PEDs (portable electronic devices) may truly be productivity boosters (although managers watching employees texting, Twittering, and gaming may not be so sure). But they are also potential carriers of critical information about customers, employees, and the company itself.
Yesterday’s Advisor covered 10 policy issues surrounding PEDs. ( Go here to see them.) Today, we continue that discussion and cover a new audio conference on managing and controlling these omnipresent technological wonders.
Here are some additional policy issues suggested by BLR’s SmartPolicies:
- Virus protection. Require installing and updating antivirus software on portable devices.
- Spyware protection. Require installing and updating anti-spyware software on portable electronic devices.
- Firewalls. Require installing and updating firewall software on portable electronic devices.
- Remote tracking. When feasible install remote tracking capabilities on the portable electronic device. For example, when a laptop accesses the Internet, it is possible to track its location.
- Transportation. Establish security standards when portable devices are being transported in vehicles, trains, airplanes, etc. For example, require that laptops be carried in a discreet bag, not a bag that is readily identifiable as containing a laptop. Stricter standards may be applied to travel outside a state or outside the country.
- Disabling security. Instruct employees not to disable any of the security measures used to protect confidential data on portable devices.
- Erasing. Require secure erasing of confidential data contained on a portable device.
- Discarding. Securely delete or destroy data on personal devices when they are discarded and then securely destroy the device (e.g., overwrite data or erase data).
- Personal devices. Ban the use of personal recording devices, e.g., thumb drives, iPods, or camera phones, to maintain confidential records.
- Employee agreements. Require employees with access to portable devices containing confidential records to sign confidentiality agreements and portable devices usage agreements.
- Inventory. Inventory all PEDs which contain confidential records, e.g., lap tops, wireless devices, removable disk drives, memory cards, or PDAs.
- Discipline. Identify the disciplinary action that may be taken for violations of the policy.
PEDs are changing your employees’ work habits, but for better or worse? Find out (and get all your specific questions answered) at BLR’s 90-minute audio conference, PDAs, Blackberries, and iPhones: How to Manage Their Use to Avoid Employment Law Problems and Other Headaches. Get more information.
SmartPolicies suggests you also consider the following:
- Training. Train employees to recognize and report possible security breaches.
- Testing. Consider using contractors to monitor, test, and assess security of PEDs, e.g., “friendly” external hacking.
- Industry standards. Conform to changing industry and government standards for security of confidential records on PEDs.
- Biometrics. Consider the use of biometrics, such as fingerprint readers, to protect confidential information on portable devices such as laptops.
OK, you need a new policy. Ready to tackle it? Still have specific questions? To get all your questions answered, our editors recommend an upcoming 90-minute audio conference called PDAs, Blackberries, and iPhones: How to Manage Their Use to Avoid Employment Law Problems and Other Headaches.
The date is Thursday, May 7, 2009. The time, 1:30 p.m. to 3 p.m. (Eastern Time—adjust for your time zone). As with all BLR audio conferences, one fee trains all the staff you can fit around a conference phone, you can get your (and their) specific phoned-in or emailed questions answered in an extensive Q&A that follows the presentation, and your satisfaction is assured or you get a full refund.
Almost all of your employees are sporting at least one PDA, iPhone, Blackberry®, or portable disk drive. Think it’s time to exercise some control? BLR’s 90-minute audio conference, PDAs, Blackberries, and iPhones: How to Manage Their Use to Avoid Employment Law Problems and Other Headaches is coming to the rescue May 7. Find out more.
What if you can’t attend on that date? Pre-order the conference CD. For more information on the conference and the experts presenting it, to register, or to preorder the CD, click here. We’ll be happy to make the arrangements.
Other Recent Articles on HR Policies & Procedures:
PEDs iPhones Payroll Piracy Perfect Storm? HR Daily Advisor BLR
Are your Greeters Ready to Deal with a Violent Visitor?
Workplace Violence Is Not Beyond Your Control
Our Telecommuters Are at Work—Or Are They?