SlideShare una empresa de Scribd logo
1 de 17
What's on your E RADAR?
Using personally-owned devices at work
Will Roebuck
Founder and CEO, E RADAR
4 Themes
● Data Access
● What data, when, how and by whom?
● Device Risk
● Abuse and misuse, malware, by-passing in house security
● Management Risk
● Monitoring threats, responding to alerts
● Evaluating new operating systems and devices
● Awareness
● Staff policies and procedures
Important Points
● The 'bottom line'
● Corporate and personal liability
● Digital evidence
● Misuse of personal devices
● Monitoring networked communications
● Workers and personal data
● Stored networked communications
● Implementing a policy
The 'Bottom Line'
● Enterprise, innovation and competition
● Balancing supply and demand with risk management
● Deploying resources carefully
● Smarter business management
● Developing and using the right people skills
● Improving business processes; supply and demand chains
● Opening up new markets
● Investment in enabling technology
● Enabling laws and regulations, standards
Corporate and personal liability
● Legal and regulatory requirements
● Registering, filing and retaining records and information
– e.g. Company Annual Returns / VAT Returns
– e.g. Notifying under Data Protection / WEEE record retention
● Vicarious liability
● Duty of 'reasonable' care towards employee
● Prevent improper or illegal activities over business systems
● Personal liability
● Directors failing to undertake duties implied by law or as
additional duties in their contract
Evidence – basic concepts
● Evidence (in legal terms) is the way that a fact is proved or
disproved in a court or tribunal.
● Law of evidence regulates what is admissible in a court of
law or tribunal
● An organisation may need evidence for
● Dealing with claims of unfair dismissal of employee
● Proving IPR on invention
● Proving existence of agreement in disagreement with a
customer
Types of evidence
● Oral testimony
● Real evidence in material form (e.g. documents)
● Primary = signed original contract
● Secondary = unsigned draft of that contract
● Electronic evidence (primary or secondary)
● Hearsay
● Evidence given by a person as to what another person said
● Less reliable than first person account but admissible
● Rules much tighter in criminal cases
Burden and standard of proof
● Civil cases
● Burden of proof is with claimant
● Defendants may also need to prove something in case to
rebut accusations
● Standard of proof is 'balance of probabilities'
● Criminal Cases
● Burden of proof is with prosecution
● 'Beyond reasonable doubt'
Digital evidence
● Evidence in electronic format is admissible
● Electronic Communications Act 2000
● Civil Evidence Act / Youth Justice and Criminal Evidence Act
● Documents can be copied onto own personal devices
● Technology neutral
Admissibility, weight and credibility
● Digital evidence may be legally acceptable but may not be
admissible.
● Admissible document must be sufficiently relevant
● Court must decide and may give different weight to primary
or secondary evidence
● In civil cases, evidence usually presumed admissible
without further proof
● British Standards Code for Legal Admissibility and
Evidential Weight of Information Stored Electronically.
Misuse of Personal Devices
● Abuse and misuse (Illegal, illicit or wrong)
● Defamatory remarks
● Breach of confidentiality
● Using and abusing copyright without permission
● Negligence in sending viruses to other business
● Sexual or racial harassment
● Criminal Offences
● e.g. downloading child pornography
● Other illegal images
Monitoring Communications
● Right to privacy – even at work
● Regulation of Investigatory Powers Act 2000
● Lawful Business Practice Regulations 2000
● Inform monitoring for lawful business purposes
● Quality, training and security
● How do you 'monitor' remote workers?
● Blanket monitoring of employees not acceptable
● Must be justified
● Other alternatives?
Data protection
● 8 data protection principles
● Principle 7 – adequate security measures
● Principle 8 – international transfers
● Cloud computing
● Where is personal data
● Information Commissioner's Guidance
● Sensitive personal data
● Encryption
Retention, deletion and retrieval
● Organisations must have evidence to rely upon it!
● Information management policy covering
● Retention, access and exchange (including security),
deletion and retrieval
● Why a policy?
● Business (cost, time and risk management)
● Legal (e.g. accounting records = 6 years, criminal penalties)
● Regulatory (FSA Rules, Food Standards etc)
Key observations
● 3 important elements
● Managing IPR including data, information and proprietary
software
● Controlling worker behaviour
● Security
● Appropriate policies
● Linked to employment contract to enable disciplinary
● Otherwise just a management policy
● Don't panic – get on with your business!
About eradar.eu™
● Championing enterprise and the online economy
● Promote enabling legal and regulatory environment
● Business networking and compliance hub
● Membership Services (over 400 briefing papers/articles)
● Referencing
● E-contracting Legal Group
● Premium tracking and scrutiny
● Audits and training
Thank you!
will@eradar.eu
http://www.eradar.eu

Más contenido relacionado

La actualidad más candente

CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-Services
Compute Forensics
 
Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...
WhitmeyerTuffin
 
Maximizing and protecting ip
Maximizing and protecting ipMaximizing and protecting ip
Maximizing and protecting ip
eophiladelphia
 
Elise Bravington CV 2016 1
Elise Bravington CV 2016 1Elise Bravington CV 2016 1
Elise Bravington CV 2016 1
Elise Bravington
 
Tax Preparers Presentation
Tax Preparers PresentationTax Preparers Presentation
Tax Preparers Presentation
Doug Landoll
 

La actualidad más candente (19)

Presentation for the LSEC GDPR event - 20171130
Presentation for the LSEC GDPR event - 20171130Presentation for the LSEC GDPR event - 20171130
Presentation for the LSEC GDPR event - 20171130
 
EU Privacy Laws and Start-Ups
EU Privacy Laws and Start-UpsEU Privacy Laws and Start-Ups
EU Privacy Laws and Start-Ups
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Tech Matrix 20080523
Tech Matrix 20080523Tech Matrix 20080523
Tech Matrix 20080523
 
CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-Services
 
Cyber security
Cyber securityCyber security
Cyber security
 
Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
Maximizing and protecting ip
Maximizing and protecting ipMaximizing and protecting ip
Maximizing and protecting ip
 
Elise Bravington CV 2016 1
Elise Bravington CV 2016 1Elise Bravington CV 2016 1
Elise Bravington CV 2016 1
 
#7 Insurance
#7 Insurance#7 Insurance
#7 Insurance
 
Hackers
HackersHackers
Hackers
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Gregory landing pm ccna 2
Gregory landing pm ccna 2Gregory landing pm ccna 2
Gregory landing pm ccna 2
 
Tax Preparers Presentation
Tax Preparers PresentationTax Preparers Presentation
Tax Preparers Presentation
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?
 
Personal Data Protection Law
Personal Data Protection LawPersonal Data Protection Law
Personal Data Protection Law
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
 

Destacado (6)

Euras news file17968
Euras news file17968Euras news file17968
Euras news file17968
 
The sammut’s sustainable housepower
The sammut’s sustainable housepowerThe sammut’s sustainable housepower
The sammut’s sustainable housepower
 
RK Memoirs
RK MemoirsRK Memoirs
RK Memoirs
 
1º ano
1º ano1º ano
1º ano
 
121poug
121poug121poug
121poug
 
Historic inevitability of social everything
Historic inevitability of social everythingHistoric inevitability of social everything
Historic inevitability of social everything
 

Similar a 05 10-2011 BOYD - Bring Your Own Device

Guernsey Data Protection Legislation
Guernsey Data Protection LegislationGuernsey Data Protection Legislation
Guernsey Data Protection Legislation
jonbarclay
 

Similar a 05 10-2011 BOYD - Bring Your Own Device (20)

Governance, legal compliance and risk across the online economy
Governance, legal compliance and risk across the online economyGovernance, legal compliance and risk across the online economy
Governance, legal compliance and risk across the online economy
 
IISP NW branch meeting 15 nov 2012 security through governance, compliance…
IISP NW branch meeting 15 nov 2012 security through governance, compliance…IISP NW branch meeting 15 nov 2012 security through governance, compliance…
IISP NW branch meeting 15 nov 2012 security through governance, compliance…
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
Prep your app for gdpr compliance
Prep your app for gdpr compliancePrep your app for gdpr compliance
Prep your app for gdpr compliance
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 
Living with gdpr
Living with gdprLiving with gdpr
Living with gdpr
 
Understanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of ComplianceUnderstanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of Compliance
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startups
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Game changing legislation
Game changing legislationGame changing legislation
Game changing legislation
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Data breaches, privacy programs and what will change for processors
Data breaches, privacy programs and what will change for processorsData breaches, privacy programs and what will change for processors
Data breaches, privacy programs and what will change for processors
 
GDPR: What does it mean for your business?
GDPR: What does it mean for your business?GDPR: What does it mean for your business?
GDPR: What does it mean for your business?
 
Consumer representative
Consumer representativeConsumer representative
Consumer representative
 
What does GDPR mean for your business?
What does GDPR mean for your business?What does GDPR mean for your business?
What does GDPR mean for your business?
 
Guernsey Data Protection Legislation
Guernsey Data Protection LegislationGuernsey Data Protection Legislation
Guernsey Data Protection Legislation
 

Más de E Radar

Más de E Radar (6)

Trust in Mobile Computing
Trust in Mobile ComputingTrust in Mobile Computing
Trust in Mobile Computing
 
Mobile Digital Evidence And Forensics
Mobile Digital Evidence And ForensicsMobile Digital Evidence And Forensics
Mobile Digital Evidence And Forensics
 
Impact of Mobile on Data Compliance
Impact of Mobile on Data ComplianceImpact of Mobile on Data Compliance
Impact of Mobile on Data Compliance
 
Cyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEsCyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEs
 
Securing Mobile Payments
Securing Mobile PaymentsSecuring Mobile Payments
Securing Mobile Payments
 
Mobile Digital Evidence
Mobile Digital EvidenceMobile Digital Evidence
Mobile Digital Evidence
 

Último

Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
vineshkumarsajnani12
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 

Último (20)

Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 

05 10-2011 BOYD - Bring Your Own Device

  • 1. What's on your E RADAR? Using personally-owned devices at work Will Roebuck Founder and CEO, E RADAR
  • 2. 4 Themes ● Data Access ● What data, when, how and by whom? ● Device Risk ● Abuse and misuse, malware, by-passing in house security ● Management Risk ● Monitoring threats, responding to alerts ● Evaluating new operating systems and devices ● Awareness ● Staff policies and procedures
  • 3. Important Points ● The 'bottom line' ● Corporate and personal liability ● Digital evidence ● Misuse of personal devices ● Monitoring networked communications ● Workers and personal data ● Stored networked communications ● Implementing a policy
  • 4. The 'Bottom Line' ● Enterprise, innovation and competition ● Balancing supply and demand with risk management ● Deploying resources carefully ● Smarter business management ● Developing and using the right people skills ● Improving business processes; supply and demand chains ● Opening up new markets ● Investment in enabling technology ● Enabling laws and regulations, standards
  • 5. Corporate and personal liability ● Legal and regulatory requirements ● Registering, filing and retaining records and information – e.g. Company Annual Returns / VAT Returns – e.g. Notifying under Data Protection / WEEE record retention ● Vicarious liability ● Duty of 'reasonable' care towards employee ● Prevent improper or illegal activities over business systems ● Personal liability ● Directors failing to undertake duties implied by law or as additional duties in their contract
  • 6. Evidence – basic concepts ● Evidence (in legal terms) is the way that a fact is proved or disproved in a court or tribunal. ● Law of evidence regulates what is admissible in a court of law or tribunal ● An organisation may need evidence for ● Dealing with claims of unfair dismissal of employee ● Proving IPR on invention ● Proving existence of agreement in disagreement with a customer
  • 7. Types of evidence ● Oral testimony ● Real evidence in material form (e.g. documents) ● Primary = signed original contract ● Secondary = unsigned draft of that contract ● Electronic evidence (primary or secondary) ● Hearsay ● Evidence given by a person as to what another person said ● Less reliable than first person account but admissible ● Rules much tighter in criminal cases
  • 8. Burden and standard of proof ● Civil cases ● Burden of proof is with claimant ● Defendants may also need to prove something in case to rebut accusations ● Standard of proof is 'balance of probabilities' ● Criminal Cases ● Burden of proof is with prosecution ● 'Beyond reasonable doubt'
  • 9. Digital evidence ● Evidence in electronic format is admissible ● Electronic Communications Act 2000 ● Civil Evidence Act / Youth Justice and Criminal Evidence Act ● Documents can be copied onto own personal devices ● Technology neutral
  • 10. Admissibility, weight and credibility ● Digital evidence may be legally acceptable but may not be admissible. ● Admissible document must be sufficiently relevant ● Court must decide and may give different weight to primary or secondary evidence ● In civil cases, evidence usually presumed admissible without further proof ● British Standards Code for Legal Admissibility and Evidential Weight of Information Stored Electronically.
  • 11. Misuse of Personal Devices ● Abuse and misuse (Illegal, illicit or wrong) ● Defamatory remarks ● Breach of confidentiality ● Using and abusing copyright without permission ● Negligence in sending viruses to other business ● Sexual or racial harassment ● Criminal Offences ● e.g. downloading child pornography ● Other illegal images
  • 12. Monitoring Communications ● Right to privacy – even at work ● Regulation of Investigatory Powers Act 2000 ● Lawful Business Practice Regulations 2000 ● Inform monitoring for lawful business purposes ● Quality, training and security ● How do you 'monitor' remote workers? ● Blanket monitoring of employees not acceptable ● Must be justified ● Other alternatives?
  • 13. Data protection ● 8 data protection principles ● Principle 7 – adequate security measures ● Principle 8 – international transfers ● Cloud computing ● Where is personal data ● Information Commissioner's Guidance ● Sensitive personal data ● Encryption
  • 14. Retention, deletion and retrieval ● Organisations must have evidence to rely upon it! ● Information management policy covering ● Retention, access and exchange (including security), deletion and retrieval ● Why a policy? ● Business (cost, time and risk management) ● Legal (e.g. accounting records = 6 years, criminal penalties) ● Regulatory (FSA Rules, Food Standards etc)
  • 15. Key observations ● 3 important elements ● Managing IPR including data, information and proprietary software ● Controlling worker behaviour ● Security ● Appropriate policies ● Linked to employment contract to enable disciplinary ● Otherwise just a management policy ● Don't panic – get on with your business!
  • 16. About eradar.eu™ ● Championing enterprise and the online economy ● Promote enabling legal and regulatory environment ● Business networking and compliance hub ● Membership Services (over 400 briefing papers/articles) ● Referencing ● E-contracting Legal Group ● Premium tracking and scrutiny ● Audits and training