O'Reilly logo

Preventing Litigation by William Inmon, Nelson Brestoff

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 19

The No Privacy Policies

We realize that employees often follow the practice of bring your own devices (BYOD) to work. While BYOD may be a common practice today, it is inadvisable for security and preventive purposes. Given the cost of remediating a hack into the enterprise’s computer system, a company will want to protect itself from being hacked when a BYOD device is connected to the enterprise intranet. Because we want to identify and investigate what employees are saying to each other in order to be pro­active about potential litigation threats, we see BYOD as a significant and avoidable risk. But if a company adopts a BYOD policy, it can be implemented on devices in secure containers called Sand boxes (see https://en.wikipedia.org/wiki/Sandbox_(computer_Security) ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required