Personal Belt equipment (BYOD), enterprise data Security How to do?

Source: Internet
Author: User
Keywords We employees data security how to do security

Whether you like it or not, BYOD (with its own equipment) has gradually entered our daily work. Gartner predicts that companies in the http://www.aliyun.com/zixun/aggregation/33721.html ">2014 year 90% will support employees running corporate Office applications on personal mobile devices."

But the trend has also brought a string of questions worth exploring: who should be responsible for data security? Who does the data on these devices belong to? Today mobile data Management (MDM) is already common in the company, is the company allowed to remotely delete data if the employee's mobile device is lost or stolen?

But for most people, you don't really want the data on your mobile device to be erased remotely.

Today, our relationship with mobile devices is intimate, and sometimes mobile devices may know us better than we do. Each mobile device stores a large number of important information that is closely related to us: our lbs location information, our personal contact information, personal and work addresses, schedules, financial information, private photos, and family information. But the obvious disadvantage of mobile devices is that they are very easy to lose.

Now the situation is: once the wallet or handbag is lost, we will immediately report the loss of their credit cards and bank cards, if the key is also in the wallet, we will promptly replace the home door lock, but contains a large number of personal important information of mobile devices lost what to do?

Some of those who have regained hope seem to be less able to accept all the information in a remote wipe.

Data backup is a good habit, but it seems a little unrealistic to let everyone back up the data regularly. A study shows that the most optimistic estimate of the probability of the device recovered is 50% (such as the device was stolen, the probability of being recovered is almost 0). And even if the last equipment regained, enterprise data security in the process of loss of mobile devices is also a great risk.

Even if users and businesses admit that remote erase data is now the safest practice, does the company have the right to delete data from employees ' personal devices?

This depends on different countries and regions. For example, in Germany, it is illegal for companies to delete data from employees ' private equipment, and companies only have the right to delete the data related to the company in the employee's equipment, so the company can only choose the mobile data management scheme according to the relevant laws and regulations. In the United States, the law is largely blank. Many American companies require employees to sign relevant agreements, and once employees have used their own equipment to do their work, it is the default that the company can handle the data in the device.

In fact, in the case of lost equipment, both employees and businesses are victims, for security reasons, and in the worst case, businesses and individuals should work closely together to keep the company's data as secure as possible, rather than the need to delete data chatter.

Here are some suggestions:

Communicate fully with employees: let employees know the data security risks they face at the individual level and the risks they face at the company level.

Plan well: Don't wait for the device to be lost or stolen to find a solution.

Use appropriate tools and techniques: There are now a variety of automated backup, remote deletion, security management tools available to individuals and business choices, to advance the various sensitive data backup and security protection. With the development of various technologies, the data protection tools provided to people are becoming more and more secure.

Whether it's traditional mobile device management (MDM), mobile application Management (MAM), Mobile risk Management (MRM) or virtualization, application encapsulation, consumer and enterprise solutions, or a combination of the above, the solutions are now diverse, All you need to do now is to find the best mobile management and security strategy for your company.

Who is in charge of security and data in the new business mobility trend? Who has the responsibility to protect our privacy, security, and sensitive information from infringement? In this case, I think that enterprises and individuals should work together to deal with various enterprise data security issues.

The mobility trend makes it easier for people to connect to a variety of scenarios to greatly improve productivity, and the mobile age is also a time of cooperation and trust. After all, when you work for the purpose of using personal equipment to access the office environment, the security of enterprise data has become a common responsibility of individuals and enterprises.

(Responsible editor: The good of the Legacy)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.