employment bring your own device (byod)

5
 Employment briefing April 2013 1 Bring Your Own Device (BYOD): an employer’s checklist Summary and implications Ask a question A YouGov survey, published last month, found that 47 per cent of UK adults use personal mobile devices, such as iPhones and tablets, for work purposes. However, it also found that only 23 per cent of employers formally regulate their use at work. If you have any questions please contact: Michal Stein, Employment Knowledge Lawyer T +44 (0)20 7524 6510 There are a number of advantages in allowin g staff to use personal devices for work. Increased flexibility, convenience, accessibility, productivity and higher morale are but a few. However, the practice also carries a number of real business risks, given that the device is owned by someone other than the employer. [email protected] or Belinda Doshi, Date Protection Partner T +44 (0)20 7524 6200 How you approach the issue of BYOD depends on the nature of your business, whether the practice offers you any real benefits, as well as your IT budget and capabilities. Ideally, you should look at this issue together with your legal advisers, HR and IT teams. Once your direction is clear, decide whether to adopt a formal policy (which may be linked to internal disciplinary, data protection and social media policies) or simply rely on technological solutions. Either way, we suggest you focus on the following three issues: [email protected] To view a copy of our recent Technology and Privacy briefing on BYOD, click here To view a copy of the Information Commissioner’s Office guidance on BYOD, click here  Protect sensitive and confidential business information .  BYOD usage means business information moves outside your IT system. You must retain ultimate control of the type of information employees access, how and where they access it and how secure the information remains. The Employment team To find out more about the team, and our capabilities click here  Comply with your data protection duties. Under the Data Protection Act 1998 (DPA) you remain liable for how personal data is processed and used. It is immaterial that an employee owns the device from which data is accessed. Take all appropriate technical and organisational measures against inappropriate processing and retention of personal data as well as any accidental loss, destruction or damage to it.  Keep associated costs under control . Be clear about who bears usage-associated costs, including day-to-day voice and data charges, technical support and repairs, roaming and apps installation costs as well as recovery of any personal content which may be lost.

Upload: gaurav-agarwal

Post on 14-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Employment Bring Your Own Device (BYOD)

7/30/2019 Employment Bring Your Own Device (BYOD)

http://slidepdf.com/reader/full/employment-bring-your-own-device-byod 1/4

 

Employment briefing

April 2013

1

Bring Your Own Device (BYOD): anemployer’s checklist

Summary and implications Ask a question

A YouGov survey, published last month, found that 47 per cent of UKadults use personal mobile devices, such as iPhones and tablets, for workpurposes. However, it also found that only 23 per cent of employersformally regulate their use at work.

If you have any questions pleasecontact:

Michal Stein, Employment KnowledgeLawyerT +44 (0)20 7524 6510There are a number of advantages in allowing staff to use personal

devices for work. Increased flexibility, convenience, accessibility,productivity and higher morale are but a few. However, the practice alsocarries a number of real business risks, given that the device is owned bysomeone other than the employer.

[email protected]

or

Belinda Doshi, Date Protection Partner

T +44 (0)20 7524 6200How you approach the issue of BYOD depends on the nature of yourbusiness, whether the practice offers you any real benefits, as well as yourIT budget and capabilities. Ideally, you should look at this issue togetherwith your legal advisers, HR and IT teams. Once your direction is clear,decide whether to adopt a formal policy (which may be linked to internaldisciplinary, data protection and social media policies) or simply rely ontechnological solutions. Either way, we suggest you focus on thefollowing three issues:

[email protected] 

To view a copy of our recentTechnology and Privacy briefing onBYOD, click here

To view a copy of the InformationCommissioner’s Office guidance onBYOD, click here• Protect sensitive and confidential business information. BYOD

usage means business information moves outside your IT system. Youmust retain ultimate control of the type of information employees

access, how and where they access it and how secure the informationremains.

The Employment team

To find out more about the team, andour capabilities click here

• Comply with your data protection duties. Under the Data ProtectionAct 1998 (DPA) you remain liable for how personal data is processedand used. It is immaterial that an employee owns the device fromwhich data is accessed. Take all appropriate technical andorganisational measures against inappropriate processing and retentionof personal data as well as any accidental loss, destruction or damageto it.

• Keep associated costs under control. Be clear about who bearsusage-associated costs, including day-to-day voice and data charges,

technical support and repairs, roaming and apps installation costs aswell as recovery of any personal content which may be lost.

Page 2: Employment Bring Your Own Device (BYOD)

7/30/2019 Employment Bring Your Own Device (BYOD)

http://slidepdf.com/reader/full/employment-bring-your-own-device-byod 2/4

 Employment briefing Bring your own device to work  April 2013

 

Keep your confidential information secure: decide the “who”,

“what”, “how” and “why” of BYOD usage

BYOD makes no sense if it compromises your confidential information.For this reason, you must decide in advance whether to permit BYOD

and if so, the appropriate safeguards to put in place.

BYOD usage means: 

The practice of employees and otherstaff using their own personal mobile

As ever, your employees must appreciate what business information isconfidential and how they may use it. As the risk of misuse andinadvertent leakage of confidential information increases with BYODusage, you need to decide early on:

devices (e.g. smartphones, tablets orlaptops) for business purposes, eitherwhile at work or elsewhere, andeither during working hours ornon-working hours.

1.  The nature of BYOD access you allow: will employees be limited toremotely connecting to your IT systems or will they be able to savedata on their own devices?

2. What devices may be used? Not all devices can connect to your ITsystem and different devices offer different levelsof security and anti-virus measures.

3. The type of information which may be accessedusing BYOD: firewall or otherwise secureinformation that is “off-limits”.

4. Who may access the information. Do you limitaccess to employees only? May agency workers,contractors or consultants use BYOD? And, withinthe categories of permitted users, do you limitaccess to certain categories of information, e.g. depending on roles orseniority? How to do you plan to deal with third party usage of thedevice (e.g. family members)? One option may be to require business

information to be stored in a certain way and have access limitations(e.g. password requirements).

A well-drafted BYOD policy will helpprotect your IT system, reduce the risk of 

deliberate or accidental loss of 

confidential information and minimise

reputational damage

5. How information will be accessed, used, stored and retrieved.Determine the necessary protections (e.g. regularly changedpasswords, pin numbers, encryption etc.). For example, you mayprohibit the use or downloading of personal data (such as names andaddresses) onto mobile devices. Adoptsophisticated security mechanisms. Make sure you continue to retain

ownership of any information created or

used on a BYOD – amend your contracts

of employment and policies to reflectthis

6. How are you going to deal with data leakage,whether accidental or intentional? Considerregistering all BYODs with a mobile device

management system which allows you toremotely wipe out data. Ensure you have robustmonitoring and access rights.

7. The need to terminate data access and use once the employmentrelationship breaks down or is terminated, or the device is sold ortaken for repair. Ensure you can physically access the device and haveremote deletion capabilities.

Finally, bear in mind that you are going to want to retain ownership of any information created or used on a BYOD. If necessary, amend yourcontracts of employment and policies to reflect this.

2

Page 3: Employment Bring Your Own Device (BYOD)

7/30/2019 Employment Bring Your Own Device (BYOD)

http://slidepdf.com/reader/full/employment-bring-your-own-device-byod 3/4

 Employment briefing Bring your own device to work  April 2013

 

You remain in control and liable for all personal data processing:

however and wherever it is carried out

Many of the issues you consider in relation toconfidential information are also relevant for data

protection. The crucial point to remember is that you,the data controller, have the ultimate responsibly fordata protection compliance by all those who access you personal data.

This means you must ensure that any employee whoprocesses personal data complies with the DPA’sprinciples and that you do the same when accessingpersonal content of the employee or others on his/her BYOD.

“It is important to remember that the

data controller must remain in control of 

personal data for which he is responsible,

regardless of the ownership of the device

used to carry out the processing”

(The Information Commissioner)

In particular, bear in mind the three obligations to:

• take appropriate technical and organisational measures againstunauthorised or unlawful processing and against accidental loss,destruction or damage to personal data;

• only process personal data for the purposes for which it was collected;and

How BYOD data is stored

Data processed via BYOD may be• not retain personal data for longer than is necessary. stored in one or a combination of 

the following locations:Specific steps you should consider taking to comply with the DPAinclude (in addition to the steps noted under the confidentialinformation section) the following:

• On the device.

• On a business server (or a privatecloud).1.  Specifically, identify the data you are willing to have accessed via

BYOD and the individuals who may access it. You may well decide toprohibit any access or downloading of personal and sensitive personaldata onto BYODs and, if so, adopt suitable technical solutions. If youallow access to such data, then consider very carefully by whom,where and via what channels (e.g. only an encrypted channel such asVPN)?

•  In a community or public cloud.

2. If you require all traffic containing personal data to pass through anencrypted channel, such as VPN, consider the monitoringopportunities this provides you and make sure you have employees’explicit consent to monitoring. Be very clear if you intend to monitorusage by family members or other persons withaccess to the device.

3. Remind employees that they may only usepersonal data for corporate purposes. Ensuresanctions are appropriate to deal with intentionalas well as inadvertent breaches. Provideappropriate training on a regular basis.

4. Whilst you must be able to carry out safe andsecure deletion of personal data throughout thelifecycle of the device, if you use a mobile device management service(which allows you to track the device in real time), make sure you onlyuse the data the device generates for the specified purpose. This willnormally exclude using the data for monitoring purposes.

Remind employees that they may only

use personal data for corporate purposes.Ensure sanctions are appropriate to deal

with intentional as well as inadvertent

breaches

5. Take all reasonable steps not to access, copy or use any personalcontent held on the device, except where permitted by the DPA. If inadvertent access/copying takes place, ensure it is remedied swiftly(e.g. data is deleted).

3

Page 4: Employment Bring Your Own Device (BYOD)

7/30/2019 Employment Bring Your Own Device (BYOD)

http://slidepdf.com/reader/full/employment-bring-your-own-device-byod 4/4

 Employment briefing Bring your own device to work  April 2013

 

Finally, bear in mind that you may receive a data subject access request,which may require you to examine a BYOD or otherwise confirm suchdevices do not contain relevant information.

Identify BYOD usage costs and establish who is going to bear them

Broadly speaking, BYOD usage costs fall into three categories:

1.  Day-to-day running costs, including voice and data charges. Decide inadvance whether the employee bears the full cost or whether you willreimburse him/her for a portion of the expense.

2. Technical support, repair and maintenance. Are you willing and able,and does it make business sense, to offer any of these in-house?This option may be cheaper and help maintain confidentiality anddata protection compliance.

BYOD and roaming charges 

A recent article in the New York Timesdescribed the roaming costs challenges3. Responsibility for loss of any personal content. If you were to

remote wipe a device, the process may lead to loss of personalcontent, such as downloaded music and videos, personalphotographs etc. Are you willing to assume responsibility for theloss? If so, to what extent?

faced by Coca-Cola. EU-wide costswere so prohibitive, the companyforbade its 2,000 European-basedcross-border employees from usingeven basic device features such asemail and Skype. GlaxoSmithKlineFinally, if any of your employees travel overseas, agree in advance

whether you permit roaming, whether you will pay for roamingcharges and whether payment will be limited to business use only.

Biological advised some 13,000 of itsemployees to avoid using mobilenetwork data when roaming, for thesame reason.

*This briefing has been produced on the author’s laptop whilstaccessing her workplace IT system.

London Sheffield Brussels SingaporeLacon House, 1 South Quay, 209A Avenue Louise, 50 Raffles Place,

84 Theobald's Road, Victoria Quays, 1050 Brussels, Belgium 22-01 Singapore Land Tower,Singapore 048623London WC1X 8RW Sheffield S2 5SY T +32 2 626 0740

T +44 (0)20 7524 6000 T +44 (0)114 279 4000 F +32 2 626 0749 T +65 6645 3280F +44 (0)20 7524 6524 F +44 (0)114 278 6123

Alliance firms

France Germany Italy SpainAugust & Debouzy GSK Stockmann + Kollegen Nunziante Magrone Roca Junyent,Gilles August Rainer Stockmann Gianmatteo Nunziante Miquel Roca Junyent,T +33 (0)1 45 61 51 80 T +49 (30) 20 39 07 - 0 T +39 06 695181 T +34 93 241 92 00www.august-debouzy.com www.gsk.de www.nunziantemagrone.it www.rocajunyent.com

Nabarro LLP

Registered office: Lacon House, 84 Theobald's Road, London, WC1X 8RW.

Nabarro LLP is a limited liability partnership registered in England and Wales (registered number OC334031). It is a law firm authorised and regulated by theSolicitors Regulation Authority. Legal services are provided in Singapore by the Singapore branch of Nabarro LLP. The branch is registered in Singapore under numberT10FC0112B and is licensed by the Attorney-General's Chambers of Singapore. A list of members of Nabarro LLP is open to inspection at the above registered office.The term partner is used to refer to a member of Nabarro LLP or to any employee or consultant with equivalent standing or qualifications in one of Nabarro LLP'saffiliated undertakings.

Disclaimer

Detailed specialist advice should be obtained before taking or refraining from any action as a result of the comments made in this publication, which are onlyintended as a brief introduction to the particular subject. This information is correct on the date of publication. We are not responsible for either the content of or thelinks to external websites that may become broken in the future.

© Nabarro LLP 2013

4