Wall Street & Technology is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Infrastructure

04:30 PM
Bryan Yurcan
Bryan Yurcan
Commentary
Connect Directly
Facebook
Twitter
Google+
RSS
E-Mail
50%
50%

The BYOD Challenge

Having a policy in place to manage mobile devices used by employees for work purposes is necessary in this current day.

Having a good BYOD in policy in place is critical for most companies in the current day, especially in the financial services industry. Employees using mobile devices that are connected to a corporate network, and that are privy to valuable and sensitive data, need to know exactly what protocols they should follow in using that device.

According to Nolan Goldberg, an intellectual property and technology counsel with Proskauer LLP, knowing the fundamental principles of information governance is key so that any BYOD policy can grow to handle whatever comes tomorrow in this world of rapidly changing technology. Firstly, he says it is important to note the difference between an organization giving out mobile devices for work use, as opposed to allowing employees to use their personal devices for work and store corporate data. Most companies have a mobile device management policy in place for the former, so it's that latter that requires a well-implemented BYOD policy.

InformationWeek Leadership Summit: Build Your CIO Chops

[Do you aspire to the C-suite, or some other spot in upper IT management? Then bulk up your credentials around today's most pressing IT movement, digital business, at the Information IT Leadership Summit.]

If an employee is allowed to use his personal device to gain access to a corporate network for work purposes, he needs to know the expectations of privacy and ownership of data that comes with that privilege, notes Goldberg. For example, if that employee leaves the company and corporate data needs to be removed, will the entire phone need to be wiped, thus causing the employee to lose personal data as well? These are scenarios that need to be addressed in a BYOD policy, Goldberg says.

Read the rest on Bank System & Tech...

Bryan Yurcan is associate editor for Bank Systems and Technology. He has worked in various editorial capacities for newspapers and magazines for the past 8 years. After beginning his career as a municipal and courts reporter for daily newspapers in upstate New York, Bryan has ... View Full Bio
More Commentary
A Wild Ride Comes to an End
Covering the financial services technology space for the past 15 years has been a thrilling ride with many ups as downs.
The End of an Era: Farewell to an Icon
After more than two decades of writing for Wall Street & Technology, I am leaving the media brand. It's time to reflect on our mutual history and the road ahead.
Beyond Bitcoin: Why Counterparty Has Won Support From Overstock's Chairman
The combined excitement over the currency and the Blockchain has kept the market capitalization above $4 billion for more than a year. This has attracted both imitators and innovators.
Asset Managers Set Sights on Defragmenting Back-Office Data
Defragmenting back-office data and technology will be a top focus for asset managers in 2015.
4 Mobile Security Predictions for 2015
As we look ahead, mobility is the perfect breeding ground for attacks in 2015.
Register for Wall Street & Technology Newsletters
Video
7 Unusual Behaviors That Indicate Security Breaches
7 Unusual Behaviors That Indicate Security Breaches
Breaches create outliers. Identifying anomalous activity can help keep firms in compliance and out of the headlines.