Last week, I conducted a workshop on implementing a successful “Bring Your Own Device” (BYOD) program at the Canadian Institute’s Privacy Law & Compliance Conference. I met a wonderful group of privacy experts who had plenty to contribute to the discussion.
We talked about the benefits, risks and costs of permitting employees to use their personal device to perform work-related tasks, which typically includes accessing the company’s network. Over half the group was in the public sector and regularly handled very sensitive, confidential personal information.
The private sector attendees in the group had an equally strong concern about protecting highly sensitive and confidential business information. At the end of the day, most organizations, regardless of how open they may or may not be, require a certain level of security around their data, intellectual property and personal information.
So how to implement a successful BYOD program?