Intel BYOD Assignment Questions 1. Does BYOD increase productivity in workplaces? 2. Should it be encouraged or discouraged? 3. How might other firms benefit from Intel’s approach to security (as shown in case Exhibit 2)? 4. How can Intel turn BYOD into a new source of competitive advantage? 5. What decisions can Intel make to ensure security of the corporate data on an employee-owned device that is used in the workplace? 6. How should Intel manage BYOD in the face of its e-Discovery obligations? Role: Malcom Harkins, chief information security officer was facing dilemnas in taking forward the Bring your own device initiative.
– By 2014 at least 70% of employees would be using their own device for at least part of their job. Issue – The difference between personal data and corporate data… was no longer limited to office hours, just as peronal data was no longer off-0 limits during office hours – Employees would be distracted by applications embedded into their devices, which could potentially lead to a negatice impact on productivity – Greater risk in data security – Intel neded control over to access and control company info..
The Essay on Intel Vs Advanced Micro Devices
Intel Vs. Advanced Micro Devices FIGURE INTEL AMD Mission Do a great job for our customers, employees and stockholders by being the preeminent building block supplier to the worldwide Internet economy Offer products and services that reduce the cost, improve the performance and shorten the time to market for our target customers worldwide Objectives - Extend silicon leadership - Deliver ...
But doing so on employee devices would violate privacy Benefits – Reduced intel’s hardware cost because employees bought their own hardware but increased cost in supporting , configuring those devices – Lower cost in data because telecom charged 33% less for personal vs corp data.. Approaches – Do nithng.. And hope that bringing in own devices was a fad – Could say no to devices.. As a company policy – Supporting BYOD Plan – Had a 48 hr web jam where employees can voice about the BYOD trend.. – Create a 5 tier model to manage security 0 Lv 1..
Stock movements 0 Lv 2.. Slightly confidential info like payroll 0 Lv 3- call basic and had the least permissive level of access to corporate data 0 Lv4- intermediate- consisted of applications pertaining to specific lines of busines 0 Lv5- Managed equivalent.. Was most permissive level of access to corporate data COIT – COIT (consumerization of IT 0 The adoption of any consumer facing technology for business purposes – Company adopting COIT could attract young talents, skilled employees, leading to improvements in revenues, margins and market share.
– Externally came from dev of apps aimed at delivering the right data. Challenges – Difficult in securing buy in for any CoIT initiative from functions such as legal and accounting Extracting Value 1. Cost reduction 2. Productivity gains 3. Competitive advantage 4. Recruiting would be easier since its ranked 98th on the list of 100 Security 1. Device a. Crate unmanaged devices.. (devices owned by employees) which poses a security risk i. Alll managed devices had secuirty controls of encryption and remote-wipe capability ii.
Remote wipe could affect privacy of employee 2. Data a. Global ids.. Posed secuity risk when integrating to the corproate active directory account.. b. Data co-mingling was another potential hazard i. If an employee placed orproate data on a personally owned device of a friend or family member,who then plugged into an USB connection to charge up, the company’s dat would be synced with personal data.. 1) USE 4P framework.. (prediction, perssitence, patience, preparedness 2) E-discovery –
The Term Paper on Secure Mobile Device Management Deployment
With the development of technology, we may confront the fact that mobility in business environment is becoming a more and more crucial element to determine the position of a corporation and its long-term profitability. Enhancing the use of mobile devices to improve the organization’s productivity comes to be the top priority of a business entity’s agenda, at the same time, security and risk ...