Wednesday, February 10, 2016

Mobile Device Security Policies for Employers – Small and Large

As a business owner, perhaps you have seen articles about setting ground rules for BYOD (a.k.a. employees bringing their own devices to work to use for work purposes).  Placing restrictions on access to Company information, however, should not be limited only to those BYOD devices.  Instead, if the Company issues Company-owned devices to employees for use on Company systems, similar ground rules should be put in place to set expectations and provide the backdrop for any disciplinary action that may be needed later if an employee misuses Company information or loses an unsecured device.

Here are some questions to keep in mind as you develop policies for Company-owned devices issued to employees:

1.     Do you have an “Acceptable Use” policy in place?  Does it apply to both Company-owned and BYOD devices?
2.     Do you restrict the employee’s use of Company-owned devices?  (E.g., to be used for business purposes only, avoid storing personal information on the device, all information on the device shall be considered “owned” by the Company)
3.     Have you retained the right to take back any equipment that an employee does not use properly?  Similarly, do you ensure that Company-owned devices are surrendered upon termination?
4.     Do you require strong passwords to secure all portable devices (both BYOD and Company-owned)?  (You should.  See, e.g., Eric Griffith, “How to Create Strong Passwords,” PC Magazine, Nov. 29, 2011, for some good tips.).  Once you require passwords, remind your employees not to tape them to the front of their devices – instead, suggest alternate ways of remembering the unique passwords they just created.
5.     What about using portable devices on public or unsecured networks? (For instance, at the coffee shop while waiting for that triple-shot latte.)  Have you provided guidelines and training to your employees to avoid disclosing Company-sensitive information across such public networks?  This is especially important if the information is mission critical or could destroy the Company’s tactical advantage if its competitor were to access it.
6.      Do you require employees to report immediately the theft or loss of a Company-owned device?  Prompt reporting allows the Company to block potentially damaging intrusion attempts or to change the affected employee’s passwords to prevent unauthorized access.  The Company’s hands will be tied if the employee does not report the loss until several days later.
7.     Do you provide rules about whether Company documents can be downloaded to external devices and under what circumstances?  Consider mobile device management software to control the downloading of Company information to the device, to track the location of Company-owned devices and to enable remote wiping if the device is lost or stolen.
8.     Who handles the system updates to the device?  The Company?  (Probably, unless it’s a BYOD device.)  The employee?  (Probably only if the device is personally owned by the employee.)  If it’s a Company obligation, then ensure that the device is accessible to the Company when needed (i.e., “on demand”) to fulfill this requirement.
9.     Will the employees’ family members be accessing the device?  (More likely if it’s the only device in the house – less likely if there are other options available to the family.)  Consider restricting use of Company-owned devices to employees only.
10.  Do you prohibit the downloading of unauthorized content to the device?  Whether it’s pornography, another company’s trade secrets or pirated videos streaming the latest (copyrighted) episode of a favorite show, none of these things belong on most companies’ business equipment and could expose the Company to liability from a third-party who owns the rights to the content.
11.  Do you require encryption or password-protection when transmitting particularly sensitive Company information to outsiders?  If not, you should.  Take everyone opportunity to protect the Company’s trade secrets and try to keep them from public dissemination.  Having a reliable system in place increases the changes that a court would conclude that the Company’s trade secrets are deserving of such protection in the event of a breach.
·       Notably, in the 2012 Target data breach, the large, well-funded entity (Target) was not the source of the leak that allowed hackers to steal thousands of customer credit card numbers.  Instead, it was the HVAC servicing company that had minimal security protocols in place and effectively acted as the front door to enable the hackers to steal the data over a surprisingly long period of time. 
12.  Does the Company have record-keeping requirements (statutory, regulatory, etc.) that would apply to an employee’s use of a portable device?  Are employees who work remotely required to keep Company records and maintain certain Company files?  If so, consider implementing rules identifying when such record keeping should occur and provide guidelines for destroying extra copies or other pages that the employee might otherwise throw out in the trash at a remote site.  (Some states have “safe destruction of documents” laws intended to reduce the likelihood of identity theft or other unauthorized access of personally-identifiable information.)
A few closing thoughts – take every precaution to keep Company data secure.  Always require the installation and use of anti-malware/anti-virus and other security tools to limit a potential thief’s ability to misuse the Company’s data or to leave code behind that continues to collect the data even after the potential thief has appeared to withdraw. 

The more conscientious you are about keeping Company data secure, the more likely you are to avoid severe consequences (or at least reduce them) in the event of a data breach – whether the breach is caused by the concerted efforts of outsiders or by wrongful conduct of your own employees or by unintentional mishaps (such as the employee leaving the device in the back of a cab during a hectic business trip).  Watching the doors is always worthwhile.
Copyright (c) 2016, Christina D. Frangiosa, All Rights Reserved.

No comments:

Post a Comment

Please note that all comments are moderated, so there may be some delay between when you post a comment and when it appears here. If you are concerned that your comment has been misdirected, please e-mail me for confirmation. Thanks for your patience!

Non-English language comments and comments bearing embedded URLs will be rejected. All apologies for the inconvenience.