Preview

Intel BYOD

Satisfactory Essays
Open Document
Open Document
514 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Intel BYOD
Case : Intel BYOD Assignment Questions 1. Does BYOD increase productivity in workplaces? 2. Should it be encouraged or discouraged? 3. How might other firms benefit from Intel’s approach to security (as shown in case Exhibit 2)? 4. How can Intel turn BYOD into a new source of competitive advantage? 5. What decisions can Intel make to ensure security of the corporate data on an employee-owned device that is used in the workplace? 6. How should Intel manage BYOD in the face of its e-Discovery obligations? Role: Malcom Harkins, chief information security officer was facing dilemnas in taking forward the Bring your own device initiative. - By 2014 at least 70% of employees would be using their own device for at least part of their job. Issue - The difference between personal data and corporate data… was no longer limited to office hours, just as peronal data was no longer off-0 limits during office hours - Employees would be distracted by applications embedded into their devices, which could potentially lead to a negatice impact on productivity - Greater risk in data security - Intel neded control over to access and control company info.. But doing so on employee devices would violate privacy Benefits - Reduced intel's hardware cost because employees bought their own hardware but increased cost in supporting , configuring those devices - Lower cost in data because telecom charged 33% less for personal vs corp data.. Approaches - Do nithng.. And hope that bringing in own devices was a fad - Could say no to devices.. As a company policy - Supporting BYOD Plan - Had a 48 hr web jam where employees can voice about the BYOD trend.. - Create a 5 tier model to manage security ○ Lv 1.. Stock movements ○ Lv 2.. Slightly confidential info like payroll ○ Lv 3- call basic and had the least permissive level of access to corporate data ○ Lv4- intermediate- consisted of applications pertaining to specific lines of busines ○ Lv5- Managed equivalent.. Was most permissive level of

You May Also Find These Documents Helpful

  • Best Essays

    The department is responsible for educating and assisting in working through the company’s policy and in dealing with policy breaches. Data security, quality, and integrity are valued commodities for a business who wishes to continue to prosper and grow, but the improper handling can also easily jeopardize its future (Pratt, 2008). Riordan’s need to consolidate data that has been created offline and potentially could be out-of-date is a data manager idea of a horror story. Through the use of data management solutions that support transactions processing in one location supports a more secure and efficient high-volume business. What also need to be considered are the multinational laws that Riordan had to adhere to because of its global footprint; legal requirements relating to data vary by country. It would be remiss to overlook the security of employees within the company because security falls under the domain of human resources. To take a safer, smarter approach toward personnel security the proposal will also include recommendations for company badges. A badge policy would keep track of employees as they come and go plus alert employees to the presence of a visitor. Monitoring equipment should also be considered as this would be ideal for public gathering places to record any activity after hours by using a motion sensor…

    • 3105 Words
    • 13 Pages
    Best Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A particularly well known product today that was once a blue ocean is the smart phone. At one time, the average consumer could be found carrying a cell phone, a personal digital assistant (PDA), and an MP3 player on them during the day. Cell phones were used for making and receiving calls; some had options for text messaging, but that was the extent of a mobile phone years ago. PDA’s were used to manage communication and schedules, most needing to connect directly to a PC for updates. MP3 players were devices setup to store music for playback at the request of the owner. Simply said, three devices to remain on the move in society. Apple was already one of the frontrunners in the MP3 player market with their iPod. They choose not to invent a PDA, claiming smart phones would eventually replace these devices in the future.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Agree to proper use of their devices when working with company data both on-site and off-site…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The network administrator and the network security administrator need to be aware of these types of products and how they can be used to create low-cost covert networks in the workplace. The administrators need to be aware of the push-to-talk feature on cell phones and understand, for example, that sensitive documents can be leaked by the use of cell phone cameras. The administrators not only need to be aware of these technologies, but they need to update their policies and procedures so they can take legal action against employees who leak information.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated laptops and new Apple IPhone. Since Microsoft has stopped support for Microsoft Windows Operating System XP, and 87 % of our current systems require upgrade to Windows 7. We should take advantage of the newest technologies available to our Corporation. Trinity is a three-factor authentication combines” “something that you know” (password – PIN), with “something that you have” (hardware- token, mobile phone) and/or “something that you are” (biometric technologies), to make sure that the person is who he/she claims to be.”(1)…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The stakeholder’s of any company or project may be directly or indirectly affect or be affected by the organization’s actions, objectives and policies. In this case, the needs of the stakeholders will vary depending on the anticipated outcome of each individual who will be receiving the upgrade. This means that a total of 115 employees will be involved, thus making them the primary stakeholders. Another stakeholder in this project will be the company or companies involved in the upgrade and the ones maintaining the project from start to finish. Lastly, another stakeholder is the company that our company will be purchasing all of the upgrade equipment from for the 115 employees. The overall objective of the primary stakeholders is to save the company money in the long term.…

    • 842 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    References: Apple. Apple ‐ iPhone ‐ Feature ‐ OS X. 4 June 2008 . Apple Computer. Apple Store. 4 June 2008 . Apple Inc. iPhone Premieres This Friday Night at Apple Retail Stores. 28 June 2007. . Apple. Safari. 4 June 2008 . Apple, Inc. Apple Reinvents the Phone with iPhone. 9 January 2007. . Apple, Inc. "iPod touch." Apple. 4 June 2008 . BBC. "Quarter of US iPhones 'unlocked '." BBC News | Business 29 January 2008. Canalys. "Smart mobile device shipments hit 118 million in 2007, up 53% on 2006." Press release. 2008. Clearwire. Clearwire: Wireless Broadband Internet Service Home and Office. 4 June 2008 . —. Spring and Clearwire to combine WIMAX business, creating a new mobile broadband company. Press release. Kirkland, WA: Clearwire, 2008. Computer, Apple. Apple Computer, Inc. Finalizes Acquisition of NeXT Software Inc. Press release. Cupertino: Apple Computer, 1997. Foundation, LiMo. LiMo Foundation. 4 June 2008 . Google. Android Developer Challenge. 4 June 2008 . —. Open Handset Alliance Project. 4 June 2008 . Grossman, Lev. "Invention Of the Year: The iPhone." Time Magazine 31 October 2007. Hormby, Tom. Good‐bye Woz and Jobs: How the First Apple Era Ended in 1985. 2 October 2006. 4 June 2008 . Kirkpatrick, David. "What 's Driving the New PC Shaekou." Fortune 19 September 1994.…

    • 5061 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Disclosure Analysis Paper

    • 903 Words
    • 4 Pages

    The publicly held company selected to use as the basis for this paper is Apple Inc. Apple Inc. designs, manufactures and markets mobile communication and media devices, personal computers, and portable digital music players, and sells a variety of related software, services, peripherals, networking solutions, and third-party digital content and applications. The Company’s business strategy leverages its unique ability to design and develop its own operating systems, hardware, application software, and services to provide its customers new products and solutions with superior ease-of-use, seamless integration, and innovative design. The Company believes continual investment in research and development and marketing and advertising is critical to the development and sale of innovative products and technologies. (Form 10-K, 2011, p. 1)…

    • 903 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    As an organization grows so must the security, and it has to be on the top of the list. When considering what type of security to choose, either proprietary or contact, they need to look at the value of the organization? This value within the organization will need some sort of protection to deter theft, vandalism, and destruction. The boardroom conversation could to from, “We have nice stuff” to “How are we going to protect it.” Leadership will need to decide how they will handle the issue of protecting their items that the business owns. In the process we will need to look at the pros and cons of both proprietary and contract security. Both of them have very big advantages associated with them but most of the time only one meets the needs of the organization. We have established that the organization has nice stuff, they need to protect it, we assume they have the month to support either option and they have a choice to make. This issues come down to management, and cost. One option provides for maximum control whereas the other does not allow for much control. The costs are different also. One option there is a set cost, but it could be high and other option the cost could depend upon the capabilities of the office and how many people are hired for the organization. We have defined the problem and lay out the possible options. We will explore the outcomes, their advantages, and their disadvantages. It comes down to what the right fit for the organization. Additionally we will look at these differences between proprietary versus contract security as it compares to consistency, effectiveness, and obligation (COHEN (1979). Choosing Contract or Proprietary Security).…

    • 1284 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Once all the information is ironed out I will position each specific user group based on their role for eligibility. I will ensure all wireless and mobile devices are company owned. Write a policy against transferring their personal number to their company owned mobile device. This will help in keeping the company wireless environment protected and secure. Policy will also cover the health of the devices. Maintaining it for a year contract. A policy for storing inappropriate photographs/ images is prohibited. I will also include policies against texting and driving unless you use a hands free device…..but express the usage and a risk in such an event or situation is needed.…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Syllabus

    • 1217 Words
    • 5 Pages

    In recent history, there has been an influx in controversy regarding e-mail, Internet usage, and overall privacy policies in the workplace. Because of the extensive increase of personal e-mail, smartphones, social media, and other Internet-based communications, the need for laws that govern privacy for the users of these communications is crucial. These policies are usually implemented to ensure security and to reduce liability. This report will show examples of privacy issues, laws, and experiences in the workplace.…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Lab 1

    • 753 Words
    • 3 Pages

    b- Protect the organization’s assets. For example, the organization should have AUP to demonstrate how, where, and when can the employees uses the mobile devices, computer or any organization’s assets…

    • 753 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Technology Within Business

    • 1322 Words
    • 6 Pages

    Firstly, by having technological advancements as the most imperative goal in businesses it can result in a dependency on technology. Dependency means that the company’s main reliance is on technology in order to function. Therefore if the technology fails then the business can become unsuccessful. For example this reliance on technology was made evident when the computers that ran the power for Melbourne tunnels failed in October 2012 and resulted in the Melbourne tunnels being shut down (ABC, 2012, para 1). On the other hand, technology can result in a more efficient workplace and work environment. For example Intel has increased their productivity through wireless notebooks by five percent per employee (Rungta, Tierney, Towles, 2008, p2). However when technology does breakdown it can cause larger problems such as, a loss of customer reliability and data los. This was made evident when a fault occurred in Commonwealth Bank Automated Teller Machines and online banking system in March 2012 and resulted in customers being able to overdraw their account (Zappone, 2012, para). Therefore, organisation’s need to focus on strategies that allow people to work with minimal technology. Hence, it is evident that companies should not depend on technology because it is not always reliable and can negatively affect a businesses performance. Therefore technological advancements should not be imperative for a business today.…

    • 1322 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays