"Bring Your Own Device (BYOD)

label Computer Science
account_circle Unassigned
schedule 1 Day
account_balance_wallet $5

DON'T JUST IDENTIFY THE 3

  • Identify three (3) risks that might result from implementing a BYOD policy. Suggest a method for mitigating each risk you have identified. Provide a rationale for your response.
Aug 2nd, 2015

Thank you for the opportunity to help you with your question!

Three (3) risks that might result from implementing a BYOD policy

1) The organization will not be in a place to detect mail/information leaving the tool

2)The tool might be lost while the employee is out of the office and data retrived from thetool.

3)If the employee is not honest can pass vital information of the company to outsiders


MITIGATIONS

1)The organization can put in place strict rules that all information pertaining the organization should be placed in password protected folders and that any transaction related to the organization  should be done in the office in the event of abuse of the same displinary action should be taken.

2)All information to be stored in password proted folders

3)Here the company should be very strict and train the staff the importance of being honest to the employer at all times any person passing  organization's information to the outsider need be displined forthwith.

Please let me know if you need any clarification. I'm always happy to answer your questions.
Aug 2nd, 2015

Studypool's Notebank makes it easy to buy and sell old notes, study guides, reviews, etc.
Click to visit
The Notebank
...
Aug 2nd, 2015
...
Aug 2nd, 2015
Jun 25th, 2017
check_circle
Mark as Final Answer
check_circle
Unmark as Final Answer
check_circle
Final Answer

Secure Information

Content will be erased after question is completed.

check_circle
Final Answer