October 2, 2012

International Data Privacy Legislation Review: A Guide for BYOD Policies

  • Enterprise mobility strategy must account for parameters set by local data privacy laws
  • Ovum on behalf of MobileIron

The spread of smartphones and tablets in the consumer market is having a big impact on the world of enterprise IT, with consumer-focused mobile devices making their way into the organization through the bring-your-own-device (BYOD) trend. IT departments are increasingly realizing that BYOD is happening whether it is officially sanctioned or not, and they are taking steps to address the trend with technology solutions that secure corporate data across a range of platforms and devices.

One important aspect of coping with BYOD that is getting less attention, however, is the impact of employee data privacy legislation and how this creates constraints for IT managers implementing a BYOD policy. Implementing a mobile device management (MDM) solution on a personally owned device will, in most cases, entail a certain degree of activity monitoring and access to data. This can leave the organization in danger of breaching its employees' data privacy rights and therefore open to a lawsuit. Enterprises are therefore presented with a dilemma: they must protect corporate data accessed on an employee-owned device, especially any sensitive customer data, as they will be liable in the event of data loss or misuse, but they must do so without invading the employee's right to personal data privacy.

This report offers guidance concerning privacy laws relevant to BYOD in eight major geographic markets, providing recommendations for and case studies of BYOD implementations. It also provides a framework around which to create a corporate mobility policy that helps ensure compliance with the law while protecting corporate data.

Download Paper


1 Comment

The spread of smartphones and tablets in the consumer market is having a big impact on the world of enterprise IT, with consumer-focused mobile devices making their way into the organization through the bring-your-own-device (BYOD) trend. IT departments are increasingly realizing that BYOD is happening whether it is officially sanctioned or not, and they are taking steps to address the trend with technology solutions that secure corporate data across a range of platforms and devices.

Get E-News and Notices via Email


  

 



  

I accept Webtorials' Terms and Conditions.

Featured Sponsor Microsites






















Recent Tweets

Archives

Notices

Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at https://www.webtorials.com/Sonus_logo.jpgreg/.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2015, Distributed Networking Associates, Inc.