160 likes | 295 Views
BYOD: Privacy and Security. Andrew Paterson, Senior Technology Officer. The ICO’s mission. “ uphold information rights in the public interest ”: Openness by public bodies: Freedom of Information Act Environmental Information Regulations Privacy for individuals:
E N D
BYOD:Privacy and Security Andrew Paterson, Senior Technology Officer
The ICO’s mission • “uphold information rights in the public interest”: • Openness by public bodies: • Freedom of Information Act • Environmental Information Regulations • Privacy for individuals: • Privacy and Electronic Communications Regulations (PECR) • Data Protection Act (DPA)
The DPA in one slide: • It’s about personal data • You have to use it fairly and lawfully: act reasonably • You have to be open about what you do with it • You have to give people access to their own data • You have to keep it secure
A typical mobile device • Portable • Personal • Always-on • Frequently-used • Internet: Wifi / cell • Camera • Mic • NFC, Bluetooth, GPS, accelerometer • OS + Apps ecosystem
Typical aspects of BYOD • One or more of the following: • User/employee chooses, purchases, owns, maintains, or supports the device • So what is the role of the Data Controller?
Controlling BYOD Key areas to consider: • Policy • Does everyone know what they should (and should not) be doing? • Where is the personal data stored? • How is the data transferred? • How will you control and secure the device?
Policy • Acceptable use policy • Social media policy • Users must understand their responsibilities • Requires input from IT, HR, TU & end users • How will you monitor compliance?
Where does data reside? • Depends on what setup you choose: • Data on the device • Internal or external? • Data on the organisation's network • Local caching? • Cloud • Private • Community • Public
How is the data transferred? • How do you transfer data to devices? • 3G, Wi-Fi, Wired connection • HTTP, HTTPS, VPN, other encryption • MAC address filtering • IM, Skype or similar • Cloud-based service • File transfer or email attachment • Direct connection or via proxy • USB or CD
How do you controland secure the device? • Who owns the device? • What OS is it running? (and who decides?) • Who else has access to it? • What else is it used for? • What if it gets lost? (remote deletion?) • Onward transfer of data or device itself?
Privacy of the user • By definition, some BYOD use will be personal • May also be used by other individuals (e.g. family members) • Consider how to protect the users’ privacy if you use: • a traffic monitoring tool • geo-location monitoring • data loss prevention software
Other legal obligations? • BYOD could lead to disparate copies of data in disparate locations • Data Protection: • Subject access rights • Adequate, relevant and not excessive • Accuracy • Freedom Of Information: • Can you search for the data? • Can you access the data?
Questions? ICO’s guidance on BYOD (and lots more) can be found at our website www.ico.org.uk
Keep in touch Subscribe to our e-newsletter atwww.ico.gov.uk or find us on… • www.twitter.com/iconews