/
MISA Mobile Summit MISA Mobile Summit

MISA Mobile Summit - PowerPoint Presentation

collectmcdonalds
collectmcdonalds . @collectmcdonalds
Follow
343 views
Uploaded On 2020-08-27

MISA Mobile Summit - PPT Presentation

February 27 th 2013 BYOD the Consumerization of IT Top 10 Legal Challenges in Creating a BYOD Policy Lou Milrad BA LLB IT Lawyer amp AbD Municipalities ID: 806048

policy byod amp device byod policy device amp employees legal information employee licensing data personal liability company software organization

Share:

Link:

Embed:

Download Presentation from below link

Download The PPT/PDF document "MISA Mobile Summit" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

MISA Mobile Summit February 27th, 2013

BYOD - the Consumerization of ITTop 10 Legal Challenges in Creating a BYOD Policy

Lou Milrad BA, LLB.IT Lawyer & AbD – MunicipalitiesMilrad Law

Slide2

The Reach of Consumer Tech in Business & GovernmentIn Minneapolis, BYOD is BetterBring-your-own-device policies allow government employees to use their iPads for both professional and personal purposes.

Leeds City Council Opens Doors To BYOD TrendLeeds City Council has embraced the BYOD trend after it opted to become agnostic to mobile handsetsiPhones and iPads have totally changed how this police department works

The State of BYOD in Local Government: 3 CIOs Speak Out - If managed properly, BYOD can be a win both for IT and for end users.Guelph upgrades network for Bring Your Own Device

(BYOD) policy

PepsiCo

took a chance and gave iPhones to 4,500 hourly employees -- and it's paying off

Slide3

Legal and Policy Considerations and Challenges Legal PerspectiveIt’s all about potentials downstream liability tothe organization itself,

its employees & external advisors, and tothird parties.

Slide4

BYOD & the Age of Infographics

Slide5

PoliciesAUP- Acceptable Use PolicyBYOC – Bring Your Own ComputerBYOD – Bring Your Own DeviceBYOPC

– Bring Your Own PCMDM – Mobile Device Management

Slide6

Key Legal Challenges1. Data Security and Protecting Data Integrity2. Prohibition against "jail breaking" or “rooting” 3. Confidential Information4. Electronic communications, document preservation and evidentiary obligations5.

Insurance and Liability Considerations6. General Duty of Care7. Privacy (Personal Information)8. Employee – Employer relationship9. Training & education10. Licensing & Intellectual Property Rights

Slide7

“We've now gone from mainframe computers to desktops and on to the coffee shop."

Slide8

1. Data Security and Protecting Data IntegrityAll about the data, and not the device and separation of personal from business Employees need to know about what constitutes acceptable use Restricted access to Confidential InformationUp-front employee’s consent to remotely wipeRules about loading of third party apps – do they need to be first vetted?Rooting & Jail breakingUse of device by family members

Slide9

2. Prohibition against "jail breaking" or “rooting” Why? Potential third party liability to both Organization and Employee by

Bypassing digital rights management restrictions & enterprise safeguards thereby opening the gateway toSharing copyrighted media; Providing direct access to the file system, user interfaces, or network-based capabilities that are otherwise hidden or locked;

Some curious-minded developers wish to gain root access to Learn more about how the OS works, or Scour the device and

applications for exploitable vulnerabilities (and which might well include firewall bypass apps).

Slide10

2. Prohibition against "jail breaking" or “rooting” (Cont’d)Associated Concerns with Unreviewed Apps & Possible ImpactIntroduction of malware Shortened device battery life through battery drain and destabilized operating environmentUnreviewed applications with privileged access drain battery life and destabilize the operating environment;Additional or unwanted functionality through App updating processPossible voidance of manufacturer’s warranty or violation of the carrier’s service terms . Potential risk of carrier throttling for BYOD.

Employees need to be briefed on underlying rationale in support of this prohibition

Slide11

3. Confidential InformationHow broadly or narrowly will it be defined in the policy? Defining Characteristics of Confidential Information: Typically includes intangible assets (and associated materials) such as trade secrets, designs,

processes, programs, procedures, third party Information, developments, disclosed under terms of a software license or services agreementBreach of Confidentiality: Legal obligation of employees to respect the organization’s intangible assets, business and trade secrets etc. and maintain their confidentiality both during and after term of employmentConfidentiality & Non-Disclosure Agreements (NDA’s)Provision for application certificates, screen protection, encryption and remote-wipe capabilities? Geo-fencing

Slide12

4. Electronic communications, document preservation and evidentiary obligationsIT LEADERS NEED TO BE MINDFUL OF GENERAL LEGAL REQUIREMENTS GOVERNING ELECTRONIC COMMUNICATIONS AND E-COMMERCEDocument Retention (and Destruction) laws and policies as well as those pertaining to digital evidence.Document retention requirements arising under private contracts, as well as under diverse statutory schemes that include provincial and federal and corporation acts, income tax as well as privacy-related legislation.

Legal retention requirements may also apply to documents comprising employment records, workplace safety, and pension benefits. Legal Framework for introducing into evidence any Electronically stored information (ESI). Civil or criminal matter, there’s a legal framework for introducing into evidence any electronically stored information (ESI).

Slide13

5. Insurance and Liability ConsiderationsBYOD policy will need to consider how liability will be apportioned between the individual and the organizationIt is necessary to identify in a BYOD policy whether the user or company will be liable for loss or theft of BYOD devices (particularly important if the organization’s insurance policies cover an employee-owned device being used under a BYOD policy.Review applicable insurance policies for coverage/non-coveragePay particular attention to the protection and compliance with all Intellectual Property

and licensing issues. Is the employee or organization to be responsible for lost or stolen devices? What about responsibility for malware or virus attacks on BYOD device? Does the employer’s existing insurance provide coverage for employee owned devices that are part of a BYOD policy? Who is to be specified as responsible for replacement upon theft or loss should employer’s insurance coverage not provide for employees device coverage

Slide14

6. General Duty of CareOur legal system recognizes that every person and every entity, whether public or private, has a general duty of care. Early implementation of a best practices approachMust embrace

appropriate employee education and trainingIn addition, carefully drafted liability disclaimers can to a certain extent reduce general liability. The BYOD strategy and resulting policy should always reflect a keen observance of this general duty of care.May well preclude your organization from third party liability, financial or otherwise, arising through employees’ or consultants’ personal failure to comply with all applicable regulatory, privacy, IPR and confidentiality obligations.

Slide15

7. Privacy (Personal Information) Makings of a perfect storm with the convergence on one device of both personal and corporate data Presents a complication - the trusteeship by the organization of personal information of the person using the BYOD device coupled with possible access, handling and disclosure of personal information of others stored on the corporate servers. A workplace surveillance strategy may also be envisioned and in which event, employers will need to have in place, and made easily available and accessible, a data surveillance policy.

Will the company be permitted access to an employee's own emails and text messages (SMS) on a personal smartphone or tablet used by that employee for work? And what about browsing history, installed software and other data?

Slide16

8. Employee – Employer relationship Employees are obligated to respect the company’s confidential information, including business and trade secrets, lists of sales leads, and other proprietary data and to keep and maintain the confidentiality of such corporate assets after termination of an employment contract. Criminal prosecution may result from any failure to maintain the confidentiality of such information, particularly if intentionally misappropriated. In addition, companies often require employees, consultants, contractors, and freelancers to sign confidentiality agreements (NDA’s) to establish a legal framework for non-compliance.

Organizations become challenged in gathering proof of a breach of confidentiality and enforcing policy when people store any such proprietary data on their own personal iPhones, Androids, and other smartphones or tablets. Therefore, an absolute requirement of a BYOD policy needs to require employees (and project consultants, etc.) to permit the company to check out their device when they leave the company to make certain that all confidential information has been deleted. The actual timing of the checking procedure becomes a critical factor.

Slide17

9. Training & EducationImplementation and adherence to a policy can only be effective if there has been proper training and education for employees and those others having access to corporate information. Organizations are well advised to organize programs that will serve to familiarize employees with the strategy and with the thinking that preceded implementation of the BYOD policy.

Slide18

10. Licensing & Intellectual Property RightsWatch out for software licensing infractions:The enterprise’s various software applications may be licensed to the company under a variety of software proprietors’ individual or collective strategiessoftware and service services providers typically have fairly comprehensive and detailed fees-based licensing structures and charges that range from a per user, or per device type of license, to a number of users concurrently accessing the software from a single location, through to an enterprise wide arrangement.

Slide19

10. Licensing & Intellectual Property Rights (Cont’d)Enterprise Licenses - Review underlying licensing terms of the organization:Critically important to spend time carefully reviewing the terms of use under such applicable licenses to ensure that corporate implementation of BYOD technologies will not breach the licensing terms in place with the software and providers. Allowing employees to use company applications on their own devices, for example, may breach the company’s current licensing agreement.

Slide20

10. Licensing & Intellectual Property Rights (Cont’d)BYOD Licenses - Consider also the licensing terms for the BYOD applications and the accompanying licence rights:what are the limitations, to whom do they apply (largely dependent on whether it is the company or the employee that signs up with the provider), and are they, or will they be in violation of any existing third-party contracts or corporate policies? It is incumbent upon the organization, as well as the employee, to mitigate against potential intellectual property and contractual claims from third parties.

Slide21

Top 10 Legal Challenges in Creating a BYOD Policy

Slide22

Contact InformationLou MilradIT LawyerMilrad Law Officelou@milrad.ca 647.982.7890

www.milradlaw.ca