partner, eversheds llp · finding workarounds already. if you try to ban byod entirely, you’re...

18
Your Panel: Paula Barrett, Partner, Eversheds LLP Hazel Polka, Assistant General Counsel, EMEAI, Beckman Kasey Chappelle, Global Privacy Counsel, Vodafone Group James Leaton Gray, Head of Information Policy & Compliance, BBC

Upload: others

Post on 17-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

Your Panel:

Paula Barrett, Partner, Eversheds LLP

Hazel Polka, Assistant General Counsel, EMEAI, Beckman

Kasey Chappelle, Global Privacy Counsel, Vodafone Group

James Leaton Gray, Head of Information Policy & Compliance, BBC

Page 2: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

• Update on key privacy issues

• In-house perspective on implementation of BYOD

• Lessons learnt and other take-aways – to read at your leisure....

Programme

Page 3: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not
Page 4: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

...you can’t stop the devices coming in!

Page 5: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

What’s all the fuss...

• March 2013 ICO Guidance - Balance BYOD programme with privacy obligations and other legal risks

• Data Controller responsibilities still in play

• “Corporate” personal data and “private” personal data – where is the responsibility line drawn?

• Lack of control over data device = Data Security Concerns? Greater (?) potential to lose/leak personal data as well as confidential business information

• What happens if there is a data security breach?

Page 6: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

• Operational and Technology Approaches

• Security issues – consider:

– use of ‘strong’ passwords to secure devices in addition to 4 digit pin

– file encryption

– automatic device locking

– remote wiping where device is lost/stolen – which data will be wiped and under what circumstances?

– secure backup

– virus protection

– PCI-DSS issues

Dealing with the risks

Page 7: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

Avoid creating more problems than you solve...

• Monitoring of employee communications:

– separation/ring-fencing of work-related and private information?

– key to inform employees of monitoring

– consider requirements/restrictions under interception/communications laws

– particular care needed in some EU countries e.g. Germany

• Don’t forget compliance with other DP principles

Page 8: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

Dealing with the risks

• Importance of BYOD policy/ToU:

– clear obligations on employees

– what happens if something goes wrong?

– controlled access – set rules and boundaries

– sanctions if breaches occur

• Acknowledgements & Consents? How valid?

• Effective communication and consistent enforcement of BYOD policy is key

• Educate employees – BYOD training

Page 9: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

BYOD and the art of balance -a panel discussion

Page 10: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

So you want to monitor?

Monitoring and Surveillance

Legislative considerations:

• Are you intercepting a communication? beware specific communications laws in several countries = e.g. UK, Germany, Switzerland and Belgium. Can be a criminal offence.

• Are you monitoring personal data = Data Protection Legislation

• Are you prejudicing right to privacy = Human Rights

• Data Protection Access Rights may bring monitoring to individuals knowledge

Page 11: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

SOME TAKEAWAYS....

Page 12: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

Lessons Learnt

• When implementing across Europe, one size does not fit all. Where possible, take local law into account in the design of your BYOD system to avoid having a mismatch between policy and reality later on.

• Don't try and design a policy to compensate for inherent weaknesses in the technology - it doesn't work.

• Ensure that you have the technical ability and resources to implement your policy. If you don't, you will face admin-heavy workarounds or even an inability to implement in some countries. (This might seem to be stating the obvious but it is one of the issues we have run into.)

Page 13: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

Lessons Learnt

• In today’s high-tech work environment, your employees are finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying.

• The BYOD question is not just corporate devices vs. personal devices –lots of people use work devices for personal uses and vice versa. Plan instead for solid ways to secure corporate assets on mobile devices no matter who “owns” the device.

• Technology is more important than policy. Your first priority should be finding a technical solution that segregates and protects corporate assets and making sure it works for everyone. With the right technical solutions, privacy implications can be lessened. For example, if a mobile device management tool can segregate corporate assets, personal assets can be left unaffected.

Page 14: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

Lessons Learnt

• Not all machines (or users) are equal. Make sure your policy recognises where the risks lie.

• Any BYOD system is going to be a compromise between perfect information security and ease of use by the business. Make sure you work out your red lines before the discussion begins.

• People are more important than technology. Make sure the policy will be understood and used by your staff.

Page 15: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

Suggested Actions

• Identify key stakeholders

• Conduct risk assessment

– security

– privacy

– litigation

– HR

– sector specific regulation

• Consider operational, technical and legal solutions

• Check your existing policy suite and be ready to amend/remove conflicts. Draft Terms of Use/Policy

• Training

• Audit

• Revisit: regularly

Page 16: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

Topics to address in BYOD policy or ToU

• Describe acceptable and unacceptable uses

• Duty to keep device and the data secure

– Specify minimum password strength, no jailbreaking etc

– Immediate reporting of loss, theft or other security incident

• Obligation to produce the device on request e.g. for security check, litigation

• Instances when wiping may occur e.g. exit, security incident

• Application of other policies

Page 17: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

Contacts

Paula Barrett, Eversheds LLP

email: [email protected]

+44 (0)207 919 4634

Hazel Polka, Beckman

email: [email protected]

Kasey Chappelle, Vodafone Group

email: [email protected]

James Leaton Gray, BBC - [email protected] ; or connect via LinkedIn

17

Page 18: Partner, Eversheds LLP · finding workarounds already. If you try to ban BYOD entirely, you’re creating more security risks than you’re remedying. • The BYOD question is not

© EVERSHEDS LLP 2013. Eversheds LLP is a limited liability partnership.