BYOD Security Policy

840 Words2 Pages

Information security refers to combination of strategies, processes, tools and practices which are designed and implemented to prevent sensitive information from unauthorized access, use, disclosure, disruption or modification. Information security plays a major role in management of information systems. Information systems consist of three components which are hardware, software and network. Information security is characterized by three tributes confidentiality, integrity and availability (Yliopisto, 2014)

Confidentiality refers to preventing unauthorized access and disclosure of private and proprietary information. Integrity refers preventing unauthorized modification or destruction of information and providing authenticity. Integrity means …show more content…

Personal devices refers to devices that are owned by an individual and not provided by the organization. The devices are also referred to as mobile as they can easily be moved or transported from one place to another. These devices are also capable of accessing wireless networks such as broadband networks, Bluetooth and Wifi networks (Twinomurinzi et al., 2014).

Every organization that has adopted BYOD must also implemented BYOD security policy. BYOD security policy clearly states all the objectives and constraints related to the usage of organizational assess through the use of mobile devices. It describes all activities that are allowed on the devices when are connected to organization network. BYOD Policy should be clear with regard the platforms to be used, services, risks and support or responsibilities and minimum device requirements(Dhingra, 2016)
2.2 Related …show more content…

While the portability of these compact mobile devices brings many benefits to employees, they are easily lost or stolen. The lost data may lead to tarnished reputations on an organization, loss of competitive advantage and potential litigation issues. Mobile devices loss and theft have become one of the biggest information security risks. Security breach on the mobile device can be expensive to the employee and the organization (Tu et al., 2011).

Individuals find it difficult to have a true boundary between work and home life and that they spend time sharing personal and business information on social networking sites. This is the result of high usage of mobile devices. Mobile devices offers employees all capabilities of social networking. Social networks also increase the risk of information security. Organisations have buried their heads in the sand over the use of social networks and mobile technology in the workplace and need to start dealing with the risks (Colwill,

Open Document