Adrian Briscoe takes a look at some of the risks associated with employees bringing their own devices to work, and how to mitigate those risks.
Adrian Briscoe takes a look at some of the risks associated with employees bringing their own devices to work, and how to mitigate those risks.
Imagine a situation where a regulator knows exactly what information concerning your business relationships with suppliers, customers and competitors is on your employee's iPad, but you do not.
Not a risk for you? Then imagine a situation where confidential or sensitive business information is leaked because it exists on an employee-owned device and that device is stolen or left on a train. If you allow employees to use their own devices for work, it could happen today or next week. Your information could be leaking right now.
If not now, these are exactly the situations that are likely to face businesses more often in the next five years unless steps are taken to actively manage BYOD (Bring Your Own Device) policies for the benefit existing information governance frameworks.
BYOD is a concept that most companies will recognise as a feature of their business, to some extent, whether officially endorsed or not.
Let's face facts: BYOD is not new. For many years, individuals have been finding simple ways of enhancing their own productivity by using personal devices for business purposes. For example, if businesses do not prohibit or limit the use of personal USB memory sticks, they will be used. The same was true of floppy disks 15 years ago. If businesses do not issue company smart phones, then personal smart phones will be used to varying degrees. The next time you make a journey during rush hour, try counting the number of tablets you see; it is naive to assume that they are used solely for playing games!
Our business behaviours are evolving at a rate that would make Darwin proud. To stay ahead of your competitors requires that business processes are carried out faster and more flexibly than before. For this purpose, BYOD assists more than capably. However, for individuals, reputation takes a lot of personal investment to build (time, knowledge, money) and mobile technology makes it easy to retain possession of knowledge assets, which could lead to disputes over ownership.
The point is that whether you love it (Novartis, like other leading corporations have created an App for use by employees) or hate it (IBM's CIO, Jeanette Horan said that BYOD is not saving any money), you have to enroll BYOD into your information governance strategy at every level, so that employees know the boundaries of reasonable use and employers have the means to access information held on employee-owned-devices (EODs) whenever they need it.
That information may be required for a multitude of reasons, but mostly we are concerned with the security of the information and the need to access it promptly, in order to properly investigate potential issues of liability (whether civil, criminal or regulatory).
We live in an age of compliance, where the number of regulatory investigations has grown significantly over the last 10 years.
This has also had the positive effect of encouraging businesses to conduct their own internal audits in order to foresee potential exposure to risk and to proactively embed a culture of compliance within their team.
All of these types of investigations rely on analysis of electronic communications. Emails are now not the only source of information and increasingly we hear about the discovery of text messages that are at best embarrassing and at worst incriminating.
One imagines it is not always practical for perpetrators of wrong-doing to hold clandestine meetings by a riverside in order to co-ordinate their activities.
Nevertheless, it is by now well known that email and text messages can be easily retrieved and analysed using forensic techniques (technology can read the metadata of an email and draw a map to help identify the virtual ‘X’ marking the most likely spot at which there may be evidence of collusion). So in order to evade detection, this means that employees who are conscious that they may be engaged in immoral or corrupt activity are more likely to use a variety of communications, such as second (or even third) mobile phones or SIM cards, instant messaging tools and social networking sites such as Linkedin or Facebook. Own devices are perfect for this sort of activity.
BYOD presents an opportunity for would-be information thieves and not in the ordinary sense. Cyber security attackers could target businesses with no formal BYOD policy. It has been known for attackers to drop USB data keys in company car park: If an employee inserts one into their computer, the software on the key can infect the machine with malware that can be used as the basis for attacking the company’s network and stored data.
Putting hi-tech crimes to one side, there is always the risk that an employee could be carrying highly sensitive data on their iPad and that the device could be lost or stolen. Aside from the loss of cherished photos and a temporary loss of contact with the outside world through Facebook, there is the serious issue that company data in the wrong hands could have serious repercussions, especially if it constitutes a data breach.
So how should companies prepare themselves for BYOD? If you are asked to consider creating or enhancing an existing BYOD policy, here are some things that you should know:
The BYOD landscape is clearly a minefield of issues for legal counsel, IT and HR professionals to navigate. The task of drawing up an organisational policy is complex and should not be considered a one-off task; new products enter the market at a highly frequent rate and updates to local laws can have an impact on existing BYOD frameworks.
As a minimum it is suggested that the following components should be addressed in any BYOD policy:
In the age of heightened regulation and accountability, acquiescence is not an option. Whatever your BYOD policy looks like, you need to ensure that it is relevant, up to date and clearly communicated to all employees, with appropriate mechanisms to aid enforcement at critical times.
About the author
Adrian Briscoe is general manager – APAC, Kroll Ontrack