BYOD Trade-Ins: How To Protect Your Business - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Comments
BYOD Trade-Ins: How To Protect Your Business
Newest First  |  Oldest First  |  Threaded View
anon9033273378
50%
50%
anon9033273378,
User Rank: Apprentice
8/5/2014 | 3:55:40 PM
Re: Trading Needs Security
An accredited certificate tells customers that your organisation has defined and put in place effective information security processes, thus helping to create a trusting relationship. A certification helps an organisation focus on improving information security processes. Above all, certification ensures that information security is kept up to scratch, ensuring the organisation's  ability to operate. Read on to see what our consultancy customers and delegates on training courses have said about the need for, and benefits associated with, ISO27001 certification
kaceem.goodman13
50%
50%
kaceem.goodman13,
User Rank: Apprentice
6/25/2014 | 12:02:27 AM
Trading Needs Security
BYOD is a big security problem and device trade-in and upgrades are a big problem. Our hospital put a BYOD policy in place to use Tigertext for HIPAA compliant text messaging, which allows for auto-delete of messages and remote wipe so when the devices are lost, stollen or traded-in/upgraded, then Admin can wipe the messaging and data from the phone. The BYOD policy outlines this clearly so the employee is not surprised by the feautres of this required app. This app allows us not only to stay HIPAA compliant, but also protect internal company data. Yes, BYOD is a big security issue, but there are real productivity gains to be had and IT departments are going to have to be creative to get these gains and maintain security. Here is an example of a BYOD policy similar to ours: http://www.tigertext.com/tigertext-Top7BYOD/?utm_source=TigerText&utm_medium=ResourceCenter&utm_content=Top7BYOD&utm_campaign=Top7RC%3Cbr%20/%3E
Bhori
50%
50%
Bhori,
User Rank: Ninja
6/23/2014 | 5:09:54 PM
Re: Disposal
One way around it might be for larger companies to get in the business of buying their employees' outdated phones.

Hi Gary! Nice suggestion, I agree. May be this is the most suitable option if there is a wide non-serious attitude on privacy and security. Perhaps, the company would have to lose some amount on trading but that cost is justifiable in lieu of security achieved.
Bhori
50%
50%
Bhori,
User Rank: Ninja
6/23/2014 | 5:03:13 PM
Important for employee

in a recent exposé that over half of the 30 used devices he purchased online for the analysis (including smartphones, tablets, laptops, desktops, and netbooks) still contained information, even when the sellers believed they had purged the data

Very interesting post, Steve. The issue is of very critical nature for both the organization and employee. As the lost or sold phone may have personal data critical for  employee's privacy and security as well. Establishing policies and procedures in this regard will be win-win for both the employer and employee. I think the policy can be most successful if employee's interest is highlighted.

Gary_EL
100%
0%
Gary_EL,
User Rank: Ninja
6/19/2014 | 3:34:38 PM
Disposal
What an intersting problem.

One way around it might be for larger companies to get in the business of buying their employees' outdated phones, zeroing out all the imformation in a thorough, professional manner, and then the employer could sell it. Perhaps companies will emerge to do this for smaller comanies for whom establishing this process would be impractical.

Or, perhaps a service could be established to clean out all information from the phones for a fee, and the device can be returned to the individual with no information at all on it, and the employee could then sell it on their own?


2020 State of DevOps Report
2020 State of DevOps Report
Download this report today to learn more about the key tools and technologies being utilized, and how organizations deal with the cultural and process changes that DevOps brings. The report also examines the barriers organizations face, as well as the rewards from DevOps including faster application delivery, higher quality products, and quicker recovery from errors in production.
News
The State of Chatbots: Pandemic Edition
Jessica Davis, Senior Editor, Enterprise Apps,  9/10/2020
Commentary
Deloitte on Cloud, the Edge, and Enterprise Expectations
Joao-Pierre S. Ruth, Senior Writer,  9/14/2020
Slideshows
Data Science: How the Pandemic Has Affected 10 Popular Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/9/2020
Register for InformationWeek Newsletters
Video
Current Issue
IT Automation Transforms Network Management
In this special report we will examine the layers of automation and orchestration in IT operations, and how they can provide high availability and greater scale for modern applications and business demands.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll