BYOD Trade-Ins: How To Protect Your Business
Threaded  |  Newest First  |  Oldest First
User Rank: Ninja
6/19/2014 | 3:34:38 PM
What an intersting problem.

One way around it might be for larger companies to get in the business of buying their employees' outdated phones, zeroing out all the imformation in a thorough, professional manner, and then the employer could sell it. Perhaps companies will emerge to do this for smaller comanies for whom establishing this process would be impractical.

Or, perhaps a service could be established to clean out all information from the phones for a fee, and the device can be returned to the individual with no information at all on it, and the employee could then sell it on their own?
User Rank: Apprentice
6/23/2014 | 5:09:54 PM
Re: Disposal
One way around it might be for larger companies to get in the business of buying their employees' outdated phones.

Hi Gary! Nice suggestion, I agree. May be this is the most suitable option if there is a wide non-serious attitude on privacy and security. Perhaps, the company would have to lose some amount on trading but that cost is justifiable in lieu of security achieved.
User Rank: Apprentice
6/23/2014 | 5:03:13 PM
Important for employee

in a recent exposé that over half of the 30 used devices he purchased online for the analysis (including smartphones, tablets, laptops, desktops, and netbooks) still contained information, even when the sellers believed they had purged the data

Very interesting post, Steve. The issue is of very critical nature for both the organization and employee. As the lost or sold phone may have personal data critical for  employee's privacy and security as well. Establishing policies and procedures in this regard will be win-win for both the employer and employee. I think the policy can be most successful if employee's interest is highlighted.

User Rank: Apprentice
6/25/2014 | 12:02:27 AM
Trading Needs Security
BYOD is a big security problem and device trade-in and upgrades are a big problem. Our hospital put a BYOD policy in place to use Tigertext for HIPAA compliant text messaging, which allows for auto-delete of messages and remote wipe so when the devices are lost, stollen or traded-in/upgraded, then Admin can wipe the messaging and data from the phone. The BYOD policy outlines this clearly so the employee is not surprised by the feautres of this required app. This app allows us not only to stay HIPAA compliant, but also protect internal company data. Yes, BYOD is a big security issue, but there are real productivity gains to be had and IT departments are going to have to be creative to get these gains and maintain security. Here is an example of a BYOD policy similar to ours:

The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Twitter Feed
InformationWeek Radio
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.