SlideShare una empresa de Scribd logo
1 de 31
Mobile Device Management Policy Workshop

                           Part 2
        Presented by The CIO Executive Series




              Moderators: Bill Murphy & James Crifasi
RedZone’s CIO Executive Series

TOP IT Executive Network specializing in bringing CIO’s together to
    collaborate, network, and stay current on industry trends.

         Just under 300 senior C-Suite IT executive members

   Founded in 2000 | 13 years of experience bringing CIO’s together

    Host a number of events – both virtual and physical – each year

     Host a “Special Event” annually | Past events have included:
                 A Golf Outing, Dinner & Receptions
About Bill Murphy
President and Founder
• RedZone Technologies
• ThunderDG
• MA DR Solutions
• Beyond Limits Magazine


Keep In Touch With Bill:
   @TheRedZoneCIO
   CIO Executive Series Group
   billm@redzonetech.net


                                Live Tweet from the event!
                                @TheRedZoneCIO
About James Crifasi
• CTO of RedZone Technologies
• Co-founder ThunderDG
• Co-founder MA DR Solutions

• University of Maryland Graduate | B.A. Criminology &
  Criminal Justice | B.S. Computer Science – Algorithmic
  Theory & AI | M.S. Interdisciplinary Management

• Keep In Touch With James: jcrifasi@redzonetech.net
Sponsors


RedZone Technologies
Assessment: IT Architecture and Design
Integration: Security | Disaster Recovery | Infrastructure
Managed Service Programs
Cloud Brokerage
(410) 897-9494
www.redzonetech.net



ThunderDG
Employee Policy Management, Education, and Awareness
www.thunderdg.com
About The Companies/Policies


 • ABC Company

 • Structural Group

 • American Chemistry Council
Topics To Be Covered

•   Remote Wipe
•   Data Back Up
•   Device & Carrier Coverage
•   Organizational Processes & Protocol
•   Education & Policy
•   Company Issued Devices
•   Mobile Device Use While Driving
•   Signature Requirements
•   Specifying Solutions
•   Food For Thought
When To Remote Wipe
•   ABC Company’s policy is very protective of company data
     • Allows for remote wipe if the device is lost or stolen, the user is
       terminated, or in the event that the company cannot reach the user
     • Users need to be diligent in answering their phone or it could be wiped

•   STRUCTURAL has a slightly more user-friendly approach than ABC
    Company’s
     • Similar to ABC Company’s but does not allow for remote wiping in the
       event that the company cannot contact an employee
     • Users need to only fear the notion of losing their device or having it
       stolen, which people naturally fear regardless of the data being stored
       on their devices

•   The American Chemistry Council’s policy is the most simplistic
     • Will only “Remote wipe (in the event a mobile device is lost or stolen)”
     • Users need to only fear the notion of losing their device or having it
        stolen
       Under what circumstances would your org remotely wipe a device?
Company Data Only Wipe Vs. Entire
                Device
•    ABC Company specifies that all data will be wiped from the device
•    STRUCTURAL specifies that only corporate data will be wiped, but
     there is a chance some personal data may be lost in the process
•    The American Chemistry Council doesn’t specify at all
*Note: the extent to which your organization wipes a device depends upon how your company data is set up to be viewed
                                    and interacted with on the users’ mobile device*




                                                      STRUCTURAL




                                                       ABC Company

      What type of remote wipe is your organization equipped to perform?
Data Backup
•      ABC Company encourages data back up, but prohibits the backup
       of corporate data
•      STRUCTURAL encourages users to back up their personal data, but
       does not address the backup of corporate data
•      The American Chemistry Council doesn’t mention data backup
    From a user standpoint, it’s important to know and understand your organization’s stance on data backup so you can
            protect yourself against loss of your personal data without violating any of your company’s policies.




                                                                  ABC Company




                                                                  STRUCTURAL




What is your organization’s policy on data backup? What about company data?
What Exactly Are You Protecting
                 Against?
•   ABC Company’s Remote Wipe Waiver seems to be written more to
    protect the company against data loss
     • Extra coverage to include wiping if employee goes MIA
     • Specific mention of the prohibition of backing up corporate data
•   STRUCTURAL’s Remote Wipe Waiver seems to be more directed
    toward protecting the user against data loss
     • Wipes only corporate data, unless otherwise requested by the user
     • No mention of backing up corporate data
     • Encourages users to back up their personal data regularly, just in
         case
     • Offers the option of a full wipe to protect personal data
•   The American Chemistry Council simply states that it will wipe a
    device in the event that it is lost or stolen
     • Seems to be written more so to spell out which job roles are eligible
         for company-issued devices vs personal devices used for business
       What are your organizational needs? Need more company data
        security, increased ability to protect personal data, or both?
Implied VS Expressed Approach

     •   ABC Company provided a summary before the signature line
         that outlines what exactly the user is agreeing to by signing the
         Remote Wipe Waiver

     •   STRUCTURAL & The American Chemistry Council simply
         states the policy and has a line at the end of the document for a
         signature – leaves more room for interpretation




Is it better to spell a policy like this out or leave some room for interpretation?
Remote Wipe Policy | The Different
                Formats
•    ABC Company & STRUCTURAL both have their Remote Wipe
     Waivers as separate documents from their Mobile Device Policy

•    The American Chemistry Council has mention of the remote wipe
     waiver within their Mobile Device Policy




                            American Chemistry Council



      ABC Company                                             STRUCTURAL
    What approach to a remote wipe policy applies best to your organization?
         A separate document or a clause in the existing MDM Policy?
Explanation of Terms
•     ABC Company & STRUCTURAL – policy & clarification
       • State the purpose of a Remote Wipe Waiver & under what
         circumstances a device would be wiped

•     The American Chemistry Council – policy only
       • simply says that by signing the policy, the employee allows IT to
          remotely wipe the device




            ABC Company                        American Chemistry Council

    Which would be the most ideal way to present a Remote Wipe Policy to your
                                  organization?
Device Coverage
•   ABC Company & STRUCTURAL both provide a list of the types of
    devices that their MDM policies cover (same items in both lists)

•   The American Chemistry Council does not specify what mobile
    devices are covered, but reads as though it is specific to
    Smartphones (especially since it lists accepted wireless carriers)




               What do you consider to be a “mobile device”?
Carrier Coverage
•   ABC Company & STRUCTURAL do not specify what wireless
    carriers are covered
•   The American Chemistry Council specifically lists what carriers are
    permitted to be connected to their network




    Does your organization specify what carriers are covered on its network?
                              If so, which ones?
Organizational Protocols

•   The length and content of this section could depend on…
     • The size of your organization - Larger companies usually have
        more finely tuned processes/protocols
     • Whether or not your employees are allowed to opt-out of the
        MDM Policy – some companies allow certain users to opt out of
        an MDM Policy if they don’t understand or are not comfortable
        with its’ contents
     • The invasiveness of the IT department – Some IT departments
        may use your device to track time spent performing work-related
        tasks, while others may monitor usage to detect suspicious
        activity. If this is your organization, you should disclose.
     • The wordiness of the document – If there are multiple
        paragraphs that essentially say the same thing in various different
        ways, the contract is more open to interpretation and
        is, therefore, subject to more scrutiny when being argued in a legal
        setting
Organizational Protocols

•   STRUCTURAL has the longest Organization Protocol section
     • The longer and vague a policy, the more open to interpretation it
       becomes, especially with respect to pursuing legal action

•   ABC Company has a slightly shorter Organization Protocol section
     • Not as long or as vague
     • More concise, less room for interpretation

•   The American Chemistry Council has no labeled “Organization
    Protocol” section; rather, the organizational protocol considerations are
    addressed in the “Security and Support” section
     • Simply states what department to contact in the event that a users’
        device is lost or stolen


Do you think the inclusion of organizational protocols in a different section of
             the MDM policy is a good idea? Why or why not?
How Detailed is Your
    Organizational Protocol?

                             ABC Company




American Chemistry Council



              STRUCTURAL
Specify Eligibility for Company Issued
                    Devices
•    If you offer company-issued mobile devices, unless all members of
     your organization are eligible, the MDM policy should detail eligibility




    Does your organization supply any of its employees with company issued
                         devices? If so, who is eligible?
Reimbursement & Stipends

   •   If your organization offers either of these, you will need to
       specify amounts in this part of the MDM Policy document




Does your organization reimburse its employees (or offer stipends) for using
                 their personal devices for business use?
Mobile Device Use While Driving
•     Major legal issue

•     Want to be sure to address within the MDM policy somewhere;
      Coca Cola didn’t and it resulted in a $21 million law suit

•     The American Chemistry Council’s MDM Policy was the only one
      of these three that mentioned mobile device use while driving




    Is a section on mobile device use while operating a motor vehicle something
                      you’ve considered for your MDM Policy?
Signature Requirements
                  ABC Company
•   ABC Company only requires the Employee Declaration at the bottom
    of its’ Remote Wipe Waiver and Mobile Device Acceptable Use
    Policies

•   ABC Company is utilizing an Employee Policy Management
    platform, so all signatures are electronic, rather than using the “sign-
    on-the-line” format
Signature Requirements
                 STRUCTURAL
•   STRUCTURAL, like ABC Company, only requires the Employee
    Declaration at the bottom of its’ Remote Wipe Waiver and Mobile
    Device Acceptable Use Policies

•   ABC Company is utilizing a “sign-on-the-line” format
     • More paperwork/less “green”
     • More complicated tracking
Signature Requirements
        American Chemistry Council
•   The American Chemistry Council requires its employees to choose
    whether or not they want a company-issued device or use their
    personal device to access the network at the conclusion of its
    contract

•   ABC Company is utilizing a “sign-on-the-line” format




      What type of signature requirements does your MDM Policy have?
Specifying Solutions
•   STRUCTURAL’s Acceptable Use Policy states specifically that they
    will utilize Airwatch’s mobile device management solution “to secure
    devices and enforce policies remotely”
     • What happens if Airwatch goes out of business or your financial
          department decides it’s too expensive and you need to find
          another vendor?
     • Would this be legally enforceable if STRUCTURAL switched
          vendors?
Food For Thought
•   Use an Employee Policy Management web-based platform, like
    ThunderDG, which allows employers to…
     • Distribute the policies electronically, collect the e-signatures, and
        easily track what employees have signed which policies
     • Reinforce the policies through the Quiz Module so you can allow
        users to interact with the policies, which increases their
        likelihood of learning, understanding, and remembering them
Food For Thought



•   Do you have a means for ensuring that all of your employees
    have read, understand, and remember your organization’s
    policies?

•   What about BYOD for PC’s?

•   If you protect your data and apps, why do MDM at all?
Questions?
Continue The Discussion

   Follow the CIO Executive Series Group on LinkedIn!



   Follow @TheRedZoneCIO on Twitter!
Thank you for joining us for the
Mobile Device Management Policy Workshop

                               Part 2
           Presented by The CIO Executive Series



     We’ll email you a link to the recorded Virtual Roundtable, as
    well as a written recap of what we discussed today, in the next
                                few days!

Más contenido relacionado

La actualidad más candente

Chapter 1 Lecture
Chapter 1 LectureChapter 1 Lecture
Chapter 1 LectureJEngle
 
BYOD: Beating IT’s Kobayashi Maru
BYOD: Beating IT’s Kobayashi MaruBYOD: Beating IT’s Kobayashi Maru
BYOD: Beating IT’s Kobayashi MaruMichele Chubirka
 
Issue identification cloud computing
Issue identification cloud computingIssue identification cloud computing
Issue identification cloud computinggirish0984
 
Bring Your Own Device at Cambridgeshire County Council
Bring Your Own Device at Cambridgeshire County CouncilBring Your Own Device at Cambridgeshire County Council
Bring Your Own Device at Cambridgeshire County CouncilBCS East Anglia
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing itnewsafrica
 
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksPeregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksProductNation/iSPIRT
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)Dr Dev Kambhampati
 
Cmgt 554 cmgt554 cmgt 554 forecasting and strategic planning -uopstudy.com
Cmgt 554 cmgt554 cmgt 554 forecasting and strategic planning -uopstudy.comCmgt 554 cmgt554 cmgt 554 forecasting and strategic planning -uopstudy.com
Cmgt 554 cmgt554 cmgt 554 forecasting and strategic planning -uopstudy.comULLPTT
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for EmployeesLeo de Sousa
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 

La actualidad más candente (15)

Chapter 1 Lecture
Chapter 1 LectureChapter 1 Lecture
Chapter 1 Lecture
 
BYOD: Beating IT’s Kobayashi Maru
BYOD: Beating IT’s Kobayashi MaruBYOD: Beating IT’s Kobayashi Maru
BYOD: Beating IT’s Kobayashi Maru
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Issue identification cloud computing
Issue identification cloud computingIssue identification cloud computing
Issue identification cloud computing
 
Bring Your Own Device at Cambridgeshire County Council
Bring Your Own Device at Cambridgeshire County CouncilBring Your Own Device at Cambridgeshire County Council
Bring Your Own Device at Cambridgeshire County Council
 
Term assignment
Term assignmentTerm assignment
Term assignment
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing
 
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksPeregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)
 
Cmgt 554 cmgt554 cmgt 554 forecasting and strategic planning -uopstudy.com
Cmgt 554 cmgt554 cmgt 554 forecasting and strategic planning -uopstudy.comCmgt 554 cmgt554 cmgt 554 forecasting and strategic planning -uopstudy.com
Cmgt 554 cmgt554 cmgt 554 forecasting and strategic planning -uopstudy.com
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for Employees
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 

Destacado

M Learning en la Universidad de Sonora
M Learning en la Universidad de SonoraM Learning en la Universidad de Sonora
M Learning en la Universidad de Sonoranubiafx
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Leena N
 
Mobile device management v5
Mobile device management v5Mobile device management v5
Mobile device management v5RoyGerritse
 
Los ambientes virtuales de aprendizaje (AVA)
Los ambientes virtuales de aprendizaje (AVA)Los ambientes virtuales de aprendizaje (AVA)
Los ambientes virtuales de aprendizaje (AVA)Katiusca Peña
 
Curso de formación en Movilidad (Parte II) - Personalización
Curso de formación en Movilidad (Parte II) - Personalización Curso de formación en Movilidad (Parte II) - Personalización
Curso de formación en Movilidad (Parte II) - Personalización Mobivery
 
Curso de formación en Movilidad (Parte I) - Mobile Device Management
Curso de formación en Movilidad (Parte I) - Mobile Device ManagementCurso de formación en Movilidad (Parte I) - Mobile Device Management
Curso de formación en Movilidad (Parte I) - Mobile Device ManagementMobivery
 
Curso de formación en Movilidad (Parte III) - Tecnología de Servidor
Curso de formación en Movilidad (Parte III) - Tecnología de ServidorCurso de formación en Movilidad (Parte III) - Tecnología de Servidor
Curso de formación en Movilidad (Parte III) - Tecnología de ServidorMobivery
 
Introducción al Mobile Learning O Elearning Mobil (m-learning)
Introducción al Mobile Learning O Elearning Mobil (m-learning)Introducción al Mobile Learning O Elearning Mobil (m-learning)
Introducción al Mobile Learning O Elearning Mobil (m-learning)Juan Acevedo Miño
 

Destacado (12)

M-learning
M-learningM-learning
M-learning
 
M Learning en la Universidad de Sonora
M Learning en la Universidad de SonoraM Learning en la Universidad de Sonora
M Learning en la Universidad de Sonora
 
M learning
M learningM learning
M learning
 
M-Learning
M-LearningM-Learning
M-Learning
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
Mobile device management v5
Mobile device management v5Mobile device management v5
Mobile device management v5
 
Los ambientes virtuales de aprendizaje (AVA)
Los ambientes virtuales de aprendizaje (AVA)Los ambientes virtuales de aprendizaje (AVA)
Los ambientes virtuales de aprendizaje (AVA)
 
Curso de formación en Movilidad (Parte II) - Personalización
Curso de formación en Movilidad (Parte II) - Personalización Curso de formación en Movilidad (Parte II) - Personalización
Curso de formación en Movilidad (Parte II) - Personalización
 
Curso de formación en Movilidad (Parte I) - Mobile Device Management
Curso de formación en Movilidad (Parte I) - Mobile Device ManagementCurso de formación en Movilidad (Parte I) - Mobile Device Management
Curso de formación en Movilidad (Parte I) - Mobile Device Management
 
Curso de formación en Movilidad (Parte III) - Tecnología de Servidor
Curso de formación en Movilidad (Parte III) - Tecnología de ServidorCurso de formación en Movilidad (Parte III) - Tecnología de Servidor
Curso de formación en Movilidad (Parte III) - Tecnología de Servidor
 
Introducción al Mobile Learning O Elearning Mobil (m-learning)
Introducción al Mobile Learning O Elearning Mobil (m-learning)Introducción al Mobile Learning O Elearning Mobil (m-learning)
Introducción al Mobile Learning O Elearning Mobil (m-learning)
 
M learning
M learningM learning
M learning
 

Similar a Mobile Device Management Policy Workshop Part 2 | CIO Executive Series

A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device managementJason Murray
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptxNguyenNM
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docxCSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docxmydrynan
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365Don Daubert
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeBrenda Majewski
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCastlebridge Associates
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365Joanne Klein
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsCillian Kieran
 

Similar a Mobile Device Management Policy Workshop Part 2 | CIO Executive Series (20)

A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docxCSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspective
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
 

Más de RedZone Technologies

RedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone Technologies
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...RedZone Technologies
 
Modern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEMModern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEMRedZone Technologies
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipRedZone Technologies
 
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...RedZone Technologies
 
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...RedZone Technologies
 
RedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile PresentationRedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile PresentationRedZone Technologies
 
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)RedZone Technologies
 
Move your Data Center to the Cloud
Move your Data Center to the CloudMove your Data Center to the Cloud
Move your Data Center to the CloudRedZone Technologies
 

Más de RedZone Technologies (13)

RedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and Transformation
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
 
Modern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEMModern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEM
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
 
CIO Scoreboard Overview
CIO Scoreboard OverviewCIO Scoreboard Overview
CIO Scoreboard Overview
 
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
 
RedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile PresentationRedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile Presentation
 
RedZone Testimonials
RedZone TestimonialsRedZone Testimonials
RedZone Testimonials
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
 
Move your Data Center to the Cloud
Move your Data Center to the CloudMove your Data Center to the Cloud
Move your Data Center to the Cloud
 

Último

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Último (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Mobile Device Management Policy Workshop Part 2 | CIO Executive Series

  • 1. Mobile Device Management Policy Workshop Part 2 Presented by The CIO Executive Series Moderators: Bill Murphy & James Crifasi
  • 2. RedZone’s CIO Executive Series TOP IT Executive Network specializing in bringing CIO’s together to collaborate, network, and stay current on industry trends. Just under 300 senior C-Suite IT executive members Founded in 2000 | 13 years of experience bringing CIO’s together Host a number of events – both virtual and physical – each year Host a “Special Event” annually | Past events have included: A Golf Outing, Dinner & Receptions
  • 3. About Bill Murphy President and Founder • RedZone Technologies • ThunderDG • MA DR Solutions • Beyond Limits Magazine Keep In Touch With Bill: @TheRedZoneCIO CIO Executive Series Group billm@redzonetech.net Live Tweet from the event! @TheRedZoneCIO
  • 4. About James Crifasi • CTO of RedZone Technologies • Co-founder ThunderDG • Co-founder MA DR Solutions • University of Maryland Graduate | B.A. Criminology & Criminal Justice | B.S. Computer Science – Algorithmic Theory & AI | M.S. Interdisciplinary Management • Keep In Touch With James: jcrifasi@redzonetech.net
  • 5. Sponsors RedZone Technologies Assessment: IT Architecture and Design Integration: Security | Disaster Recovery | Infrastructure Managed Service Programs Cloud Brokerage (410) 897-9494 www.redzonetech.net ThunderDG Employee Policy Management, Education, and Awareness www.thunderdg.com
  • 6. About The Companies/Policies • ABC Company • Structural Group • American Chemistry Council
  • 7. Topics To Be Covered • Remote Wipe • Data Back Up • Device & Carrier Coverage • Organizational Processes & Protocol • Education & Policy • Company Issued Devices • Mobile Device Use While Driving • Signature Requirements • Specifying Solutions • Food For Thought
  • 8. When To Remote Wipe • ABC Company’s policy is very protective of company data • Allows for remote wipe if the device is lost or stolen, the user is terminated, or in the event that the company cannot reach the user • Users need to be diligent in answering their phone or it could be wiped • STRUCTURAL has a slightly more user-friendly approach than ABC Company’s • Similar to ABC Company’s but does not allow for remote wiping in the event that the company cannot contact an employee • Users need to only fear the notion of losing their device or having it stolen, which people naturally fear regardless of the data being stored on their devices • The American Chemistry Council’s policy is the most simplistic • Will only “Remote wipe (in the event a mobile device is lost or stolen)” • Users need to only fear the notion of losing their device or having it stolen Under what circumstances would your org remotely wipe a device?
  • 9. Company Data Only Wipe Vs. Entire Device • ABC Company specifies that all data will be wiped from the device • STRUCTURAL specifies that only corporate data will be wiped, but there is a chance some personal data may be lost in the process • The American Chemistry Council doesn’t specify at all *Note: the extent to which your organization wipes a device depends upon how your company data is set up to be viewed and interacted with on the users’ mobile device* STRUCTURAL ABC Company What type of remote wipe is your organization equipped to perform?
  • 10. Data Backup • ABC Company encourages data back up, but prohibits the backup of corporate data • STRUCTURAL encourages users to back up their personal data, but does not address the backup of corporate data • The American Chemistry Council doesn’t mention data backup From a user standpoint, it’s important to know and understand your organization’s stance on data backup so you can protect yourself against loss of your personal data without violating any of your company’s policies. ABC Company STRUCTURAL What is your organization’s policy on data backup? What about company data?
  • 11. What Exactly Are You Protecting Against? • ABC Company’s Remote Wipe Waiver seems to be written more to protect the company against data loss • Extra coverage to include wiping if employee goes MIA • Specific mention of the prohibition of backing up corporate data • STRUCTURAL’s Remote Wipe Waiver seems to be more directed toward protecting the user against data loss • Wipes only corporate data, unless otherwise requested by the user • No mention of backing up corporate data • Encourages users to back up their personal data regularly, just in case • Offers the option of a full wipe to protect personal data • The American Chemistry Council simply states that it will wipe a device in the event that it is lost or stolen • Seems to be written more so to spell out which job roles are eligible for company-issued devices vs personal devices used for business What are your organizational needs? Need more company data security, increased ability to protect personal data, or both?
  • 12. Implied VS Expressed Approach • ABC Company provided a summary before the signature line that outlines what exactly the user is agreeing to by signing the Remote Wipe Waiver • STRUCTURAL & The American Chemistry Council simply states the policy and has a line at the end of the document for a signature – leaves more room for interpretation Is it better to spell a policy like this out or leave some room for interpretation?
  • 13. Remote Wipe Policy | The Different Formats • ABC Company & STRUCTURAL both have their Remote Wipe Waivers as separate documents from their Mobile Device Policy • The American Chemistry Council has mention of the remote wipe waiver within their Mobile Device Policy American Chemistry Council ABC Company STRUCTURAL What approach to a remote wipe policy applies best to your organization? A separate document or a clause in the existing MDM Policy?
  • 14. Explanation of Terms • ABC Company & STRUCTURAL – policy & clarification • State the purpose of a Remote Wipe Waiver & under what circumstances a device would be wiped • The American Chemistry Council – policy only • simply says that by signing the policy, the employee allows IT to remotely wipe the device ABC Company American Chemistry Council Which would be the most ideal way to present a Remote Wipe Policy to your organization?
  • 15. Device Coverage • ABC Company & STRUCTURAL both provide a list of the types of devices that their MDM policies cover (same items in both lists) • The American Chemistry Council does not specify what mobile devices are covered, but reads as though it is specific to Smartphones (especially since it lists accepted wireless carriers) What do you consider to be a “mobile device”?
  • 16. Carrier Coverage • ABC Company & STRUCTURAL do not specify what wireless carriers are covered • The American Chemistry Council specifically lists what carriers are permitted to be connected to their network Does your organization specify what carriers are covered on its network? If so, which ones?
  • 17. Organizational Protocols • The length and content of this section could depend on… • The size of your organization - Larger companies usually have more finely tuned processes/protocols • Whether or not your employees are allowed to opt-out of the MDM Policy – some companies allow certain users to opt out of an MDM Policy if they don’t understand or are not comfortable with its’ contents • The invasiveness of the IT department – Some IT departments may use your device to track time spent performing work-related tasks, while others may monitor usage to detect suspicious activity. If this is your organization, you should disclose. • The wordiness of the document – If there are multiple paragraphs that essentially say the same thing in various different ways, the contract is more open to interpretation and is, therefore, subject to more scrutiny when being argued in a legal setting
  • 18. Organizational Protocols • STRUCTURAL has the longest Organization Protocol section • The longer and vague a policy, the more open to interpretation it becomes, especially with respect to pursuing legal action • ABC Company has a slightly shorter Organization Protocol section • Not as long or as vague • More concise, less room for interpretation • The American Chemistry Council has no labeled “Organization Protocol” section; rather, the organizational protocol considerations are addressed in the “Security and Support” section • Simply states what department to contact in the event that a users’ device is lost or stolen Do you think the inclusion of organizational protocols in a different section of the MDM policy is a good idea? Why or why not?
  • 19. How Detailed is Your Organizational Protocol? ABC Company American Chemistry Council STRUCTURAL
  • 20. Specify Eligibility for Company Issued Devices • If you offer company-issued mobile devices, unless all members of your organization are eligible, the MDM policy should detail eligibility Does your organization supply any of its employees with company issued devices? If so, who is eligible?
  • 21. Reimbursement & Stipends • If your organization offers either of these, you will need to specify amounts in this part of the MDM Policy document Does your organization reimburse its employees (or offer stipends) for using their personal devices for business use?
  • 22. Mobile Device Use While Driving • Major legal issue • Want to be sure to address within the MDM policy somewhere; Coca Cola didn’t and it resulted in a $21 million law suit • The American Chemistry Council’s MDM Policy was the only one of these three that mentioned mobile device use while driving Is a section on mobile device use while operating a motor vehicle something you’ve considered for your MDM Policy?
  • 23. Signature Requirements ABC Company • ABC Company only requires the Employee Declaration at the bottom of its’ Remote Wipe Waiver and Mobile Device Acceptable Use Policies • ABC Company is utilizing an Employee Policy Management platform, so all signatures are electronic, rather than using the “sign- on-the-line” format
  • 24. Signature Requirements STRUCTURAL • STRUCTURAL, like ABC Company, only requires the Employee Declaration at the bottom of its’ Remote Wipe Waiver and Mobile Device Acceptable Use Policies • ABC Company is utilizing a “sign-on-the-line” format • More paperwork/less “green” • More complicated tracking
  • 25. Signature Requirements American Chemistry Council • The American Chemistry Council requires its employees to choose whether or not they want a company-issued device or use their personal device to access the network at the conclusion of its contract • ABC Company is utilizing a “sign-on-the-line” format What type of signature requirements does your MDM Policy have?
  • 26. Specifying Solutions • STRUCTURAL’s Acceptable Use Policy states specifically that they will utilize Airwatch’s mobile device management solution “to secure devices and enforce policies remotely” • What happens if Airwatch goes out of business or your financial department decides it’s too expensive and you need to find another vendor? • Would this be legally enforceable if STRUCTURAL switched vendors?
  • 27. Food For Thought • Use an Employee Policy Management web-based platform, like ThunderDG, which allows employers to… • Distribute the policies electronically, collect the e-signatures, and easily track what employees have signed which policies • Reinforce the policies through the Quiz Module so you can allow users to interact with the policies, which increases their likelihood of learning, understanding, and remembering them
  • 28. Food For Thought • Do you have a means for ensuring that all of your employees have read, understand, and remember your organization’s policies? • What about BYOD for PC’s? • If you protect your data and apps, why do MDM at all?
  • 30. Continue The Discussion Follow the CIO Executive Series Group on LinkedIn! Follow @TheRedZoneCIO on Twitter!
  • 31. Thank you for joining us for the Mobile Device Management Policy Workshop Part 2 Presented by The CIO Executive Series We’ll email you a link to the recorded Virtual Roundtable, as well as a written recap of what we discussed today, in the next few days!

Notas del editor

  1. How are we going to explain ABC company? Tech company? Credit Union? We need to at least define the industryLet each company give a brief description and intro their policy.
  2. How are we going to explain ABC company? Tech company? Credit Union? We need to at least define the industryLet each company give a brief description and intro their policy.
  3. ABC’s is strict because it specifies if the co can’t get ahold of you they can wipe your deviceSTRUCTURAL’s doesn’t include that clause, but still includes “termination” as a reason to wipe a deviceACC’s literally just says IT has the right to “Remote wipe (in the event a mobile device is lost or stolen)” – this may be because it’s more specifically related to those with company issued devices so termination isn’t an issue? ASK SAM WHY TERMINATION ISN’T MENTIONED. If need be, flip back to the last slide to show how it’s mentioned in the ACC contract.
  4. Should we assume ACC wipes the whole device?
  5. Should we assume ACC wipes the whole device?
  6. Should we assume ACC wipes the whole device?