5. Privacy management and data protection
Given that many users have their own smartphones, it may seem interesting for the company to use them as a basic remote connection terminal to the corporate information system. This is the BYOD concept for "Bring Your Own Device".
According to an IDC survey of 206 users and 100 IT managers in French companies, 18% of CIOs are in favor of the adoption of personal terminals in the enterprise, but 76% admit they don't know the extent of this new trend.
The technological risks associated with this basic assumption are numerous:
the user has full access to his terminal;
He is the administrator and can modify his configuration at any time;
change operating system version ;
...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Privacy management and data protection
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Also in our database
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!