The document discusses best practices for implementing a BYOD (bring your own device) policy in the workplace. It addresses key issues like information separation, remote wiping of devices, device location tracking, device security measures, and data backup. The document emphasizes that both the organization and individual device owners must work together to determine appropriate policies to balance access with security and reduce risks to both personal and professional data that may exist on dual-use devices.
3. A Cautionary Tale
• Is this about BYOD?
– User owned device
– Uncertain configuration
– Unsafe results for data
• Just less shiny!
4. A Cautionary Tale
• Is this about BYOD?
– User owned device
– Uncertain configuration
– Unsafe results for data
• Just less shiny!
• And (we’re on audio): could it happen to you?
5. Opportunity: Your Device, Our Data
• Same risks to both of us
– Personal risk may even be greater than professional!
6. Opportunity: Your Device, Our Data
• Same risks to both of us
– Personal risk may even be greater than professional!
• Same behaviour required to reduce those risks
– Work out together what that is
7. Opportunity: Your Device, Our Data
• Same risks to both of us
– Personal risk may even be greater than professional!
• Same behaviour required to reduce those risks
– Work out together what that is
• What that means
– Policy compliance => Self interest
– Safe at work/risky at home => Safer everywhere
8. Let’s discuss how to do...
• Information separation
• Remote wiping
• Device location
• Device security
• Information backup