event - 20171130Tommy Vandepitte
 
EU Privacy Laws and Start-Ups
EU Privacy Laws and Start-UpsEU Privacy Laws and Start-Ups
EU Privacy Laws and Start-UpsExove
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCompute Forensics
 
Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...WhitmeyerTuffin
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesNapier University
 
Maximizing and protecting ip
Maximizing and protecting ipMaximizing and protecting ip
Maximizing and protecting ipeophiladelphia
 
Elise Bravington CV 2016 1
Elise Bravington CV 2016 1Elise Bravington CV 2016 1
Elise Bravington CV 2016 1Elise Bravington
 
Gregory landing pm ccna 2
Gregory landing pm ccna 2Gregory landing pm ccna 2
Gregory landing pm ccna 2Gregory Landing
 
Tax Preparers Presentation
Tax Preparers PresentationTax Preparers Presentation
Tax Preparers PresentationDoug Landoll
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?Christiana Kozakou
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerceHimanshu Pathak
 

What's hot (19)

Presentation for the LSEC GDPR event - 20171130
Presentation for the LSEC GDPR event - 20171130Presentation for the LSEC GDPR event - 20171130
Presentation for the LSEC GDPR event - 20171130
 
EU Privacy Laws and Start-Ups
EU Privacy Laws and Start-UpsEU Privacy Laws and Start-Ups
EU Privacy Laws and Start-Ups
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Tech Matrix 20080523
Tech Matrix 20080523Tech Matrix 20080523
Tech Matrix 20080523
 
CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-Services
 
Cyber security
Cyber securityCyber security
Cyber security
 
Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
Maximizing and protecting ip
Maximizing and protecting ipMaximizing and protecting ip
Maximizing and protecting ip
 
Elise Bravington CV 2016 1
Elise Bravington CV 2016 1Elise Bravington CV 2016 1
Elise Bravington CV 2016 1
 
#7 Insurance
#7 Insurance#7 Insurance
#7 Insurance
 
Hackers
HackersHackers
Hackers
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Gregory landing pm ccna 2
Gregory landing pm ccna 2Gregory landing pm ccna 2
Gregory landing pm ccna 2
 
Tax Preparers Presentation
Tax Preparers PresentationTax Preparers Presentation
Tax Preparers Presentation
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?
 
Personal Data Protection Law
Personal Data Protection LawPersonal Data Protection Law
Personal Data Protection Law
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
 

Viewers also liked

Euras news file17968
Euras news file17968Euras news file17968
Euras news file17968Olesya Popik
 
The sammut’s sustainable housepower
The sammut’s sustainable housepowerThe sammut’s sustainable housepower
The sammut’s sustainable housepowerlsammut
 
Historic inevitability of social everything
Historic inevitability of social everythingHistoric inevitability of social everything
Historic inevitability of social everythingTaleo Research
 

Viewers also liked (6)

Euras news file17968
Euras news file17968Euras news file17968
Euras news file17968
 
The sammut’s sustainable housepower
The sammut’s sustainable housepowerThe sammut’s sustainable housepower
The sammut’s sustainable housepower
 
RK Memoirs
RK MemoirsRK Memoirs
RK Memoirs
 
1º ano
1º ano1º ano
1º ano
 
121poug
121poug121poug
121poug
 
Historic inevitability of social everything
Historic inevitability of social everythingHistoric inevitability of social everything
Historic inevitability of social everything
 

Similar to 05 10-2011 BOYD - Bring Your Own Device

Governance, legal compliance and risk across the online economy
Governance, legal compliance and risk across the online economyGovernance, legal compliance and risk across the online economy
Governance, legal compliance and risk across the online economyERADAR
 
IISP NW branch meeting 15 nov 2012 security through governance, compliance…
IISP NW branch meeting 15 nov 2012 security through governance, compliance…IISP NW branch meeting 15 nov 2012 security through governance, compliance…
IISP NW branch meeting 15 nov 2012 security through governance, compliance…Gurbir Singh
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceCobweb
 
Prep your app for gdpr compliance
Prep your app for gdpr compliancePrep your app for gdpr compliance
Prep your app for gdpr complianceAsanka Nissanka
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Burton Lee
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Software Integrity Group
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldE Radar
 
Understanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of ComplianceUnderstanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of ComplianceVeridium
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy IntroductionNiclasGranqvist
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startupsEkoInnovationCentre
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
Game changing legislation
Game changing legislationGame changing legislation
Game changing legislationIRIS
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
Data breaches, privacy programs and what will change for processors
Data breaches, privacy programs and what will change for processorsData breaches, privacy programs and what will change for processors
Data breaches, privacy programs and what will change for processorsExove
 
Consumer representative
Consumer representativeConsumer representative
Consumer representativeCA
 
Guernsey Data Protection Legislation
Guernsey Data Protection LegislationGuernsey Data Protection Legislation
Guernsey Data Protection Legislationjonbarclay
 

Similar to 05 10-2011 BOYD - Bring Your Own Device (20)

Governance, legal compliance and risk across the online economy
Governance, legal compliance and risk across the online economyGovernance, legal compliance and risk across the online economy
Governance, legal compliance and risk across the online economy
 
IISP NW branch meeting 15 nov 2012 security through governance, compliance…
IISP NW branch meeting 15 nov 2012 security through governance, compliance…IISP NW branch meeting 15 nov 2012 security through governance, compliance…
IISP NW branch meeting 15 nov 2012 security through governance, compliance…
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
Prep your app for gdpr compliance
Prep your app for gdpr compliancePrep your app for gdpr compliance
Prep your app for gdpr compliance
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 
Living with gdpr
Living with gdprLiving with gdpr
Living with gdpr
 
Understanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of ComplianceUnderstanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of Compliance
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startups
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Game changing legislation
Game changing legislationGame changing legislation
Game changing legislation
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Data breaches, privacy programs and what will change for processors
Data breaches, privacy programs and what will change for processorsData breaches, privacy programs and what will change for processors
Data breaches, privacy programs and what will change for processors
 
GDPR: What does it mean for your business?
GDPR: What does it mean for your business?GDPR: What does it mean for your business?
GDPR: What does it mean for your business?
 
Consumer representative
Consumer representativeConsumer representative
Consumer representative
 
What does GDPR mean for your business?
What does GDPR mean for your business?What does GDPR mean for your business?
What does GDPR mean for your business?
 
Guernsey Data Protection Legislation
Guernsey Data Protection LegislationGuernsey Data Protection Legislation
Guernsey Data Protection Legislation
 

More from E Radar

Trust in Mobile Computing
Trust in Mobile ComputingTrust in Mobile Computing
Trust in Mobile ComputingE Radar
 
Mobile Digital Evidence And Forensics
Mobile Digital Evidence And ForensicsMobile Digital Evidence And Forensics
Mobile Digital Evidence And ForensicsE Radar
 
Impact of Mobile on Data Compliance
Impact of Mobile on Data ComplianceImpact of Mobile on Data Compliance
Impact of Mobile on Data ComplianceE Radar
 
Cyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEsCyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEsE Radar
 
Securing Mobile Payments
Securing Mobile PaymentsSecuring Mobile Payments
Securing Mobile PaymentsE Radar
 
Mobile Digital Evidence
Mobile Digital EvidenceMobile Digital Evidence
Mobile Digital EvidenceE Radar
 

More from E Radar (6)

Trust in Mobile Computing
Trust in Mobile ComputingTrust in Mobile Computing
Trust in Mobile Computing
 
Mobile Digital Evidence And Forensics
Mobile Digital Evidence And ForensicsMobile Digital Evidence And Forensics
Mobile Digital Evidence And Forensics
 
Impact of Mobile on Data Compliance
Impact of Mobile on Data ComplianceImpact of Mobile on Data Compliance
Impact of Mobile on Data Compliance
 
Cyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEsCyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEs
 
Securing Mobile Payments
Securing Mobile PaymentsSecuring Mobile Payments
Securing Mobile Payments
 
Mobile Digital Evidence
Mobile Digital EvidenceMobile Digital Evidence
Mobile Digital Evidence
 

Recently uploaded

Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 

Recently uploaded (20)

Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 

05 10-2011 BOYD - Bring Your Own Device

  • 1. What's on your E RADAR? Using personally-owned devices at work Will Roebuck Founder and CEO, E RADAR
  • 2. 4 Themes ● Data Access ● What data, when, how and by whom? ● Device Risk ● Abuse and misuse, malware, by-passing in house security ● Management Risk ● Monitoring threats, responding to alerts ● Evaluating new operating systems and devices ● Awareness ● Staff policies and procedures
  • 3. Important Points ● The 'bottom line' ● Corporate and personal liability ● Digital evidence ● Misuse of personal devices ● Monitoring networked communications ● Workers and personal data ● Stored networked communications ● Implementing a policy
  • 4. The 'Bottom Line' ● Enterprise, innovation and competition ● Balancing supply and demand with risk management ● Deploying resources carefully ● Smarter business management ● Developing and using the right people skills ● Improving business processes; supply and demand chains ● Opening up new markets ● Investment in enabling technology ● Enabling laws and regulations, standards
  • 5. Corporate and personal liability ● Legal and regulatory requirements ● Registering, filing and retaining records and information – e.g. Company Annual Returns / VAT Returns – e.g. Notifying under Data Protection / WEEE record retention ● Vicarious liability ● Duty of 'reasonable' care towards employee ● Prevent improper or illegal activities over business systems ● Personal liability ● Directors failing to undertake duties implied by law or as additional duties in their contract
  • 6. Evidence – basic concepts ● Evidence (in legal terms) is the way that a fact is proved or disproved in a court or tribunal. ● Law of evidence regulates what is admissible in a court of law or tribunal ● An organisation may need evidence for ● Dealing with claims of unfair dismissal of employee ● Proving IPR on invention ● Proving existence of agreement in disagreement with a customer
  • 7. Types of evidence ● Oral testimony ● Real evidence in material form (e.g. documents) ● Primary = signed original contract ● Secondary = unsigned draft of that contract ● Electronic evidence (primary or secondary) ● Hearsay ● Evidence given by a person as to what another person said ● Less reliable than first person account but admissible ● Rules much tighter in criminal cases
  • 8. Burden and standard of proof ● Civil cases ● Burden of proof is with claimant ● Defendants may also need to prove something in case to rebut accusations ● Standard of proof is 'balance of probabilities' ● Criminal Cases ● Burden of proof is with prosecution ● 'Beyond reasonable doubt'
  • 9. Digital evidence ● Evidence in electronic format is admissible ● Electronic Communications Act 2000 ● Civil Evidence Act / Youth Justice and Criminal Evidence Act ● Documents can be copied onto own personal devices ● Technology neutral
  • 10. Admissibility, weight and credibility ● Digital evidence may be legally acceptable but may not be admissible. ● Admissible document must be sufficiently relevant ● Court must decide and may give different weight to primary or secondary evidence ● In civil cases, evidence usually presumed admissible without further proof ● British Standards Code for Legal Admissibility and Evidential Weight of Information Stored Electronically.
  • 11. Misuse of Personal Devices ● Abuse and misuse (Illegal, illicit or wrong) ● Defamatory remarks ● Breach of confidentiality ● Using and abusing copyright without permission ● Negligence in sending viruses to other business ● Sexual or racial harassment ● Criminal Offences ● e.g. downloading child pornography ● Other illegal images
  • 12. Monitoring Communications ● Right to privacy – even at work ● Regulation of Investigatory Powers Act 2000 ● Lawful Business Practice Regulations 2000 ● Inform monitoring for lawful business purposes ● Quality, training and security ● How do you 'monitor' remote workers? ● Blanket monitoring of employees not acceptable ● Must be justified ● Other alternatives?
  • 13. Data protection ● 8 data protection principles ● Principle 7 – adequate security measures ● Principle 8 – international transfers ● Cloud computing ● Where is personal data ● Information Commissioner's Guidance ● Sensitive personal data ● Encryption
  • 14. Retention, deletion and retrieval ● Organisations must have evidence to rely upon it! ● Information management policy covering ● Retention, access and exchange (including security), deletion and retrieval ● Why a policy? ● Business (cost, time and risk management) ● Legal (e.g. accounting records = 6 years, criminal penalties) ● Regulatory (FSA Rules, Food Standards etc)
  • 15. Key observations ● 3 important elements ● Managing IPR including data, information and proprietary software ● Controlling worker behaviour ● Security ● Appropriate policies ● Linked to employment contract to enable disciplinary ● Otherwise just a management policy ● Don't panic – get on with your business!
  • 16. About eradar.eu™ ● Championing enterprise and the online economy ● Promote enabling legal and regulatory environment ● Business networking and compliance hub ● Membership Services (over 400 briefing papers/articles) ● Referencing ● E-contracting Legal Group ● Premium tracking and scrutiny ● Audits and training