byod risks and disadvantages, byod risk mitigation strategies, security, mobile security, An organization with a BYOD policy allows the employees to take
Previous PDF | Next PDF |
[PDF] Sample Mobile Device Security Policy - Sophos
Corporate IT departments face two challenges when contemplating a BYOD policy: a mix of corporate and employee owned devices accessing the organization's
[PDF] Bring Your Own Device (BYOD) Security Policy - Q-CERT
Devices work within the company IT environment, but the employees own their phone — either they paid for it themselves and can keep it forever, or the company
[PDF] Mobile Device Policy with BYOD - INgov
Policy and Procedures for Use of Personally- Owned Mobile managed BYOD Program Appendix C: Security Criteria for Personally Owned Mobile Devices
Modifying Security Policies Towards BYOD - ScienceDirectcom
The prevailing security policies in BYOD are no more supportive for mobile devices like smartphones, tablets and laptops The security policies must be modified
[PDF] IDENTIFYING BEST PRACTICES FOR A BYOD POLICY - CORE
byod risks and disadvantages, byod risk mitigation strategies, security, mobile security, An organization with a BYOD policy allows the employees to take
[PDF] Legal Issues in Secure Implementation of Bring Your Own Device
the economical and usage benefits, Bring Your Own Device policy can pose some security models are used for BYOD – Mobile Device Management (MDM ),
[PDF] byod policy examples
[PDF] byod policy nist
[PDF] byod policy pdf
[PDF] byod policy sans
[PDF] byod policy template for healthcare
[PDF] byod policy template sans
[PDF] byod policy university
[PDF] byod reimbursement policy
[PDF] byod security best practices
[PDF] byod security checklist
[PDF] byod security policy considerations and best practices
[PDF] byod security policy pdf
[PDF] byod security policy sample
[PDF] byod security policy template
IRUWKHGHJUHHRI
IDENTIFYING BEST
PRACTICES FOR A
BYOD POLICY
Joshua M. King
End-User Computing Engineer
CoBiz Financial
December 2015 brought to you by COREView metadata, citation and similar papers at core.ac.ukprovided by University of Oregon Scholars' Bank
Approved by
Dr. Kara McFall
Lecturer, AIM Program
Running Head: IDENTIFYING BEST PRACTICES FOR A BYOD POLICYIdentifying Best Practices for a BYOD Policy
Joshua M. King
CoBiz Financial
IDENTIFYING BEST PRACTICES FOR A BYOD POLICY 2
IDENTIFYING BEST PRACTICES FOR A BYOD POLICY 3
Abstract
Increasing numbers of employers permit employees to use personal devices to perform work-related tasks, posing security risks. This annotated bibliography includes literature that identifies best practices for analysis, design, and implementation of bring your own device (BYOD) policies. Research results impact CIOs/CTOs, security professionals, IT operations management, compliance and audit teams, and end users interested in BYOD. Keywords: byod, bring your own device, byot, bring your own technology, byod benefits, byod risks and disadvantages, byod risk mitigation strategies, security, mobile security, mobile computingIDENTIFYING BEST PRACTICES FOR A BYOD POLICY 4
IDENTIFYING BEST PRACTICES FOR A BYOD POLICY 5
Table of Contents
Introduction to the Annotated Bibliography ................................................................. 6
Problem .................................................................................................................................................. 6
Purpose Statement ............................................................................................................................. 8
Research Question ............................................................................................................................. 8
Audience ................................................................................................................................................ 9
Search Report ...................................................................................................................................... 9
Annotated Bibliography ...................................................................................................... 13
BYOD Benefits ................................................................................................................................... 13
BYOD Risks and Disadvantages .................................................................................................. 18
BYOD Risk Mitigation Strategies ................................................................................................ 24
Conclusion ................................................................................................................................ 38
Introduction ...................................................................................................................................... 38
BYOD Benefits ................................................................................................................................... 38
BYOD Risks and Disadvantages .................................................................................................. 39
BYOD Risk Mitigation Strategies ................................................................................................ 40
References ................................................................................................................................ 44