Making Bring Your Own Device (BYOD) And eDiscovery Work For Your Business

Making Bring Your Own Device (BYOD) And eDiscovery Work For Your Business

Making Bring Your Own Device (BYOD)

The latest challenges to your business’ eDiscovery policies and procedures may not be changes in the law but may instead be changes in your employees’ lifestyles: they have smartphones and they want to use smartphones to facilitate their work.

A 2011 study by IDC and Unisys showed that approximately 50 percent of respondents reported using personal devices to conduct business on vacation. This is great news for businesses and shows the advantages of allowing BYOD. Unfortunately, the same survey also indicated that 29 percent of respondents used the devices while in bed and around 20 percent while driving, statistics that are probably less heart warming.

And how are IT departments managing all of this? Survey respondents indicate that they now do less than they did in 2010 to secure mobile devices, including publication of social media guidelines (46 percent vs. 60 percent), required employee training (52 percent vs. 64 percent), usage of complex passwords (48 percent vs. 57 percent) and single sign-on (52 percent vs. 73 percent).

The same survey also revealed that three quarters of IT executives believe allowing personal devices increase employee morale and 72 percent say that employees who bring consumer devices into the workplace are more productive.

Does this mean you should leap into BYOD? Without fully understanding the potential pitfalls, you should probably not leap. In brief, your challenges to allowing BYOD are the following:

  1. You don’t own the device: you don’t control the device.

  2. There are lots of types of data that can be in play with BYOD.

  3. BYOD means data may reside in multiple locations. For example, copies of system emails that normally would only reside on a work machine will also reside on a smartphone or, thanks to said smartphone, be stored in the cloud

  4. Keeping data on these devices safe is difficult. Retrieving the data is near impossible.

As with most eDiscovery-related challenges, BYOD is best managed with a comprehensive policy to manage the program. A thoughtful look at ways to create policies and procedures that can safely allow BYOD into the workplace is covered in depth by this whitepaper from Intel.

Intel has established a service agreement for employees who want to engage in BYOD. The agreement spells out how eDiscovery requests will be handed from both the Intel and employee perspective. Through careful management of device settings, such as ensuring that devices are configured to save changes to the user’s corporate mailbox (instead of saving to the device or cloud-based storage associated with the device), the corporate servers will remain the best source of eDiscovery data collection.

When faced with eDiscovery as it applies to BYOD information, the more clarification that can be obtained about the requested information, the better off you will be. Work closely with your organization’s legal team to establish exactly what information is being requested. Narrow search parameters will save both time and any personal data that exists on the device in question.

And before you need to deal with eDiscovery, be sure that both the IT and legal departments have a good working relationship and that they engage in conversations about BYOD and all of its implications, including – but not restricted to – issues of eDiscovery.

By Jeff Patterson,

An entrepreneur in the field of technology, Jeff Patterson is driven to find ways to make technology a safer and more integrated part of daily life. A trailblazer in the area of K12 email and student safety, Patterson’s innovations have also led the way in data storage. His product, Gaggle Archive, provides inexpensive, cloud-based archiving that truly facilitates and simplifies eDiscovery. In 1999 he started his company, Gaggle, with one employee; the company currently has a staff of 50.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

What Technology Can Displace The Password?

What Technology Can Displace The Password?

The Future Password Many people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Let us think about what technology can displace the password. Some people might say that multi-factor authentications or ID federations will do it. It is not…

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

Next Generation of Cyber Security As I walked through RSA last week, I was struck by the usual fear laden messages “You’re not safe and never will be but I (vendor) have a silver bullet that will protect you.” And, I wondered if this fear-based approach is deterring a badly needed next generation of cyber…

Weighing in on Recurring Revenues to Tip Your Business’ Scale

Weighing in on Recurring Revenues to Tip Your Business’ Scale

Tip Your Business’ Scale CEOs, investors, analysts, and business advisors have fallen in love with the recurring revenue business model. In fact, when comparing like software companies, Wall Street gives 2x higher valuations for businesses with successful recurring revenue models in place. It’s no wonder that research indicates 50% of US businesses have already adopted…

Cyber Physical Systems (CPS) And BYOD Security

Cyber Physical Systems (CPS) And BYOD Security

Cyber Physical Systems (CPS)  Technology has changed the world radically. But, to date, the world hasn’t changed as fast as technology to. There are a couple of concepts that are concerning as we head into the reality of CPS-deployed systems. The first is that standards don’t exist. Many companies are considering the Bring Your Own…

3 Considerations To Help Businesses Navigate Cloud Implementation

3 Considerations To Help Businesses Navigate Cloud Implementation

Cloud Implementation Cloud computing technology has improved significantly in the past year, making it an appealing tool for businesses of all sizes. Cloud computing can benefit businesses in many ways, from cutting costs, to increasing business efficiency, to guaranteeing data recovery in case of an accident. In fact, 47 percent of medium and large enterprises…

How To Use Big Data And Analytics To Help Consumers

How To Use Big Data And Analytics To Help Consumers

Big Data Analytics Businesses are under increasing pressure to develop data-driven solutions. The competitive advantage gained by a successful strategy can be immense. It can create new opportunities and help businesses to react to different scenarios or sudden changes in the market. But innovation and resilience are not easily achieved, and organizations always face difficult…

How IRM Makes Cloud-Based File Collaboration “Security-Aware”

How IRM Makes Cloud-Based File Collaboration “Security-Aware”

IRM Cloud-Based File Collaboration  Data breaches and data loss due to insider threats, including malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks that keep managers up at night, according to new research by Ernst & Young. How can we ensure that the right people in an organization have the right access to…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising