5. Privacy management and data protection
Given that many users have their own smartphones, it may seem interesting for the company to use them as a basic remote connection terminal to the corporate information system. This is the BYOD concept for "Bring Your Own Device".
According to an IDC survey of 206 users and 100 IT managers in French companies, 18% of CIOs are in favor of the adoption of personal terminals in the enterprise, but 76% admit they don't know the extent of this new trend.
The technological risks associated with this basic assumption are numerous:
the user has full access to his terminal;
He is the administrator and can modify his configuration at any time;
change operating system version ;
...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Privacy management and data protection
Bibliography
Also in our database
Websites
• Symantec finds big differences in iOS, Android security (John Cox, Network world June 2011) http://www.networkworld.com/news/2011/062811-symantec-mobile-report.html
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference