Safeguards to protect against the legal perils of "bring your own device" (BYOD)

Posted on 05-13-2014 by
Tags: new rules , cell phone , BYOD , Bring Your Own Device , law firm trends , new lawyers , mobile devices , smartphones , mobile , Latest Headlines & Stories , trending news

As reported by Pepper Hamilton – Practice ‘Bring Your Own Device’? Here’s How to Avoid Legal Trouble – the “Bring Your Own Device” (BYOD) trend has risen dramatically in the last year, but with its increased use comes risks that employers and employees are not equipped to manage. Employers should practice the following in order to avoid unnecessary legal implications: 

1. Know Your Data. Companies should be aware of the type of data – particularly regulated data like health or financial information – that can be stored on or accessed by employees on their mobile devices and whether or not it can be transferred to cloud-based file-sharing applications.

2. Know Your Employees. Companies should know and keep track of which employees really need access to sensitive company data from their mobile devices and what use such employees need to make of the data. It is also important to ascertain which of those employees are entitled to overtime payments.

3. Tell Your Employees. It is important to devise a clear BYOD policy, which will preferably be a stand-alone document. The document should clearly address issues, including the following, and will seek the employees’ consent for the provisions:

  • who is eligible to the program and entitled to bring their own device
  • regulated data on mobile devices should be handled as sensitive and confidential information
  • have strong security measures on the mobile phone (strong password, encryption and segregation of data)
  • end-of-term policy – return of the device and remote wipe of the information

4. Train Your Employees. The force and effectiveness of a BYOD policy should be integrated and maintained through employees’ continuous training of the provisions within the policy as well as the privacy and data security aspects underlying the policy.

Do you think these safeguards will help in decreasing security concerns as they relate to BYOD and your practice or company? 


Harold Lieb
Harold Lieb
Posted on : 2 Feb 2016 3:14 PM

I think the best way to solve this issue is using protected repositories for your personal and business data. In my experience the most reliable is Ideals where you can ever turn on the secure view of the document so you can see only one string of the text for security reasons. 

Your comment has been posted.   Close
Thank you, your comment requires moderation so it may take a while to appear.   Close