E-Discovery: Is BYOD a B-A-D idea?
Companies using or considering BYOD should be proactive about handling their data in the BYOD environment and should consider ways to mitigate risk to navigate the process.
September 10, 2013 at 06:00 AM
6 minute read
The original version of this story was published on Law.com
BYOD (Bring Your Own Device) describes the trend of companies allowing their employees to use their own personal devices to access their company's network, create and/or store business information. Companies like the cost benefits and flexibility; employees like working using their tools of choice. The impact of BYOD on compliance, corporate risk and litigation is, however, a top concern. In-house counsel are now grappling with securing company information, as well as the challenges that BYOD brings in the event of litigation or regulatory action.
Corporate security – Protecting your company data
In house legal and compliance teams are concerned about the security of corporate data outside of the corporate network. Extra care is needed in a BYOD environment.
Employees may be more casual about guarding company information on their personal devices. Employees connecting to the Internet over an unsecured connection may unwittingly expose companies to risk. Improper disposal of a personal device may also present risk. Loss or breach of certain types of data, such as information protected by HIPAA, for example, can create liability and expense for the company. Valuable business information on personal devices not backed up to company networks may be irrevocably lost if the device is too.
Despite the corporate concern, companies are only just beginning to grapple with the security risks posed. For example, a recent Gartner survey revealed that 68 percent of corporate respondents were very/extremely concerned when thinking about securing enterprise data on employee mobile devices, yet only 45 percent had a formal BYOD policy. In another survey, 80 percent of corporations were not regularly educating their employees on security and privacy risks related to BYOD, and 58 percent lacked policies on employee-owned mobile devices. For companies just exploring this risk, the good news is there are some technical and policy based options available to mitigate the risks.
Special challenges for electronic discovery
Additional concerns arise about the ability to appropriately identify, preserve and collect data in response to litigation or regulatory actions where company data resides on a personal device. It may be difficult for practical reasons for corporate counsel to preserve or collect it. Parties can request data within an opposing party's possession, custody or control, but is data stored on an employee owned mobile device “controlled”? This is an evolving area, but prudence suggests that companies proceed under the assumption that their data may be viewed as within the corporation's control on an employee device.
Assuming the company can get access to the device, the mix of employee information (including what may be sensitive personal data) on that employee owned device creates its own set of potential issues that must be considered in the collection process. IT and other workers accessing mobile devices may gain access to legally protected personal information in the course of collection. Depending on the jurisdiction, employee data may be protected under any of number of complex privacy and computer trespass laws. Corporations accessing or deleting employee data without employee consent may be at heightened risk. Policies and procedures for obtaining employee consent to access and to removal of any personal data to enforce security policies, as a condition of using their personal devices, may be a good practice. Any collection effort undertaken by the company should be as narrowly tailored as possible to target the business data. Providing employees with notice of collections and any data deletion, whenever possible, should also be considered. Public policy concerns may also come into play.
Counsel needs to carefully consider their litigation response in jurisdictions with strong data privacy regulations. They should ensure that internal counsel and external counsel are sufficiently aware of the potential existence of unique data on BYOD devices when preserving and collecting data.
Finally, assuming that the device is available and access issues have been dealt with, counsel should be prepared for a more complex (and potentially more costly) execution process than they may be accustomed to on collection due to the multiplicity of hardware, software and applications in a BYOD environment.
5 practical tips
Companies using or considering BYOD should be proactive about handling their data in the BYOD environment and should consider ways to mitigate risk to navigate the process.
1. Know Thyself! Because you want a policy and process that will help support and manage BYOD within your organization, start by taking stock of your organization and your needs:
- Should everyone have access to BYOD? How will it be restricted?
- What's the cultural environment of your company, and how much will monitoring and control of their devices create morale issues? How will that be positively managed?
- Who will 'own' the BYOD Policy in your organization? What stakeholders need to be brought in to develop it and make it work?
- What other policies should be examined in light of the BYOD, i.e. HR, electronic use policy, employee termination procedures, corporate monitoring of Internet use and communications.
- How will you work BYOD into your litigation holds policies?
2. Craft an effective BYOD policy: A well-crafted BYOD policy will aim at number of issues. The policy should clearly define the rights and duties of both employer and employee. Importantly, corporate BYOD policies should be clear on what access the corporation will have, and establish clear and unambiguous consent from the employee to access to their data, and to the potential loss of their data ( for example, in a forced 'wipe'), in a signed use policy. The standards for what constitutes acceptable use, devices, and networks should be set out. The policy should also clarify how corporate data will be kept separate from personal data wherever possible.
3. Use available technology to help support the policy: Corporate IT in a BYOD environment should consider using available technology to help drive compliance. Mobile Device Management applications (MDM) and HTML5 technology, for example, can allow corporate IT to remotely install software, update security or remotely wipe in the event of loss or theft. Investigate split use software, encryption, and secured password protocols. A robust BYOD program should condition allowing the installation of such software on any device an employee wishes to use for company business.
4. Back up mobile data ahead of time: Support the regular business practice of backing up mobile work data onto the corporate network. Consider incorporating this into your appropriate polices. This is particularly important as regards key executives and decision makers. The backup process will greatly reduce the risk of lost data stored on mobile devices and may simplify the collection process should a dispute arise.
5. Vigilantly support the BYOD policy through training and monitoring of compliance with the policies: BYOD is a rapidly evolving area of technology and law. The policy will need to be reviewed regularly, at least annually, to assure corporate compliance with evolving data privacy laws. Employee training will also need to be refreshed regularly to bolster compliance and to keep pace with evolving law.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllSenators Grill Visa, Mastercard Execs on Alleged Anticompetitive Practices, Fees
Trump's SEC Likely to Halt 'Off-Channel' Texting Probe That's Led to Billions in Fines
Trump Likely to Keep Up Antitrust Enforcement, but Dial Back the Antagonism
5 minute readFTC Sues Cash-Advance Fintech Dave, Says It Deceives the 'Financially Vulnerable'
Trending Stories
- 1Gibson Dunn Sued By Crypto Client After Lateral Hire Causes Conflict of Interest
- 2Trump's Solicitor General Expected to 'Flip' Prelogar's Positions at Supreme Court
- 3Pharmacy Lawyers See Promise in NY Regulator's Curbs on PBM Industry
- 4Outgoing USPTO Director Kathi Vidal: ‘We All Want the Country to Be in a Better Place’
- 5Supreme Court Will Review Constitutionality Of FCC's Universal Service Fund
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250