Bring Your Own Device Doesn't Mean Bring in Security Breach

15 August 2014 Manufacturing Industry Advisor Blog

Bring-Your-Own-Device (“BYOD”) policies have been picking up steam because of increased productivity, improved communications, and the need for employees to work remotely. However, when implementing any BYOD policy there are many pitfalls that accompany these benefits. In some cases, corporations, including manufacturers, overlook risks associated with their current (or lack of) BYOD policies. Here are a few best practices that can minimize some of the risks associated with BYOD policies.

  1. Management Must Understand the Company’s BYOD structure. It is all too easy for a company to reap the financial benefits which come from telling employees “Sure, you can use your own device at work!” as a way to reduce the company’s expenditures on hardware and software.  However, such a decision cannot be taken lightly. Management should solicit input from each functional area of the business to assess the full impact of implementation. It should be obvious that the IT department plays an integral role in implementation but each level of management, including supervisors, must also be involved.
  2. BYOD Policies, Guidelines, and Compliance Should Be Mandatory. Clear written policies and guidelines should be distributed. Counsel should review the policies before finalizing and distributing the documents. More importantly, effective implementation must be more than handing out a new written policy and must involve face-to-face training and communications where employees can ask questions. Ideally, like employment agreements, BYOD policies should be signed by each employee.
  3. BYOD Policies Should Address Devices’ Many Functions. Consider which uses of GPS receivers, cameras, audio recorders, video recorders, mobile storage capacities, and any other tracking/data capturing functionalities should be permitted or prohibited. For example, consider disabling copying from a local drive to a usb/miniusb port connected to a mobile device so as to avoid either the intentional or inadvertent loss of the manufacturer’s data. Also consider prohibiting the taking of photographs inside your manufacturing plant as a way to protect your technology.
  4. Prepare and Incorporate Data Loss Strategies. Despite the best laid plans, data loss WILL occur, so you should plan for it in advance. The need to protect information cannot be overstated.  Getting employees to promptly tell you they have lost their device is the first practical hurdle to overcome. Thus, while developing BYOD policies, companies should create plans to address lost or stolen devices.
  5. Executives Must Be Included. Top-level personnel access the most sensitive information and operate with less supervision than others. So BYOD policies must include provisions to ensure even the most senior individuals adhere to the policies.  After all, these are the folks that “hold the keys to the company safe.
  6. Security Principles to Consider. When drafting or updating your BYOD policy, include provisions incorporating security best practices. For example, passwords should be changed every 60–90 days and should not be associated with social media profiles. Also, business data transferred to and from devices should occur via highly secure connections.

As technology continues to evolve, so must your policies. As technology becomes more integrated, your employees may insist on incorporating devices into their work lives. No BYOD policy is one-size-fits-all, but following these best practices will help create a foundation to mitigate the substantial risks associated with devices becoming ubiquitous business tools. 

This blog is made available by Foley & Lardner LLP (“Foley” or “the Firm”) for informational purposes only. It is not meant to convey the Firm’s legal position on behalf of any client, nor is it intended to convey specific legal advice. Any opinions expressed in this article do not necessarily reflect the views of Foley & Lardner LLP, its partners, or its clients. Accordingly, do not act upon this information without seeking counsel from a licensed attorney. This blog is not intended to create, and receipt of it does not constitute, an attorney-client relationship. Communicating with Foley through this website by email, blog post, or otherwise, does not create an attorney-client relationship for any legal matter. Therefore, any communication or material you transmit to Foley through this blog, whether by email, blog post or any other manner, will not be treated as confidential or proprietary. The information on this blog is published “AS IS” and is not guaranteed to be complete, accurate, and or up-to-date. Foley makes no representations or warranties of any kind, express or implied, as to the operation or content of the site. Foley expressly disclaims all other guarantees, warranties, conditions and representations of any kind, either express or implied, whether arising under any statute, law, commercial use or otherwise, including implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Foley or any of its partners, officers, employees, agents or affiliates be liable, directly or indirectly, under any theory of law (contract, tort, negligence or otherwise), to you or anyone else, for any claims, losses or damages, direct, indirect special, incidental, punitive or consequential, resulting from or occasioned by the creation, use of or reliance on this site (including information and other content) or any third party websites or the information, resources or material accessed through any such websites. In some jurisdictions, the contents of this blog may be considered Attorney Advertising. If applicable, please note that prior results do not guarantee a similar outcome. Photographs are for dramatization purposes only and may include models. Likenesses do not necessarily imply current client, partnership or employee status.

Related Services

Insights