Describe issues surrounding BYOD policies.
What will be an ideal response?
BYOD (bring your own device) strategies enable employees to access company data from a personal smartphone, tablet, or laptop. Companies might adopt or allow a BYOD policy to save money on the cost of buying and maintaining devices. Employers might increase productivity by allowing employees to work in the environment in which they are most comfortable.?BYOD raises many privacy and security concerns. IT managers, security experts, and human resource directors work together to create and enforce a BYOD policy. BYOD guidelines should balance securing company data and preventing unauthorized network access with ensuring personal autonomy and privacy over employees' personal data. IT managers express concern over the potential need to service many different types of devices, if the company policy requires it to troubleshoot or secure employee devices.? A company's security team must protect company data. In some cases, employees must install a tool to remotely wipe data, including personal data, if the device is lost, damaged, or stolen. Human resource directors help devise guidelines regarding cost-sharing and how to protect employees' private data and activities. Some industries may not be able to allow BYOD, as it may violate data privacy laws.?Many companies ban certain apps, such as gaming or file sharing, because of concerns over malware risks. In many cases, employees must agree to back up data. Employees should protect the device with a password or biometric security feature. Some companies employ ageofence, which is a virtual perimeter or boundary, to disable certain apps or cameras in secure areas, such as labs or meeting rooms.
You might also like to view...
Items appearing in the parentheses of a calling statement are known as .
(A) call variables (B) call strings (C) parameters (D) arguments
A _________ is a one way relationship between a sender and a receiver that affords security services to the traffic carried on it.
A) SAD B) SPD C) SA D) SPI
Each type of data has special ____________________ characteristics that help to identify its purpose.
Fill in the blank(s) with the appropriate word(s).
An incremental backup _________________
a. Backs up only those files and folders that have changed since the previous backup, and marks those files as having been backed up. b. Backs up only those files and folders that have changed since the previous backup, and does not mark those files as having been backed up. c. Backs up all files, but only marks those whose contents have changed. d. Backs up all files that have changed other than system files.