The illusion of privacy in the ever-changing world of technology is a growing issue for businesses and startups. Trends such as big data and BYOD (“Bring Your Own Device”) present increased compliance risks that employers and employees may not be ready to handle.
As part of Philly Tech Week 2014, Pepper Hamilton‘s Emerging Growth Practice Group – which provides legal counsel to entrepreneurs, startups and early stage companies – is hosting an event called “BYOD – Bring Your Own Device: Liability and Data Breach Sold Separately” today, Tuesday, April 8, from 10:00 a.m. to 12:00 p.m.
RSVPPepper Hamilton also hosted an event called “Between You, Me and Mark Z.: The Illusion of Privacy in Social Networks and What My Company and I Can Do About It” Monday.
The “Bring Your Own Device” (BYOD) trend has risen dramatically in the last year, but with its increased use comes risks that employers and employees are not equipped to manage. Employers should practice the following in order to avoid unnecessary legal implications:
- Know your data. Companies should be aware of the type of data – particularly regulated data like health or financial information – that can be stored on or accessed by employees on their mobile devices and whether or not it can be transferred to cloud-based file-sharing applications.
- Know your employees. Companies should know and keep track of which employees really need access to sensitive company data from their mobile devices and what use such employees need to make of the data. It is also important to ascertain which of those employees are entitled to overtime payments.
- Tell your employees. It is important to devise a clear BYOD policy, which will preferably be a stand-alone document. The document should clearly address issues, including the following, and will seek the employees’ consent for the provisions:
- Who is eligible to the program and entitled to bring their own device
- Regulated data on mobile devices should be handled as sensitive and confidential information
- Have strong security measures on the mobile phone (strong password, encryption and segregation of data)
- End-of-term policy – return of the device and remote wipe of the information
- Train your employees. The force and effectiveness of a BYOD policy should be integrated and maintained through employees’ continuous training of the provisions within the policy as well as the privacy and data security aspects underlying the policy.
Before you go...
Please consider supporting Technical.ly to keep our independent journalism strong. Unlike most business-focused media outlets, we don’t have a paywall. Instead, we count on your personal and organizational support.
3 ways to support our work:- Contribute to the Journalism Fund. Charitable giving ensures our information remains free and accessible for residents to discover workforce programs and entrepreneurship pathways. This includes philanthropic grants and individual tax-deductible donations from readers like you.
- Use our Preferred Partners. Our directory of vetted providers offers high-quality recommendations for services our readers need, and each referral supports our journalism.
- Use our services. If you need entrepreneurs and tech leaders to buy your services, are seeking technologists to hire or want more professionals to know about your ecosystem, Technical.ly has the biggest and most engaged audience in the mid-Atlantic. We help companies tell their stories and answer big questions to meet and serve our community.
Join our growing Slack community
Join 5,000 tech professionals and entrepreneurs in our community Slack today!