The Information Commissioner’s Office (ICO) has warned businesses to ensure they have policies in place to tackle the bring-your-own-device (BYOD) trend.
The ICO cited an incident that occured at the The Royal Veterinary College in 2013 as an example of the problems BYOD can cause, after a staff member lost a personal camera that contained passport photos of six job applicants.
The ICO said firms must make sure staff are aware of the issues caused by using personal devices for work, and that several key steps should be followed.
This included ensuring devices are secure and have encryption capabilities in place and that the use of unsecured services, such as cloud storage tools, are avoided.
It also said a clear end-of-contract policy must be in place so staff know access to certain tools and accounts will be revoked from their device. Finally, the ICO said the ability to wipe or immobilise lost or stolen devices should also be considered and staff must be made aware of the potential for this to happen.
ICO group manager for technology Simon Rice urged firms to heed the warnings as any breaches mean the employer is held liable. “As the line between our personal and working lives becomes increasingly blurred it is critical that employers have a clear policy about personal devices being used at work,” he said.
“The benefits must be balanced against the potential risks to work-related personal data but the organisation should not underestimate the level of effort which may be required to ensure that the processing of personal data with BYOD remains compliant with all eight principles of the Data Protection Act.”
The issue of BYOD has been a hot topic in the IT sector for some time, but with firms being urged to consider putting control measures in place to protect devices from various threats, it poses the question of how much freedom an employee will have to use their own device for work purposes.
Spaces are filling up fast
HP ZBook x2 offers 32GB RAM, M.2 SSD with up to 2TB storage and Nvidia Quadro GPU
Laptops should be able to offer true all-day working, and some
CGN has created an "online capability gap" between cyber criminals and law enforcement, says Europol
ISPs use Carrier Grade NAT to share IP addresses amongst multiple users