Ico Bring Your Own Device Byod Guidance
Ico Bring Your Own Device Byod Guidance
Contents
Introduction............................................................................. 3
Overview ................................................................................. 3
What the DPA says ................................................................... 3
What is BYOD? ......................................................................... 4
What are the risks? .................................................................. 4
What are the benefits? .............................................................. 5
What to consider?..................................................................... 5
Having a clear BYOD policy ..................................................... 6
Top tips:............................................................................... 6
Where is the personal data stored? .......................................... 6
Top tips:............................................................................... 7
How is the data transferred? ................................................... 8
Top tips:............................................................................... 9
How will you control the device? .............................................. 9
How will you secure the device? ............................................ 10
Top tips:............................................................................. 11
Monitoring at work ................................................................. 11
Top tips:............................................................................. 11
Other data protection risks? ..................................................... 12
Other risks? ........................................................................... 12
Summary .............................................................................. 13
Further information ................................................................ 13
Introduction
The Data Protection Act 1998 (the DPA) is based around eight
principles of ‘good information handling’. These give people specific
rights in relation to their personal information and place certain
obligations on those organisations that are responsible for
processing it.
This is part of a series of guidance, which goes into more detail than
the Guide, to help data controllers fully understand their obligations
and promote good practice.
Overview
What is BYOD?
1. Consumer electronic devices such as smart phones and tablet
computers have seen a huge rise in popularity, available features
and capability. Many data controllers are faced with demands
from employees, board members or even clients wishing to use
these devices in the workplace to carry out their jobs. This might
mean that individuals’ own devices are used to access and store
corporate information, as well as their own.
What to consider?
8. The specific risks that a BYOD policy addresses will be unique to
each organisation. However, considering the points set out in this
guidance can help to ensure that the risks associated with BYOD
are appropriately managed.
10. You should determine the impact a move to BYOD would have
on services you share with other organisations and whether or
not this would contravene any existing agreements. BYOD must
not introduce vulnerabilities into existing secure
environments.
Top tips:
On the device;
On a server within the organisation’s IT network (or other
private cloud); or
In a private, community or public cloud.
14. Regardless of where the data is stored, you will have to take
appropriate measures to protect against unauthorised or
unlawful access, for example if the device is lost or stolen. This
remains your responsibility as the data controller.
17. You should identify the type of storage media on the device.
Some devices may use an easily removable memory card, such
as a micro or mini SD card, meaning that a loss or theft of data
may go unnoticed for some time.
Top tips:
21. A major risk to the security of the data in transit will be a so-
called ‘man-in-the-middle’ attack, or other types of interception
carried out during the transfer process. However, you should not
ignore other risks of disclosure, such as an email being sent to
the wrong address.
Top tips:
32. You should determine how you will ensure that vulnerabilities
in the operating system or other software on the device are
appropriately patched or updated. You should be aware that
security updates may be dependent on the manufacturer of the
device or communications provider (for example, the mobile
phone operator) rather than directly from the operating system
manufacturer and may not be made available immediately or at
all for any particular device. Any such vulnerability must not
put personal data processed on these devices at risk.
35. You should decide how you might support the devices your
employees bring into the workplace, and how to manage the
data for which you are responsible if those devices are returned
or sold by the owner. For example, if a user’s device breaks and
is returned to the manufacturer under a warranty can you ensure
the protection of the personal data for which you are
responsible?
Top tips:
Monitoring at work
36. The ICO has previously published guidance for employers on
the topic of monitoring at work.
Top tips:
42. Usage of BYOD could raise the risk that personal data is
processed for a purpose different from that for which it was
originally collected. You must ensure that users of devices know
their responsibilities in terms of only using corporate personal
data for corporate purposes.
Other risks?
46. Public authorities subject to the Freedom of Information Act
(FOIA) will also need to consider their obligations in this area. If
multiple copies of data are stored across many different devices,
you may find that it is more difficult to respond to requests for
information, especially within the required time schedule.
Remember that a public authority’s corporate information is still
subject to FOIA even if held on a personally owned device.
Summary
48. BYOD raises a number of data protection concerns due to the
fact that the device is owned by the user rather than the data
controller. However, it is crucial that as data controller you
ensure that all processing for personal data which is under your
control remains in compliance with the DPA. Particularly in the
event of a security breach, you must be able to demonstrate that
you have secured, controlled or deleted all personal data on a
particular device.
Further information
You can find out more about encryption from the following URL:
https://ico.org.uk/about-the-ico/news-and-events/current-
topics/our-approach-to-encryption
You can find out more about asset disposal from the following URL:
https://ico.org.uk/media/for-
organisations/documents/1570/it_asset_disposal_for_organis
ations.pdf
You can find out more about cloud computing from the following
URL:
https://ico.org.uk/media/for-
organisations/documents/1540/cloud_computing_guidance_fo
r_organisations.pdf
You can find out more about how to ensure your employees'
personal details are respected and properly protected at work from
the following URL:
https://ico.org.uk/for-organisations/guide-to-data-
protection/employment/