"Bring Your Own Device (BYOD)

Computer Science
Tutor: None Selected Time limit: 1 Day

DON'T JUST IDENTIFY THE 3

  • Identify three (3) risks that might result from implementing a BYOD policy. Suggest a method for mitigating each risk you have identified. Provide a rationale for your response.
Aug 2nd, 2015

Thank you for the opportunity to help you with your question!

Three (3) risks that might result from implementing a BYOD policy

1) The organization will not be in a place to detect mail/information leaving the tool

2)The tool might be lost while the employee is out of the office and data retrived from thetool.

3)If the employee is not honest can pass vital information of the company to outsiders


MITIGATIONS

1)The organization can put in place strict rules that all information pertaining the organization should be placed in password protected folders and that any transaction related to the organization  should be done in the office in the event of abuse of the same displinary action should be taken.

2)All information to be stored in password proted folders

3)Here the company should be very strict and train the staff the importance of being honest to the employer at all times any person passing  organization's information to the outsider need be displined forthwith.

Please let me know if you need any clarification. I'm always happy to answer your questions.
Aug 2nd, 2015

Are you studying on the go? Check out our FREE app and post questions on the fly!
Download on the
App Store
...
Aug 2nd, 2015
...
Aug 2nd, 2015
Dec 8th, 2016
check_circle
Mark as Final Answer
check_circle
Unmark as Final Answer
check_circle
Final Answer

Secure Information

Content will be erased after question is completed.

check_circle
Final Answer