Shadow IT: Enterprise Risk of Hidden Technology in the Workplace

01 July 2017 Publication
Authors: Edward H. Block

Texas Lawyer

Edward H. Block, attorney in Gardere’s litigation practice, published an article in Texas Lawyer on the ramifications of – and safeguards against – employees installing rogue hardware or software onto their company’s computers. While the employee might have good intentions, such actions might be in breach of compliance requirements.   

“Clearly one of the first steps in combatting shadow IT is to establish policies to address unauthorized implementation of computer software, hardware and services. Such a policy should also be closely tied to the organizations' bring your own device (BYOD) policy and address how employees can seek approval for apps on mobile devices,” writes Block. “Publishing a list of ‘approved’ apps is a good practice.”

A former chief information security officer, Block frequently writes and speaks on cyber security issues, and holds dual certifications by the International Association of Privacy Professionals. 

Subscribers can view the entire article here

Related Services

Insights

Do You Know What IMMEX Stands For?
16 July 2019
Dashboard Insights
Does The U.S. Need STRONGER Patents?
16 July 2019
PTAB Trial Insights
California Establishes Fund to Combat Wildfire Threats
15 July 2019
Renewable Energy Outlook
There’s No Place Like Home – But Is That a Reasonable Accommodation?
15 July 2019
Labor & Employment Law Perspectives
Review of 2020 Medicare Changes for Telehealth
11 December 2019
Member Call
2019 NDI Executive Exchange
14-15 November 2019
Chicago, IL
MAGI’s Clinical Research Conference
29 October 2019
Las Vegas, NV
Association for Corporate Counsel Annual Meeting 2019
27-30 October 2019
Phoenix, AZ