This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Get people, privacy and policy correct before allowing collaborative working via mobiles

Share this article:

Managing control and compliance of mobile is key to collaborative working.

Stephen Deadman, group privacy officer and head of legal for privacy, security and content standards at Vodafone, said that mobility is driving collaboration, as businesses can allow users to do more than on a PC but the role of IT should be to manage control and meet compliance challenges.

Speaking at the Field Fisher Waterhouse security forum, Deadman said that there are stories of inadequate management and data loss issues when it comes to mobile use and bring your own device (BYOD).

“We see the supply chain, where organisations are secure, where things are done and where there is a controller of the data so the responsibility of the organisation is clear, but in my experience there is no responsibility,” he said.

Looking at privacy, people and policy, Deadman said that privacy needs to determine who accesses what and which services, and this can be very difficult to integrate, especially if a personal device is being used.

He said: “Mobile is blurring the lines between personal and professional lives and the borders between them have changed to make things more difficult to manage. It can be good for the work/life balance but you need to be careful with carving space from employees.

“The perimeter has fizzled away and to work collaboratively and to enable tools, you have to work with the privacy guys and staff, as they are choosing the tools that they want to use. So this is more about risk and my view is that it is about who adapts to that the best and about which risks you can control with the tools, what you can and cannot accept and what you have to deal with.”

He said that there is a proliferation of solutions to allow mobile devices to share and access data, and the challenge is knowing when and what to invest in solutions.

For policy, Deadman encouraged companies to "get smart on policy" and not to put their heads in the sand, as that is not dealing with the problem. Finally for people, he said that before you give users a desktop, engage with the user and if they want to choose a device, they have to work collaboratively with the company.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks ...

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

Cybercrime threat landscape evolving rapidly

Cybercrime threat landscape evolving rapidly

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels ...

Tor Project unearths attack that identifies users

Tor Project unearths attack that identifies users

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year.