Chapter 19

The No Privacy Policies

We realize that employees often follow the practice of bring your own devices (BYOD) to work. While BYOD may be a common practice today, it is inadvisable for security and preventive purposes. Given the cost of remediating a hack into the enterprise’s computer system, a company will want to protect itself from being hacked when a BYOD device is connected to the enterprise intranet. Because we want to identify and investigate what employees are saying to each other in order to be pro­active about potential litigation threats, we see BYOD as a significant and avoidable risk. But if a company adopts a BYOD policy, it can be implemented on devices in secure containers called Sand boxes (see https://en.wikipedia.org/wiki/Sandbox_(computer_Security) ...

Get Preventing Litigation now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.