• Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Special Offers
Business Intelligence Info
  • Business Intelligence
    • BI News and Info
    • Big Data
    • Mobile and Cloud
    • Self-Service BI
  • CRM
    • CRM News and Info
    • InfusionSoft
    • Microsoft Dynamics CRM
    • NetSuite
    • OnContact
    • Salesforce
    • Workbooks
  • Data Mining
    • Pentaho
    • Sisense
    • Tableau
    • TIBCO Spotfire
  • Data Warehousing
    • DWH News and Info
    • IBM DB2
    • Microsoft SQL Server
    • Oracle
    • Teradata
  • Predictive Analytics
    • FICO
    • KNIME
    • Mathematica
    • Matlab
    • Minitab
    • RapidMiner
    • Revolution
    • SAP
    • SAS/SPSS
  • Humor

Wearables in the workplace strain existing GRC policies

February 6, 2015   DWH News and Info

As if bring your own device (BYOD) policies weren’t complicated enough, wearable technologies seem poised to throw a wrench in established approaches to management. Wearables have been gaining traction in the enterprise as new devices offer the promise of improving productivity, business processes and even the fitness of employees.

Wearable technology shows no sign of slowing down: In TrendMicro’s survey of 100 senior IT decisionmakers, 82 %of respondents said their organizations’ BYOD security policies will have to change in order to account for wearables in the workplace.

How will policies change? How can companies assure BYOD policies are flexible enough to handle wearables while also guaranteeing that sensorized data is compliant? In this #GRCChat recap, participants discuss the effect of wearables on established MDM and what businesses can do to ensure data compliance.

#GRCChatters were quick to point out the uncertainties around where wearables fit into larger mobile device management (MDM) strategies. The technology is so new that few policy precedents exist, making incorporating wearables in the workplace a challenge not only to security and compliance, but also to user experience:

A4 Wearables creates many new GRC complications- another type of device to worry about as source of potential data leak #GRCChat

— Ben Cole (@BenjaminCole11) January 22, 2015

@ITCompliance A3 #Wearables still so new that co’s using them prob dont have policy around the data they collect and how it’s used. #GRCChat

— RachelTT (@RachelatTT) January 22, 2015

A3: I have no good answer yet. Sandboxing to separate data/apps may help. Keeping it all off-device is good but tough on UX/UI. #grcchat

— Forvalaka41 (@Forvalaka41) January 22, 2015

An important factor, according to SearchCompliance Editor Ben Cole, is to pay special attention to precisely which devices have the potential to enter the enterprise:

A4 It’s important to stay ahead of the game- review the market to see what wearables are popular and moving into corporate use #GRCchat

— Ben Cole (@BenjaminCole11) January 22, 2015

@BenjaminCole11 And it looks like the wearables-in-business trend won’t be ‘deflating’ anytime soon #harharhar #GRCChat

— FinServGRC (@FinServGRC) January 22, 2015

(Yes, this chat took place during the height of #DeflateGate.)

Lack of standardization is a challenge for wearables policies because it is hard to identify the right device-governance practices. SearchCompliance Associate Editor Francesca Sales raised a question about controlling device usage and data access within a company:

a4 how about standardizing and limiting what devices can access corp data to just certain devices? #grcchat

— Fran Sales (@Fran_S_TT) January 22, 2015

. absolutely @Fran_S_TT – some companies do have clear lines about what devices are acceptable, and what data is allowed on them #GRCChat

— Ben Cole (@BenjaminCole11) January 22, 2015

With wearable devices potentially recording a lot of sensitive, personal information about the wearer, bringing those devices into the workplace raises significant privacy concerns. Who has access to that information? How much privacy should employees expect? SearchCIO Senior News Writer Nicole Laskowski broached the subject of wearables privacy:

A4 Talk about personal privacy. How does IT ensure privacy when it comes to wearable devices? #GRCchat

— Nicole Laskowski (@TT_Nicole) January 22, 2015

. @TT_Nicole don’t think IT can ensure total employee privacy- have to to protect company info on these devices and keep compliant #GRCChat

— Ben Cole (@BenjaminCole11) January 22, 2015

@BenjaminCole11 @TT_Nicole so govern around the data itself and not around devices? #grcchat

— Fran Sales (@Fran_S_TT) January 22, 2015

@Fran_S_TT @BenjaminCole11 @TT_Nicole #grcchat If you have to have BYOD touch corp. sys/data, write apps that encrypt all and store nothing.

— Forvalaka41 (@Forvalaka41) January 22, 2015

Security is another concern. Wearable devices may move on and off a company’s network frequently and, with their increasing use for email and other business-related communications, may carry sensitive company data. But, as one participant pointed out, it’s not just the data that needs to be secured — it’s the devices themselves:

A4: The smaller it is, the easier it is to steal or misplace. Protocols between wrist and phone have to be secure too. #grcchat

— Forvalaka41 (@Forvalaka41) January 22, 2015

How do you think wearables in the workplace will affect mobile device management? Sound off in the comments section below.

Next Steps

For more on BYOD governance, check out this #GRCChat recap on enforcing GRC essentials for a strong BYOD security policy. Then, read through this Q&A to get an expert’s take on overcoming the data governance complications of wearable technology.

Recommended article: Chomsky: We Are All – Fill in the Blank.
This entry passed through the Full-Text RSS service – if this is your content and you’re reading it on someone else’s site, please read the FAQ at fivefilters.org/content-only/faq.php#publishers.

Colbran South Africa

Existing, policies, strain, wearables, Workplace
  • Recent Posts

    • WHEN IDEOLOGY TRUMPS TRUTH
    • New Customer Experience Needs and Commerce Trends for 2021
    • A data transformation problem in SQL and Scala: Dovetailing declarative solutions
    • George Wallace Joins Laverne Cox For Comedy Titled ‘Clean Slate’
    • How Microsoft Azure DevOps and Dynamics 365 CRM Work Together to Improve Service Responsiveness
  • Categories

  • Archives

    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • December 2016
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • April 2016
    • March 2016
    • February 2016
    • January 2016
    • December 2015
    • November 2015
    • October 2015
    • September 2015
    • August 2015
    • July 2015
    • June 2015
    • May 2015
    • April 2015
    • March 2015
    • February 2015
    • January 2015
    • December 2014
    • November 2014
© 2021 Business Intelligence Info
Power BI Training | G Com Solutions Limited