Thinking beyond data security: a comparison of the main mobile strategies

Size: px
Start display at page:

Download "Thinking beyond data security: a comparison of the main mobile strategies"

Transcription

1 Thinking beyond data security: a comparison of the main mobile strategies

2 Contents Introduction 3 Mobility in the workplace: the key strategies 4 Comparing BYOD, COPE and COBO 5 Productivity 6 Cost 7 Billing 8 Privacy 9 Maintenance + support 10 How smartnumbers can help 11 About Resilient 12 Thinking beyond data security: a comparison of the main mobile strategies 2

3 Introduction There s no denying that mobile devices have become ingrained in every aspect of our lives. Employees, particularly those of the younger generation, are emotionally attached to their devices and apps, and expect the same technology experience at work that they get everywhere else. As younger generations flood the workplace, having the right mobile policy in place is now a key consideration for businesses looking to attract and retain the talent they need. The Government s 2013 Future of Work study reported that 92% of millennials identify flexible working as a top priority when choosing a job. For this reason, defaulting to the old policy of buying and handing out devices to staff, or simply turning a blind eye to mobile usage, may not be good enough anymore. It s time for organisations that have not done so already to navigate the alphabet soup of mobile strategy acronyms and start exploring options such as COBO, BYOD, CYOD and COPE. But while some businesses have their mobile strategies worked out, many are still trying to get their heads around which approach to enabling mobility in the workplace is best for them. It s a decision that is critical to get right. However, it s often complicated by the overwhelming glut of advice available, and a focus on data security that tends to ignore many of the other issues to consider. In this ebook we outline the different aspects to think about for the most popular mobile strategies in the form of a simple comparison table, so you can assess the benefits and risks of each. Thinking beyond data security: a comparison of the main mobile strategies 3

4 Mobility in the workplace: the key strategies Here, we define the four main mobile strategies in use today. Although it s often framed as a question of one or the other, for larger organisations there is unlikely to be a one size fits all policy for all employees. It s common for them to have a combination of strategies in place to cover different scenarios, based on the mobility needs of different roles, business units, risk and compliance profiles and various other factors. COBO COBO (Corporate Owned Business Only) is the traditional approach to mobility in the workplace. Devices are supplied and managed by organisations, and restricted to workrelated activities. Highly regulated or secure environments often still opt for COBO for many of their employees, as it is seen as the most pragmatic choice for those that need to keep the tightest rein on corporate data and protect intellectual property. BYOD The trend for BYOD (Bring Your Own Device), or allowng employee-owned devices for business use, has grown at a rapid pace over the past few years. IT analyst Gartner predicts that 85% of all companies globally will provide some sort of BYOD programme by While companies previously had to pay for hardware, software and service contracts, BYOD shifts those burdens onto employees, while giving them the freedom to work productively from the device they choose. Security is often seen as the biggest inhibitor, but even highly regulated industries like healthcare and financial services are coming round to the benefits of BYOD. This is thanks to the rise of software such as Enterprise Mobile Management (EMM) that works to secure data regardless of device ownership. Thinking beyond data security: a comparison of the main mobile strategies 4

5 However, an often-ignored aspect of BYOD is the phone number. In this regard, BYOD can be divided into two types: employees having one phone with a single number that they use for both personal and business; and those that have a separate number for business use on their personal device. There are some distinct differences between these two types of BYOD, as we will explain in this ebook. CYOD A variation of BYOD is CYOD (Choose Your Own Device) whereby staff are allowed to pick from a limited list of company-sanctioned devices, which the company has approved for security, reliability and durability, as well as any corporate discounts available. COPE Those looking for a middle ground between allowing employees complete freedom and restricting them to a corporate-owned business-only device programme might settle for COPE (Corporate Owned Personally Enabled). COPE programmes allow staff the use of a device chosen and paid for by the company, which the company retains ownership of. With COPE, devices can be pre-configured by the organisation for the needs of the individual based on role and responsibilities, but the employee can personalise the device and content and use it as they see fit, as it s not locked down for business use only. Thinking beyond data security: a comparison of the main mobile strategies 5

6 Comparing BYOD, COPE and COBO While the question of how to keep data secure is one important aspect to consider in a workplace mobile strategy, it s largely been answered over the last few years as advancements in mobile security software have occurred at a rapid pace. Extensive guidelines for employers have been issued by the UK s Information Commissioner s Office (ICO) and issues such as malware prevention, authentication and app control are by now well known and discussed. However there are a range of other considerations that must be taken into account when it comes to letting staff work productively from mobile devices. For example, how will you protect the privacy of their personal communications under stricter new data privacy laws? Will you be able to accurately bill for business calls only? And what aspects of a mobile device and plan should your company be paying for? These tables compare and contrast the main mobile strategies on a number of these issues, looking at COBO, BYOD with the use of one number, BYOD with number separation, CYOD and COPE. Productivity + staff satisfaction BYOD /CYOD (2 numbers, 1 phone) BYOD /CYOD (1 number, 1 phone) COPE COBO Having a separate business number on a personal device means staff can easily see when someone is calling them about work, and react accordingly. This means they are able to switch off from work outside of work hours and have greater control over when and how they do business. Staff have the freedom to utilise the device, apps and services they work best with, and can completely personalise their mobile experience to meet their needs. Using the device they know - and use all the time anyway - encourages them to work flexibly, boosting productivity. However, they may find it difficult to achieve a good work-life balance when using the same device for work and personal communications. Clients and customers may call them out of hours or whilst on holiday, or they could get unsolicited calls. Devices can be pre-configured by the business with all the best, corporate-grade apps for employee productivity, chosen by IT. But employees still have some choice and autonomy as they can customise the device once they have it, and can keep it for their personal use. They may find the choice of devices given to them by the company restrictive, however, and decide to use their own phone anyway. This means they are likely to have to carry around two devices, which can be seen as an annoyance. With a phone solely for business use, companies provide the devices, apps and tools most suited to the job and can reduce distractions. However, for those used to having their own phone to do what they like with, a corporate mobile device may be seen as too restrictive to employees, leaving them unsatisfied and less productive. They may simply revert to using their own personal device, forcing them to carry two phones. Thinking beyond data security: a comparison of the main mobile strategies 6

7 Comparing BYOD, COPE and COBO Cost BYOD /CYOD (2 numbers, 1 phone) (1 number, 1 phone) COPE COBO With a separate number for business communications on an employee-owned device, there is automatic separation of billing. Because they have complete choice of carriers and mobile plans for their business number, businesses can take advantage of cheaper corporate rates for data and wireless services, or optimise a plan according to a certain role. With accurate split billing they do not end up paying out more than is necessary in reimbursements. One of the major advantages of BYOD is that there is no upfront cost for the employer, as the employee pays for their own device. There s also no need for the company to invest in new devices to keep the corporate mobile estate updated. However, employers should beware of hidden costs. For the IT department, supporting a huge range of devices from an app-security perspective can mean investing in expensive software. Users may expect to receive support for devices they use for work, even if they are not company owned. And without any way to separate business and personal communications on one device, companies must carry out reimbursement schemes to bill for business calls. This could see them losing out on discounted corporate rates for data and wireless services, for which consumers typically pay a much higher price. The main challenge for those providing a single corporate device for both business and personal use is how to separate usage for tax purposes. Businesses can claim the cost of a mobile phone provision as a tax deductible expense when calculating corporation tax, but only on amounts specifically related to business use. As well as the up-front cost of the device, employers are lumbered with continued support and maintenance, software licensing fees and upgrading the corporate data plans. However, they may be able to take advantage of special deals for businesses and buy in bulk, as well as catering their business data plans to users unique requirements. A field salesperson, for example, may use a lot more minutes or data than someone who is office-based, and a corporate-designed mobile plan can reflect this. Thinking beyond data security: a comparison of the main mobile strategies 7

8 Comparing BYOD, COPE and COBO Billing (2 numbers, 1 phone) (1 number, 1 phone) COPE COBO With two separate numbers for personal and business calls, it is simple to bill for only business calls, and there is no guesswork involved. This removes the need to process expense forms each month, saving on time and admin burden. Where staff have one number for both personal and business calls, Employers or staff have to estimate how much they spend on business calls and texts. Companies are legally obligated to accurately report mobile phone expenses to HM Revenue and Customs (HMRC) for tax reasons. If you are unable to do so, you could face substancial fines for VAT accounting errors, or miss out on being able to claim back any VAT. Some organisations give a stipend or fixed sum towards business calls, but this can lead to disputes if staff think they ve been unfairly estimated. Organisations might over-estimate how much this stipend should be, costing them more money than necessary. Organisations can easily and automatically bill for any business calls made on a company-device, when it is restricted to business calls only. However, it may be difficult to monitor usage, and there is the potential for abusestaff could be using their business phone for personal calls and then billing them to the company. Thinking beyond data security: a comparison of the main mobile strategies 8

9 Comparing BYOD, COPE and COBO Privacy (2 numbers, 1 phone) (1 number, 1 phone) COPE COBO The use of Enterprise Mobility Management (EMM) to ensure the security of company data is common in BYOD. But solutions that include activity monitoring, tracking or remote lock and wipe raise some questions over privacy rights. Companies must ensure they have full consent to install and manage any software on user s a device, and communicate clearly defined policies. Having a separate number for business communications is a privacy boon, as it ensures employees cannot have their personal communications listened in to or recorded. This ensures companies are complying with privacy law and gives staff the peace of mind that their right to privacy is respected. When an employee uses their personal device for work without any separation of business and personal use, this is a risk from a privacy perspective. If your organisation records mobile calls for compliance or marketing purposes, for example, how do you ensure you don t log personal communications as well? When a corporate device is used for both work and personal use, this throws up quite a few issues around data privacy. For example, it is illegal to wipe personal data remotely from a stolen or lost device, such as family photos and contacts. Also, employers are in breach of privacy law if they listen in to or record private communications on a user s phone while working out expenses, managing apps, carrying out support or undertaking the routine recording of calls and texts for compliance and marketing purposes. In this case, employers will need to find a way to separate business communications from personal ones. Since devices are used for business only, this reduces much of the risk of privacy invasion for employees in theory. However, as the boundary between work and home is increasingly blurred, it s important to give staff very clear policies on what they are and aren t allowed to do with their devices, and what data IT will be privy to. It may not always be possible to ensure staff stick to these policies and lock them down for business use only. Thinking beyond data security: a comparison of the main mobile strategies 9

10 Comparing BYOD, COPE and COBO Maintenance + support (2 numbers, 1 phone) (1 number, 1 phone) COPE COBO Where devices are not corporate owned, responsibility for supporting them can be left to the user, including any upgrades and repairs. But there may be a hidden support burden for IT, as they must make sure any company apps and MDM services work on every device and every operating system in use. For this reason, IT managers may choose to limit the range of operating systems or devices allowed (CYOD). A good policy must explicitly define who is responsible for what support and maintenance tasks, as users may still expect a device to be supported if it s used for work activities. Handing out corporate devices ensures the uniformity of devices and operating systems, making support simpler from an IT perspective. However, employers have the time-consuming burden of managing and supporting handsets, software updates, apps, security and just about everything else on the device. Where staff do not get a choice of device, there may be a learning curve as they may have to learn how to use unfamiliar devices, which means more time spent supporting them. Staff are also less likely to take care of a device that isn t theirs, and as a consequence are more likely to lose or break it, particularly if they carry a personal one too. Thinking beyond data security: a comparison of the main mobile strategies 10

11 How smartnumbers can help With smartnumbers from Resilient, organisations provide staff with a distinct business number on any device. Giving employees a smartnumber on their phone makes managing BYOD or COPE programmes easy, as it separates business and personal communications on one handset - no need to carry two phones. Calls and texts are automatically billed to the company, eliminating time-consuming reimbursement claims and removing guesswork when it comes to mobile allowances. Personal communications are kept entirely private in compliance with privacy law, and staff have the freedom to use one device both in and out of work. They can even delegate a call to a colleague or automatically send to voic when they are unavailable or on holiday. smartnumbers are handy for businesses that have a lot of temporary staff that may change roles often, as business numbers can be kept by the business and given to new staff as they come on board no need for customers or partners to store a new one. It is a simple cloud-based solution to the problem of separating business and personal communications that works with any network carrier and requires no extra SIM. Thinking beyond data security: a comparison of the main mobile strategies 11

12 About Resilient This ebook was created by Resilient, the company behind smartnumbers, a range of communications services that deliver mobility, continuity and compliance to public and private sector organisations. Smartnumbers are trusted by 7 of the top 10 Global investment banks, 50% of the UK s blue light services, and over 40,000 Ministry of Defence personnel. The services are available directly from Resilient and also from BT. This ebook is not intended to be a source of legal advice, and should not be relied on as such. Phone or visit trusted communications mobility continuity compliance

Enterprise Mobility Management: completing the EMM story

Enterprise Mobility Management: completing the EMM story Enterprise Mobility Management: completing the EMM story Contents BYOD & EMM 3 Enterprise Mobility Management what is it? 4 Accessing corporate systems, apps 5 and data with EMM Apps in the container 6

More information

Voice. The lost piece of the BYOD puzzle.

Voice. The lost piece of the BYOD puzzle. Voice. The lost piece of the BYOD puzzle. Contents What s wrong with BYOD? 3 The issue of intimacy 4 How voice got left out of the picture 5 Why voice will always be big for business 6 Introducing smartnumbers

More information

Should you be mixing business and pleasure? smart guide to the costs and risks of allowing business and personal calls on one phone

Should you be mixing business and pleasure? smart guide to the costs and risks of allowing business and personal calls on one phone Should you be mixing business and pleasure? smart guide to the costs and risks of allowing business and personal calls on one phone Contents smart summary 3 COPE strategies: The tax position 4 COPE strategies:

More information

Voice. The lost piece of the BYOD puzzle.

Voice. The lost piece of the BYOD puzzle. Voice. The lost piece of the BYOD puzzle. Contents: What s wrong with BYOD? 3 The issue of intimacy 4 How voice got left out of the picture 5 Why voice will always be big for business 6 Introducing smartnumbers

More information

Smart guide to mobile call recording for MiFID II

Smart guide to mobile call recording for MiFID II Smart guide to mobile call recording for MiFID II Contents smart summary 3 MiFID II what is it? 4 Does MiFID II apply to my firm? 5 The options to stay compliant 6 smart guide for mobile call recording

More information

An overview of mobile call recording for businesses

An overview of mobile call recording for businesses An overview of mobile call recording for businesses 1 3 WHY DO WE NEED MOBILE CALL RECORDING? 4 STAYING AHEAD OF THE CHANGING REGULATORY LANDSCAPE Regulatory compliance and mobile call recording FCA (Financial

More information

Should you be mixing business and pleasure? smart guide to the costs and risks of allowing business and personal calls on one phone

Should you be mixing business and pleasure? smart guide to the costs and risks of allowing business and personal calls on one phone Should you be mixing business and pleasure? smart guide to the costs and risks of allowing business and personal calls on one phone Contents: smart summary 3 COPE strategies: The tax position 4 Apps in

More information

Steps to Eradicate Text Messaging Risk

Steps to Eradicate Text Messaging Risk Steps to Eradicate Text Messaging Risk Use Text Messaging More While Reducing Your Organization s Compliance, Legal and Reputational Risk The popularity of text messaging is growing every year, and many

More information

Privacy Notice. Lonsdale & Marsh Privacy Notice Version July

Privacy Notice. Lonsdale & Marsh Privacy Notice Version July Privacy Notice Lonsdale & Marsh understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of all of our clients and will

More information

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information

More information

General Data Protection Regulation (GDPR) Policy

General Data Protection Regulation (GDPR) Policy General Data Protection Regulation (GDPR) Policy Original prepared on: 01 May 2018 Reviewed on: 01 May 2018 To be reviewed on: 31 March 2019 Prepared by: Ralph Elliott-King - Financial Controller Reviewed

More information

MOBILE DEVICE MANAGEMENT OR PRETTY MUCH EVERYTHING YOU NEED TO KNOW ABOUT MOBILE DEVICES IN THE WORKPLACE!

MOBILE DEVICE MANAGEMENT OR PRETTY MUCH EVERYTHING YOU NEED TO KNOW ABOUT MOBILE DEVICES IN THE WORKPLACE! MOBILE DEVICE MANAGEMENT OR PRETTY MUCH EVERYTHING YOU NEED TO KNOW ABOUT MOBILE DEVICES IN THE WORKPLACE! 47% of all employees now use their smartphone, tablet PC or other portable device for work purposes

More information

We take your privacy very seriously and we ask that you read this Policy carefully as it contains important information on:

We take your privacy very seriously and we ask that you read this Policy carefully as it contains important information on: Introduction The website http://www.semperian.co.uk is operated by Semperian ("Semperian", "we" or "us") and we are a "data controller" for the purposes of the Data Protection Act 2018 and the EU General

More information

The essential guide to creating a School Bring Your Own Device Policy. (BYOD)

The essential guide to creating a School Bring Your Own Device Policy. (BYOD) The essential guide to creating a School Bring Your Own Device Policy. (BYOD) Contents Introduction.... 3 Considerations when creating a BYOD policy.... 3 General Guidelines for use (Acceptable Use Policy)....

More information

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley Auditing Bring Your Own Devices (BYOD) Risks Shannon Buckley Agenda 1. Understanding the trend towards BYOD. 2. Weighing up the cost benefit vs. the risks. 3. Identifying and mitigating the risks. 4. Tips

More information

Bring Your Own Device. Peter Silva Technical Marketing Manager

Bring Your Own Device. Peter Silva Technical Marketing Manager Bring Your Own Device Peter Silva Technical Marketing Manager Bring-Your-Own-Device (BYOD) Personal devices for business apps Why implement BYOD? Increase employee satisfaction, productivity Reduce mobile

More information

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS WHITE PAPER BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS INTRODUCTION As more companies embrace the broad usage of individual liable mobile devices or BYOD for access to corporate applications and data,

More information

Privacy Policy Inhouse Manager Ltd

Privacy Policy Inhouse Manager Ltd Privacy Policy Inhouse Manager Ltd April 2018 This privacy statement is designed to tell you about our practices regarding the collection, use and disclosure of information held by Inhouse Manager Ltd.

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunications costs Research firm IDC 1 has estimated that a VoIP system can reduce telephony-related expenses by 30%. TechAdvisory.org SME Reports sponsored by Voice over Internet Protocol

More information

Calculating the real cost of a business phone system. How a cloud phone system ultimately gives you more for your money

Calculating the real cost of a business phone system. How a cloud phone system ultimately gives you more for your money Calculating the real cost of a business phone system How a cloud phone system ultimately gives you more for your money When it comes to getting a new phone system, it s essential to look beyond the basic

More information

Office 365 Business The Microsoft Office you know, powered by the cloud.

Office 365 Business The Microsoft Office you know, powered by the cloud. Office 365 Business The Microsoft Office you know, powered by the cloud. Power your business with the best-in-class productivity tools from Microsoft the applications you know, always up-to-date and accessible

More information

Bring Your Own Device

Bring Your Own Device Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations

More information

Bring Your Own TVH. Kalman Tiboldi CBIO

Bring Your Own TVH. Kalman Tiboldi CBIO Bring Your Own Device @ TVH Kalman Tiboldi CBIO TVH OVERVIEW PARTS & ACCESSORIES DIVISION EQUIPMENT DIVISION RENTAL DIVISION SERVICE & REPAIR DIVISION 450.000 SKU s 16 mil cross ref. 100.000m² warehouse

More information

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled effectively. Contents Introduction.... 3 Primary Bring Your Own

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunications costs Research firm IDC 1 has estimated that a VoIP system can reduce telephony-related expenses by 30%. Voice over Internet Protocol (VoIP) has become a viable solution

More information

MDM is Calling: Does Your Business Have an Answer? arrival. Here To Go. Lunch Dinner. continue. Riiinnggg. Dec. 12

MDM is Calling: Does Your Business Have an Answer? arrival. Here To Go. Lunch Dinner. continue. Riiinnggg. Dec. 12 MDM is Calling: Does Your Business Riiinnggg arrival flight itinerary PLACE ORDER Here To Go Lunch Dinner continue Dec. 12 Riiinnggg Office answer MDM is Calling: Does your Business MDM is Calling: Does

More information

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015 Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015 Definitions Cellular Telephone Service For the purposes of this policy, cellular telephone

More information

Say Goodbye to Enterprise IT: Welcome to the Mobile First World. Sean Ginevan, Senior Director, Strategy Infosecurity Europe

Say Goodbye to Enterprise IT: Welcome to the Mobile First World. Sean Ginevan, Senior Director, Strategy Infosecurity Europe Say Goodbye to Enterprise IT: Welcome to the Mobile First World Sean Ginevan, Senior Director, Strategy Infosecurity Europe - 2015 Sean Ginevan Sr. Director, Strategy, MobileIron Linkedin.com/in/sginevan

More information

Pay as you go Terms and Charges

Pay as you go Terms and Charges Pay as you go Terms and Charges Would you prefer this information in large print, on disk, or in Braille? Call our specialist accessibility team on 03333 043 222 or email disability.access@vodafone.co.uk

More information

A Ready Business rises above infrastructure limitations. Vodacom Power to you

A Ready Business rises above infrastructure limitations. Vodacom Power to you A Ready Business rises above infrastructure limitations Vodacom Power to you Vodacom Business Nigeria Managed Hosted Services Get Ready to free up your business. To succeed in today s world of dramatic

More information

PRIVACY. YOUR DATA. YOUR TRUST.

PRIVACY. YOUR DATA. YOUR TRUST. PRIVACY. YOUR DATA. YOUR TRUST. OUR COMMITMENT TO YOU You are at the heart of everything we do. Our goal is to maintain your trust and confidence by handling your personal information with respect and

More information

What BYOD and CYOD mean for workplace transformation

What BYOD and CYOD mean for workplace transformation What BYOD and CYOD mean for workplace transformation Digital transformation is one of those phrases that fits in nicely on annual reports. It makes a company look modern, equipped for change and ready

More information

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon Data Protection and Information Security Webinar Presented by Emma Hawksworth Slater and Gordon 1 3 ways to participate Ask questions link below this presentation Answer the polls link below this presentation

More information

Privacy Policy GENERAL

Privacy Policy GENERAL Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill

More information

BRING YOUR OWN DEVICE (BYOD)

BRING YOUR OWN DEVICE (BYOD) BRING YOUR OWN DEVICE (BYOD) Bring your own device (BYOD) Some employees will often prefer to use their own personal mobile devices to access company networks/systems. However, this is potentially a security

More information

STAYCONNECTED PLUS YOUR DEVICE BACK-UP PLAN. StayConnected Plus Service Customer Terms

STAYCONNECTED PLUS YOUR DEVICE BACK-UP PLAN. StayConnected Plus Service Customer Terms STAYCONNECTED PLUS YOUR DEVICE BACK-UP PLAN StayConnected Plus Service Customer Terms STAYCONNECTED PLUS SERVICE CUSTOMER TERMS 1 The StayConnected Service a) The StayConnected Service provides after sales

More information

9 myths about moving to the cloud. What small and medium-size businesses need to know about moving to Microsoft Office 365

9 myths about moving to the cloud. What small and medium-size businesses need to know about moving to Microsoft Office 365 9 myths about moving to the cloud What small and medium-size businesses need to know about moving to Microsoft Office 365 Most companies need the agility and cost savings that come with switching to Microsoft

More information

Data Protection policy (GDPR)

Data Protection policy (GDPR) Data Protection policy (GDPR) This is the statement of general policy and arrangements for: Overall and final responsibility for health and safety is that of: Day-to-day responsibility for ensuring this

More information

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Intermediate School District #917 WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Procedures Manual April 2009 Table of Contents Overview 3 Definitions 3 General Guidelines 4 Eligibility Requirements 5

More information

The Problem with Privileged Users

The Problem with Privileged Users Flash Point Paper Enforce Access Control The Problem with Privileged Users Four Steps to Reducing Breach Risk: What You Don t Know CAN Hurt You Today s users need easy anytime, anywhere access to information

More information

Trinity Multi Academy Trust

Trinity Multi Academy Trust Trinity Multi Academy Trust Policy: Bring Your Own Device Date of review: October 2018 Date of next review: October 2020 Lead professional: Status: Director of ICT and Data Non-Statutory Page 1 of 5 Scope

More information

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM AIRMIC ENTERPRISE RISK MANAGEMENT FORUM Date 10 November 2016 Name Nick Gibbons Position, PARTNER BLM T: 0207 457 3567 E: Nick.Gibbons@blmlaw.com SUMMARY Cyber crime is now a daily reality Every business

More information

THE FASTEST WAY TO CONNECT YOUR NETWORK. Accelerate Multiple Location Connectivity with Ethernet Private Line Solutions FIBER

THE FASTEST WAY TO CONNECT YOUR NETWORK. Accelerate Multiple Location Connectivity with Ethernet Private Line Solutions FIBER THE FASTEST WAY TO CONNECT YOUR NETWORK Accelerate Multiple Location Connectivity with Ethernet Private Line Solutions FIBER In today s competitive business environment, speed is the name of the game.

More information

CHASE GRAMMAR SCHOOL PRIVACY STATEMENT General Data Protection Regulations (GDPR)

CHASE GRAMMAR SCHOOL PRIVACY STATEMENT General Data Protection Regulations (GDPR) CHASE GRAMMAR SCHOOL PRIVACY STATEMENT General Data Protection Regulations (GDPR) The GDPR is the biggest change to data privacy laws in the last 20 years and comes into effect on 25 May 2018. The new

More information

Privacy notice. Last updated: 25 May 2018

Privacy notice. Last updated: 25 May 2018 Privacy notice Last updated: 25 May 2018 www.courtprice.co.uk ('Website') is provided by Courtprice Limited ('we'/'us'/'our'). In doing so, we may be in a position to receive and process personal information

More information

Bring your own device: a major security concern

Bring your own device: a major security concern Digital Transformation Monitor Bring your own device: a major security concern May 017 Internal Market, Industry, Entrepreneurship and SMEs Bring your own device: a major security concern Rawpixel.com/Shutterstock.com

More information

SUBJECT: Cellular Phone Policy Effective Date: 7/1/2010. Department: Information Technology Policy No.: IT-1002

SUBJECT: Cellular Phone Policy Effective Date: 7/1/2010. Department: Information Technology Policy No.: IT-1002 Person County Government STANDARD PROCEDURE SUBJECT: Cellular Phone Policy Effective Date: 7/1/2010 Department: Information Technology Policy No.: IT-1002 Prepared by: Gary Latta, IT Director Revised:

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use

More information

10 Hidden IT Risks That Might Threaten Your Business

10 Hidden IT Risks That Might Threaten Your Business (Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return

More information

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business

More information

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance. Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do

More information

Policy No: I-AS 002/2014. Ind-Aussie Solar (P) Ltd outlines protocols to be followed in using the mobile phones. Purpose:

Policy No: I-AS 002/2014. Ind-Aussie Solar (P) Ltd outlines protocols to be followed in using the mobile phones. Purpose: Policy No: I-AS 002/2014 Purpose: Applicable to: Ind-Aussie Solar (P) Ltd outlines protocols to be followed in using the mobile phones All permanent, temporary employees and trainees First issue Date 20

More information

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) Bring Your Own Device (BYOD) An information security and ediscovery analysis A Whitepaper Call: +44 345 222 1711 / +353 1 210 1711 Email: cyber@bsigroup.com Visit: bsigroup.com Executive summary Organizations

More information

Choices when it comes to your communications infrastructure A BUYER S GUIDE TO IP-BASED SOLUTIONS

Choices when it comes to your communications infrastructure A BUYER S GUIDE TO IP-BASED SOLUTIONS Choices when it comes to your communications infrastructure A BUYER S GUIDE TO IP-BASED SOLUTIONS Introduction A small business has many priorities. With so much on your mind, your phone system might be

More information

Information Security BYOD Procedure

Information Security BYOD Procedure Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,

More information

Privacy and Data Protection Policy

Privacy and Data Protection Policy Privacy and Data Protection Policy Introduction 1. The Ripple Pond is committed to ensuring the secure and safe management of personal data held by the Charity in relation to Beneficiaries, Staff, Trustees,

More information

Moving to a New Business Phone System

Moving to a New Business Phone System Moving to a New Business Phone System BroadSoft White Paper OneCloudNetworks is an authorized BroadSoft Service Provider 2015 BroadSoft. All Rights Reserved. Introduction Phone systems have been installed

More information

Securing Health Data in a BYOD World

Securing Health Data in a BYOD World Business White Paper Securing Health Data in a BYOD World Five strategies to minimize risk Page 2 of 9 Securing Health Data in a BYOD World Table of Contents Page 2 Introduction Page 3 BYOD Adoption Drivers

More information

TeleWare Re:Call FAQ for Resellers

TeleWare Re:Call FAQ for Resellers TeleWare Re:Call FAQ for Resellers A - About the Re:Call Service and Application 1. Why have TeleWare developed a mobile application, isn t the SIM based recording solution sufficient? For organisations

More information

Calculating the real cost of your phone system. Could you be getting more for your money with a cloud phone system?

Calculating the real cost of your phone system. Could you be getting more for your money with a cloud phone system? Calculating the real cost of your phone system Could you be getting more for your money with a cloud phone system? How much does a new phone system really cost? Sure a new private branch exchange (PBX)

More information

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018 ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:

More information

SIP Trunks. The cost-effective and flexible alternative to ISDN

SIP Trunks. The cost-effective and flexible alternative to ISDN SIP Trunks The cost-effective and flexible alternative to ISDN A cost-effective alternative to ISDN that provides flexibility and continuity How does it work? SIP Trunks connect your to s network, enabling

More information

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

3-Part Guide to Developing a BYOD Strategy

3-Part Guide to Developing a BYOD Strategy An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)

More information

Inspiring Insights Ltd Privacy Policy - May Important Information. 2. The data we collect and how we store it.

Inspiring Insights Ltd Privacy Policy - May Important Information. 2. The data we collect and how we store it. Inspiring Insights Ltd Privacy Policy - May 2018 Inspiring Insights LTD respects your privacy and is committed to protecting your personal data. This privacy notice informs you as to how we look after

More information

SCHOOL SUPPLIERS. What schools should be asking!

SCHOOL SUPPLIERS. What schools should be asking! SCHOOL SUPPLIERS What schools should be asking! Page:1 School supplier compliance The General Data Protection Regulation (GDPR) comes into force on 25 May 2018 and will be applied into UK law via the updated

More information

How to Guide. How to create mobile surveys. and forms START

How to Guide. How to create mobile surveys. and forms START 06 and forms How to Guide How to create mobile surveys START sales@textlocal.com 01244 752299 www.textlocal.com 06 and forms How to Guide How to create mobile surveys START sales@textlocal.com 01244 752299

More information

2. The Information we collect and how we use it: Individuals and Organisations: We collect and process personal data from individuals and organisation

2. The Information we collect and how we use it: Individuals and Organisations: We collect and process personal data from individuals and organisation WOSDEC: Privacy Policy West of Scotland Development Education Centre WOSDEC - (We) are committed to protecting and respecting your privacy. This policy sets out how the personal information we collect

More information

NIPPON VALUE INVESTORS DATA PROTECTION POLICY

NIPPON VALUE INVESTORS DATA PROTECTION POLICY NIPPON VALUE INVESTORS DATA PROTECTION POLICY INTRODUCTION Nippon Value Investors KK and Nippon Value Investors, Inc. (together NVI ) are committed to protecting the privacy of individuals whose data they

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions After having undertaken a period of research within recreational cricket, this document is aimed at addressing the frequently asked questions from cricket Clubs, Leagues, Boards

More information

Cellular Solutions and Services Limited and Cellular Solutions and Network Services Privacy Policy

Cellular Solutions and Services Limited and Cellular Solutions and Network Services Privacy Policy Cellular Solutions and Services Limited and Cellular Solutions and Network Services Privacy Policy This privacy policy sets out how Cellular Solutions and Services Limited and Cellular Solutions and Network

More information

BYOD... or CYOD? 2 BILLION 5 BILLION. The Choice is Yours MOBILE DEVICES WORLDWIDE BY 2015 MOBILE DEVICES WORLDWIDE BY 2020

BYOD... or CYOD? 2 BILLION 5 BILLION. The Choice is Yours MOBILE DEVICES WORLDWIDE BY 2015 MOBILE DEVICES WORLDWIDE BY 2020 BYOD... or CYOD? The Choice is Yours We love our mobile devices. We love them so much that we need them no matter where we are or what we re doing. We want to use our smartphone to answer email while at

More information

Privacy Notice For Our Customers And Contacts

Privacy Notice For Our Customers And Contacts Privacy Notice For Our Customers And Contacts What Is The Purpose Of This Notice? This notice applies to all businesses operating within The Alumasc Group plc group of Companies (the Group ), as follows:

More information

The way we work is changing. Introducing One Phone. Overview of Proposition. Marketing Overview AOB, Q&A

The way we work is changing. Introducing One Phone. Overview of Proposition. Marketing Overview AOB, Q&A The way we work is changing Introducing One Phone Overview of Proposition Marketing Overview AOB, Q&A Customers are more demanding than ever and expect an instant response, with your competitors only a

More information

Planning BYoD Beyond Device Security. Report prepared by Utelize Communications Limited. A Utelize Insight Report 2017 Version.

Planning BYoD Beyond Device Security. Report prepared by Utelize Communications Limited. A Utelize Insight Report 2017 Version. Planning BYoD Beyond Device Security A Utelize Insight Report 2017 Version Report prepared by Utelize Communications Limited www.utelize.co.uk 1 Background Any organization ether considering or revisiting

More information

WHITEPAPER MOVING TO A NEW BUSINESS PHONE SYSTEM

WHITEPAPER MOVING TO A NEW BUSINESS PHONE SYSTEM WHITEPAPER MOVING TO A NEW BUSINESS PHONE SYSTEM Introduction Phone systems have been installed in offices of all different sizes for more than 40 years, providing a vital service to the business. Since

More information

EIT Health UK-Ireland Privacy Policy

EIT Health UK-Ireland Privacy Policy EIT Health UK-Ireland Privacy Policy This policy describes how EIT Health UK-Ireland uses your personal information, how we protect your privacy, and your rights regarding your information. We promise

More information

PRIVACY NOTICE ST BENEDICT S HOSPICE SUNDERLAND, LTD

PRIVACY NOTICE ST BENEDICT S HOSPICE SUNDERLAND, LTD PRIVACY NOTICE ST BENEDICT S HOSPICE SUNDERLAND, LTD Registered Charity No: 1019410 Company Registration No: 02803974 VAT Number: 268486844 Registered Offices: St Benedict s Hospice & Centre for Specialist

More information

Total Cost of Ownership: Benefits of the OpenText Cloud

Total Cost of Ownership: Benefits of the OpenText Cloud Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations

More information

E RADAR. All Rights Reserved. Acceptable Use Policy

E RADAR. All Rights Reserved.  Acceptable Use Policy Email Acceptable Use Policy For further help, please contact support@eradar.eu Item Number LD 0002 Author E RADAR LIMITED Disclaimer This template is provided with the understanding that the publisher

More information

SIP Trunks. The cost-effective and flexible alternative to ISDN

SIP Trunks. The cost-effective and flexible alternative to ISDN SIP Trunks The cost-effective and flexible alternative to ISDN A cost-effective alternative to ISDN that provides flexibility and continuity How does it work? connect your to s network, enabling full PSTN

More information

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System DATA PRIVACY & PROTECTION POLICY POLICY This Data Privacy & Protection Policy applies to ELMO Software Limited s Cloud HR & Payroll applications and platform (collectively, the Services ), elmosoftware.com.au

More information

The West End Community Trust Privacy Policy

The West End Community Trust Privacy Policy The West End Community Trust Privacy Policy We are committed to protecting your personal information and being transparent about what we do with it, however you interact with us. We are therefore committed

More information

Baptist Financial Services

Baptist Financial Services Baptist Financial Services BFS Visa Prepaid PayCard FREQUENTLY ASKED QUESTIONS (FAQ S) Questions for Employers 1 What is a BFS Visa Prepaid PayCard? 2 How do I get a BFS Visa Prepaid PayCard? 3 How does

More information

B&W Waste Management Services Ltd: Limited Company registered in England under company number

B&W Waste Management Services Ltd: Limited Company registered in England under company number B&W Waste Management Services Ltd understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of all of our customers/supplier

More information

Storage as a Service From Hitachi Vantara

Storage as a Service From Hitachi Vantara Storage as a Service From Hitachi Vantara Cost-Effectively Manage Your Storage Needs SOLUTION PROFILE Companies are increasingly looking for ways to lower the cost of IT management. Capital expenditure

More information

Wireless Communication Device Use Policy

Wireless Communication Device Use Policy Wireless Communication Device Use Policy Introduction The Wireless Communication Device Policy exists to provide guidance to employees regarding the acquisition and use of William Paterson University provided

More information

ATHLETICS WORLD CUP PRIVACY NOTICE

ATHLETICS WORLD CUP PRIVACY NOTICE ATHLETICS WORLD CUP PRIVACY NOTICE This Privacy Notice explains how Athletics World Cup ("AWC") collects, uses and shares the personal information that you provide to us either when using this website

More information

HBW LAW LTD T/A HESELTINE BRAY & WELSH

HBW LAW LTD T/A HESELTINE BRAY & WELSH HBW LAW LTD T/A HESELTINE BRAY & WELSH CLIENT INFORMATION POLICY HOW WE STORE AND USE YOUR PERSONAL INFORMATION INFORMATION WE COLLECT AND HOLD ABOUT YOU To enable us to provide you with our services we

More information

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017 THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017 An IT Architect s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy As the consumerization

More information

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant General Data Protection Regulation: Knowing your data Title Prepared by: Paul Barks, Managing Consultant Table of Contents 1. Introduction... 3 2. The challenge... 4 3. Data mapping... 7 4. Conclusion...

More information

PRIVACY POLICY. Marlin Hawk Limited of 10 Throgmorton Avenue, London EC2N 2DL, tel

PRIVACY POLICY. Marlin Hawk Limited of 10 Throgmorton Avenue, London EC2N 2DL, tel PRIVACY POLICY Who are we? Marlin Hawk Limited of 10 Throgmorton Avenue, London EC2N 2DL, tel +44 20 7786 6000. We provide executive search and leadership advisory services to clients looking to recruit

More information

The Quick-Start Guide to Print Security. How to maximize your print environment and minimize security threats

The Quick-Start Guide to Print Security. How to maximize your print environment and minimize security threats The Quick-Start Guide to Print Security How to maximize your print environment and minimize security threats 2 The Hidden Security Threat What s the first thing that comes to mind when you hear the words

More information

GDPR Policy WECare Worldwide

GDPR Policy WECare Worldwide GDPR Policy WECare Worldwide MAY 2018 GDPR policy, WECare Worldwide WECare 1 WECare Worldwide s commitment to GDPR WECare Worldwide ( WECare ) is both a UK registered charity (1162386) and a Sri Lankan

More information

Update Windows. Upgrade the organisation. Reshaping ICT, Reshaping Business FUJITSU LIMITED. uk.fujitsu.com

Update Windows. Upgrade the organisation. Reshaping ICT, Reshaping Business FUJITSU LIMITED. uk.fujitsu.com Update Windows Upgrade the organisation FUJITSU LIMITED 2 Baker Street London W1U 3BW Copyright: 2013 Fujitsu Contact: fujitsu.com/uk/contact All rights reserved, including rights created by patent grant

More information

DATA PROTECTION LAWS OF THE WORLD. Bahrain

DATA PROTECTION LAWS OF THE WORLD. Bahrain DATA PROTECTION LAWS OF THE WORLD Bahrain Downloaded: 7 April 2018 BAHRAIN Last modified 25 January 2017 LAW There is currently no standalone data protection law in Bahrain. A draft is being reviewed before

More information