BYOD privacy: Are you being watched?

By , CIO |  Consumerization of IT, BYOD, privacy

Is your employer (a.k.a. Big Brother) tracking your every move through your "Bring Your Own Device" smartphone? Mobile technology makes it possible, and four out of five people believe this to be an invasion of privacy, according to a recent Fiberlink-commissioned Harris survey.

All the handwringing over employee privacy in the age of BYOD isn't just for show-that is, real fears exist.

Companies are drafting tough BYOD policies that give them the right to wipe data, install apps and monitor usage. With today's mobile technology, they can collect personally identifiable information. They can track your whereabouts during work and non-work hours using MDM (mobile device management) software, GPS and triangulation.

But wait a minute, you might say. Your BYOD smartphone only accesses corporate email through Exchange ActiveSync. What harm can come of this? Well, this simple connection still makes it possible for companies to remove personal files, pictures and music from your phone, according to Fiberlink.

Story: BYOD: Time to Adjust Your Privacy Expectations

BYOD has become a matter of trust between employee and employer. So far, there doesn't seem to be a whole lot of it. Three out of five survey respondents would not let the employer install an app on a BYOD smartphone or even view what personal apps are already installed.

Other stats showing privacy outrage: 82% of respondents are concerned about employers tracking websites on personal devices, and 86% are concerned about the unauthorized deletion of personal data.

CIOs are getting the message; many have told me that they're busy drafting BYOD policies that protect employee privacy. There are also recent advancements in mobile device management software from companies such as MobileIron that lets companies wipe only corporate data, leaving personal data untouched.

Besides, CIOs don't even want to see personal data on BYOD smartphones because it stirs up legal problems. "It's a slippery slope," says Ben Tomhave, principal consultant at governance, risk and compliance vendor LockPath.

Slideshow: 15 Best iPhone Apps for Newbies (2012)

When global tech distributor Ingram Micro was preparing an aggressive BYOD smartphone rollout, project manager Jason Conner spent countless hours in meetings with human resources, finance and the legal department hashing out issues such as smartphone privacy. He expected the legal department to play the role of Big Brother-and it didn't want the liability.


Originally published on CIO |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Consumerization of ITWhite Papers & Webcasts

See more White Papers | Webcasts

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question