The trend of BYOD: 3 critical stages you have to consider


7 Dec 201583 Shares

Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Pin on PinterestShare on RedditEmail this to someone

Have you considered the complete employee life-cycle in your BYOD policy? Image via Shutterstock

Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Pin on PinterestShare on RedditEmail this to someone

In a second instalment on devising a BYOD policy, Mason Hayes & Curran examines the three key stages these policies must cover.

In part one of this two-part series on BYOD (bring your own device), we considered some of the common concerns companies have when thinking about, or implementing, BYOD in their organisation. This week, we examine the three stages of an employee’s life-cycle in the context of BYOD. In particular, we look at how these stages of the life-cycle can help to inform the company’s BYOD policy.

1. Beginning BYOD: disclosure is king

Employees have a reasonable expectation of privacy in the workplace. In Copland vs UK, the European Court of Human Rights held that by failing to notify the employee that telephone calls, emails or internet usage would be monitored, the employer violated the employee’s human right to privacy.

Because privacy and data protection are specific fundamental rights in Europe, if the employee’s device will be monitored, it is essential that the BYOD policy transparently explains the scope of access (ie what information the company will access) and the purpose of the access (ie why the company will access that information).

The policy should also address how the company will go about protecting the private information that it comes into contact with when carrying out monitoring. Drafting a BYOD policy does not give the company a ‘blank cheque’ to closely examine everything in the device. The monitoring of the device has to be proportionate to the stated reasons for the monitoring. For example, if the purpose of the monitoring is to ensure that employees do not spend company time on personal matters, then monitoring may not be appropriate on weekends.

Secondly, the policy should explain what measures the employee must take in order to protect the data on the device, such as encryption, password protection to access the device, and limitation on the types of company information that can be stored on the device.

Furthermore, the policy should discuss permitted use, including what content the employees are allowed to access from work. This will ensure that employees do not use the company network to access illegal or inappropriate material that can expose the company to liability, or material that heightens the risk of a network security breach.

In applying the BYOD policy, the company should ensure that employees are made aware of and clearly agree to it before approving the employee’s use of a personal device and before the company accesses any information on that device.

2. Working with BYOD: review, revise, remind

The BYOD policy should be a living document that changes as both technology and the company’s needs change. This can be achieved by following ‘the three Rs’:

  1. Periodically review the policy to make sure that it accurately reflects the ways personal devices are used in the company
  2. Revise the policy to account for the evolution of industry security measures and changes to privacy legislation
  3. Remind employees that they are bound to the terms of the BYOD policy

The BYOD policy should provide that the company reserves the right to make certain minor changes to the policy without specifically informing employees. Companies should clearly notify employees of any material changes to the policy that impact employee rights and responsibilities. This will avoid arguments that the employees were not on notice.

Additionally, companies should consider giving employees a grace period to adapt to substantial changes, and should let employees know that if they no longer agree to the policy they should refrain from using the device for work, and, optionally, may be required to deliver the device to IT to ensure that company’s proprietary information is properly and permanently deleted.

Likewise, if an employee decides to upgrade the device, the company may also require the employee to bring the old device to IT for evaluation.

To enable the company to minimise risk, employees should be required to immediately notify the company if they suspect a data breach has occurred. The BYOD policy should provide that the company can remotely wipe the device in the event it is lost or stolen in order to protect proprietary information.

Finally, the BYOD policy should discuss consequences for breach, such as employee liability for loss of proprietary company data or dismissal if a more serious violation occurs.

3. Checking out of BYOD

It is important to have the ‘end-of-life’ terms agreed in the BYOD policy in advance, since not all employees may leave the company on good terms and even those that do may be sensitive to having their personal device accessed at the end of the employment relationship.

In the US, common practice requires employees hand over their devices so that their contents can be reviewed and deleted as appropriate. This is a cumbersome exercise in itself and is actually resulting in decreasing use of personal devices by employees. This type of review is, however, unlikely to be permitted in Ireland or Europe due to the aforementioned protections on employees’ privacy rights, unless the BYOD policy explicitly permits this type of access and such permission is proportionate to the stated reasons for the access.

A company’s BYOD policy should explain that the employee is required to permanently delete all company and employee information from the device before the end of the employment term. Furthermore, the company should consider whether the employee will be required to bring the device to IT for evaluation as part of the exit interview.

Companies should also be prepared for a refusal by an employee to hand over his or her device and consider whether it is technically possible to remotely wipe company data from the device and whether such remote wiping would capture all data – including company confidential data or the personal data of other employees. This will largely depend on the device used by the employee and whether the company obtained the proper employee consents in the BYOD policy.

Other considerations may include whether the employee will be allowed to keep the phone number if the company owns the contract with the mobile network provider, and whether the employee will be required to sign a declaration confirming that all company information has been returned and/or destroyed.

Why you need a complete BYOD policy

Allowing BYOD without a BYOD policy can be a significant risk. The company can quickly lose control over its proprietary and confidential information, and could inadvertently breach its employees’ fundamental right to privacy.

In addition, even if the company has not sanctioned the use of personal devices for work, in all likelihood many employees are still putting company information on their devices. So, in the digital era, the age-old adage still holds true: by failing to prepare, you are preparing to fail. And, by failing to prepare a clear BYOD policy, an organisation is preparing for increased exposure to a security or privacy breach.

The content of this article is provided for information purposes only and does not constitute legal or other advice.

Tech Law is a weekly series brought to you by Irish law firm Mason Hayes & Curran, whose legal tech team advises the world’s top social media organisations and emerging start-ups. Check out www.mhc.ie for more.

Want stories like this and more direct to your inbox? Sign up for Tech Trends, Silicon Republic’s weekly digest of need-to-know tech news.

Personal device at work image via Shutterstock

66

DAYS

4

HOURS

26

MINUTES

Get your early bird tickets now!