![]() Therefore, the free flow of information might be quite affected by th ese overwhelming obligations.” While it ensures a simplification of the regulatory environment and harmoni s ation of the standards, it also poses additional burdens and costs for companies. She said: “ GDPR, for example displays two contradictory trends. ![]() She also cites the much-praised General Data Protection Regulation (GDPR), which comes into force in May next year, as a well-intentioned law that may have adverse side effects. Regulation is always lagging behind new technological and market challenges, even as it struggles to keep up.Īs Maria Macocinschi, who is studying for a doctorate in law at the University of Turku in Finland, notes: “The rigidity in revising and adapting the laws to the fast technological and economic developments is creating frustrations not only for consumers but also for companies.” Of course, constant fluctuations in both technological and socio-economic contexts make achieving these grand aims a challenge. The broad scope of privacy and data protection laws is generally to ensure the free flow of personal data between the member states, while their ultimate purpose is to regulate how such data should be processed in order to maintain a balance between the various interests of the personal data ecosystem. The worst case scenario? Potential stagnation for technological innovation. The consequences of this legal overreach can themselves be far-reaching – not just to personal privacy, but to technological innovation as a whole, if creators and those with grand ideas feel stifled by the competing needs of overlapping legislation. Most privacy and data protection laws have the noble aims of making us and our personal information safer – but overreach in the detail is a common side effect of attempts to do the right thing. Mobile Application Management (MAM): Software and services that control access to internal and commercial applications used for work purposes.The starting point for most privacy and data protection laws is creating a safer environment for all of us and our personal data – but the inevitable overreach often has far-reaching consequences.Mobile Device Management (MDM): A third-party security software that allows IT departments to manage, monitor, and secure any mobile device, like a smartphone, tablet, and laptop.Enterprise Mobility Management (EMM): A set of policies, technologies, and processes that secure and manage all mobile devices (Android, iPhone, etc.) within an organization.There’s also a risk that the employee may intentionally or unintentionally leak trade secrets or other classified information to hackers while using unsecured WiFi connections.īut you can take security measures to provide some level of protection to personal devices. ![]() Children may mistakenly download risky apps or software and jeopardize the entire device, including your company’s confidential information. It can significantly increase the risk of theft or misplacement.Īccording to a data breach analysis, 41% of all data breaches during 2005-2015 have mainly been due to lost devices.Īlso, you may not have much control over who uses the employee’s personal devices when they’re not at work. When employees use their own device for work, they’re likely to carry it back and forth between their home and office. It may make it difficult for employees to collaborate on different devices, especially if they need to send files to each other and edit them.Īs a result, you may have to create different directives, SOPs (Standard Operating Procedures), and information packets for all different types of devices used in your organization. The software may not even work for older devices.Īdditionally, the same software may have different shortcuts or versions for different OS. Since the devices are varied, employees may face difficulties while installing or using these programs. ![]() Your organization may be using a particular software for completing projects and tasks. Having multiple devices may lead to operational and compatibility issues with your company’s software. Additionally, some may keep upgrading their smart devices every 2-3 years, while others may use the same device for many years. A significant drawback of the BYOD model is the diversity of devices used for office work.įor example, some employees may prefer a Windows tablet and laptop, while others would be comfortable only with an iPad and a MacBook. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |