Home

How To Decommission BYOD Mobile Devices

Comments | Esther Shein, BYTE | December 13, 2012 08:35 AM

Category: Tablets, Smartphones

Mobile connected devices are the most sought after gifts this holiday season — even beating out money, peace and happiness — according to a recent study by the Consumer Electronics Association. But in the midst of the unmitigated joy the latest tablets and smartphones will bring comes a message of caution: when it comes time for out with the old, in with the new, BYOD workers need to deal with the data still sitting on discarded devices.

Right now they don't. MDM provider Fiberlink teamed up with Harris Interview to ask 2,243 workers what they had done with their previous mobile device when they upgraded to something new. Fifty eight percent of respondents said they kept the device, although inactive; 16 percent had the data professionally wiped; 13 percent turned the device over to the service provider; 11 percent donated the device, gave it away or threw it in the trash and five percent had the device securely destroyed. Most notable was that 68 percent of employees said they did not have their devices professionally wiped or securely destroyed when swapping them out for newer technology, according to Fiberlink.


The rapid pace of product upgrades in the device market has created new markets for people to sell their old device. Click here to read about three companies in this business.

"Whatever apps and information they have on there is still on there — that's the concerning part," says David Lingenfelter, information security officer at Fiberlink. "The risk varies based on what you end up doing with the device. If you give a used device to your kid, chances are they won't do anything, but if you turn it into your carrier... they'll check to see if there's personal information on there. That's human nature; it's how people think."

He says it's really incumbent on the company, as much as the employee, to ensure that they know what to do when they get a new device for use at work.

"It's an education thing," Lingenfelter says, noting that people tend to forget about the specifics of a corporate BYOD policy, especially if it was implemented a long time ago. "They need to let employees know what to do with device... and the company should wipe it." In some cases, however, there is no policy. Seventy-eight percent of companies reported having some type of policy that specifically addresses mobile devices, according to a study by the Cloud Security Alliance. "With the majority of 69 percent having a low maturity of policy — from non-existent to partially addressing mobile device security and privacy controls — it seems most organizations are still wrestling with some of the tougher privacy directives of BYOD owners and organizational data security on BYOD," the study noted.

If there is a BYOD policy in place, the issue of discarding corporate data will depend on how the company set up the policy; if the employee turns off the carrier signal, the MDM agent on the device may alert IT, says Lingenfelter. In such a case, IT can contact the end user to asked what happened to the device and what they are planning to do with it. But in other situations, the employee will not know what to do and may just end up turning off the device and leaving potentially sensitive data on it.

The bottom line, says Lingenfelter, is the company needs to have a policy, someone to enforce that policy and make sure users are aware of what the policy says.

Fiberlink has issued a four-step process for deactivating a device:

  1. Notify Your IT Department — Once you receive a new device and want to use it for your company's BYOD program, send your IT department a note and let them know you will be swapping devices.
  2. Transfer Corporate Materials to Your New Device — Have your IT department quickly transfer all corporate materials from the old device to the new device through the MDM platform. If you don't have an MDM solution in place, ask your IT department to assist with transferring data, although this is more complicated and could take longer.
  3. Extract Personal Data from Your Devicee — Once your corporate data has been transferred to the new device, remove and save all personal files. This can be accomplished with the native tools and back-up services of the operative system or the manufacture (e.g., Apple's iCloud or Google Drive).
  4. Erase all Remaining Personal and Corporate Data — Fully decommission the old device by removing all personal and corporate data. Make sure to delete all data. Most devices have an option in the setting menu to perform a factory data reset, which will wipe the data completely. This can also be accomplished remotely by an MDM platform. Note: In some tablets and smartphones, you should manually remove the storage card and use it in your new device or erase the data from it as well.



Related Reading


More Insights




Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

BYTE encourages readers to engage in spirited, healthy debate, including taking us to task. However, BYTE moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. BYTE further reserves the right to disable the profile of any commenter participating in said activities.

COMMENTS

Tune In to BYTE
Facebook Twitter LinkedIn Newsletter RSS
Whitepapers
whitepaper
In this paper you will learn the five trends shaping the future of enterprise mobility. Learn how the rise of social media as a business application, the lurring between work and home, the emergence of new mobile devices, the demand for tech savvy employees and changing expectations of corporate IT will fundamentally change the workplace.
whitepaper
In a survey of more than 1,700 information workers (iWorkers) in North America, notebooks, desktops, and smartphones were found to be “must-have” devices, while tablets, slates, and netbooks were relegated to “nice-to-have” status, according to a commissioned study conducted by Forrester Consulting on behalf of Dell and Intel.
Sponsored by: Dell
Upcoming Events


Oct 20: Becoming a Security Detective - Gathering and Analyzing Security Intelligence in the Enterprise

In this all-day virtual event, experts will offer detailed insight in how to collect security intelligence in the enterprise, and how to analyze and study it in order to efficiently identify new threats as well as low-and-slow attacks such as advanced persistent threats. Register today!

Platinum Sponsors: ArcSight, NetIQ, Proofpoint, Thawte
Gold Sponsor: Q1 Labs



October 6: InformationWeek 500 Virtual Event: The Need for Speed

At the 2011 InformationWeek 500 Virtual Conference, C-level executives from leading global companies will gather to discuss how their organizations are turbo-charging business execution and growth.

Platinum Sponsor: ArcSight, Workday
Gold Sponsor: IBM


Aug 25: InformationWeek & Dark Reading present: How Security Breaches Happen and What Your Organization Can Do About Them

Attendees will get insights on how to prevent breaches from happening, how to research and identify the source of a breach, and how to remediate a compromise as quickly and efficiently as possible.

Platinum Sponsor: ArcSight, NetIQ, Thawte
Gold Sponsors: Lumension, NetGear, GFI
Silver Sponsor: Motorola


July 28: InformationWeek & Symantec present: Infrastructure at Risk -- Taking Decisive Action to Secure Your Critical Data Assets

Join the editors of InformationWeek and leading security experts from Symantec for an in-depth look at the current threats faced by large and small organizations, and the implications for your business, your customers, and even your country. You'll hear how today's threat landscape is changing drastically, and learn the latest countermeasures and best practices to keep your company's precious data assets out of the hands of determined cybercriminals.


July 27: Electronic Health Records -- Moving from Concept to Reality

At this InformationWeek Healthcare Virtual Event, we will talk with healthcare practitioners, IT professionals and other industry experts about issues surrounding EHR selection, deployment and use.

Platinum Sponsor: HP, Intel, GBS, Geotrust, NextGen
Silver Sponsor: Proofpoint


On-Demand: InformationWeek & Interop present: Business Mobility Unleashed

In this virtual event, the leaders behind InformationWeek Business Technology Network and Interop zero in on the top mobile technologies and techniques you'll need to understand and master to ensure your organization thrives in the wireless world.
Platinum Sponsors: Alcatel-Lucent, APC
Gold Sponsor: HP
Silver Sponsor: Emerson Network Power
Bronze Sponsor: Skybot


On-Demand: Cybersecurity Best Practices

In this half-day virtual event, experts assess the state of cybersecurity in government and present the latest strategies for creating a more secure, attack-proof IT infrastructure. This event will help CISOs and other information assurance professionals in federal, state, and local government stay on top of the latest developments in the field.
Platinum Sponsor: GeoTrust
Gold Sponsor: Bit9


On-Demand: Data Center Transformation

Data centers are undergoing incredible transformations that create both opportunities and challenges for IT professionals. Server virtualization enables rapid provisioning, more efficient use of resources, and improved disaster recovery. That trend will continue with storage and network virtualization, allowing IT pros to further abstract -- and optimize -- data center resources.In this virtual event, you will learn how prepare your organization for a data center transformation.
Platinum Sponsors: AMD, APC, Cisco, Eaton, SunGard
Gold Sponsor: Emerson Network Power


On-Demand: Cloud Computing Roadmap: Controlling the Cloud - Managing, Optimizing and Integrating Cloud Services with Your Existing IT Infrastructure

In this virtual event, you'll learn how to craft your own strategy for successfully embracing and integrating new cloud computing capabilities without derailing or destroying your current IT roadmap.
Platinum Sponsors: ArcSight, GoToAssist, SunGard, thawte
Gold Sponsor: Symform
Silver Sponsor: Skybot


On-Demand: Plugging the Leaks -- Finding and Fixing the IT Security Holes in your Enterprise

In this virtual event presented by Dark Reading and InformationWeek, you'll find out how criminals target the flaws in your IT environment, and you'll get some insight on the best methods for finding and fixing your vulnerabilities -- before you're hit by malware or unauthorized access.
Platinum Sponsors: NetIQ, Novell, thawte, Webroot
Gold Sponsors: ArcSight, Bit9, OpenText
Silver Sponsor: Application Security, Core Security, Lumension

 



The 2011 Informationweek 500 Conference will be held at the beautiful St. Regis Monarch Beach Resort, Dana Point, CA. Mark your calendars for September 11-13, 2011.



InformationWeek Healthcare IT Leadership Forum




Bank Systems & Technology Executive Summit 2011