1 / 18

Jisc Legal

Jisc Legal. John X Kelly. - Mobile Devices - BYOD. - eSafety /privacy - Liability Risk. The Data Protection Act says:

kinsey
Download Presentation

Jisc Legal

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Jisc Legal

  2. John X Kelly

  3. - Mobile Devices - BYOD

  4. - eSafety/privacy - Liability Risk

  5. The Data Protection Act says: “Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.”

  6. “ … 47% of all UK adults now use their personal smartphone, laptop or tablet computer for work purposes. But less than 3 in 10 who do so are provided with guidance on how their devices should be used in this capacity, raising worrying concerns that people may not understand how to look after the personal information accessed and stored on these devices…” http://www.ico.gov.uk/news/latest_news/2013/survey-guidance-on-byod-personal-devices-07032013.aspx

  7. “ … how can you guarantee that you will comply with a subject access request if you are not aware of all the devices on which personal data may be stored? ... ” http://www.ico.gov.uk/news/latest_news/2013/survey-guidance-on-byod-personal-devices-07032013.aspx

  8. Monitoring

  9. ICO’s Employment Practices Code states: “If workers are allowed to access personal email accounts from the workplace, such emails should only be monitored in exceptional circumstances”

  10. Risk Appetite

  11. What you can do …

  12. www.jisclegal.ac.uk

More Related