BYOD Creates Trust Gap Between Workers and Employers

Only three out of 10 employees completely trust their employer to keep personal information private. The others aren't so sure. This should be a warning sign to CIOs that they've got a trust gap to overcome.

The problem gets worse if you've got a "bring your own device" (BYOD) policy that favors corporate efforts to keep company data safe over employee privacy rights.

BYOD has become a flashpoint for privacy, says Ojas Rege, vice president of strategy at MobileIron, a mobile device management software developer.

MobileIron commissioned a survey of 3,000 workers across the United States, U.K. and Germany to learn more about the trust gap in the enterprise. The infographic below illustrates the survey's findings:

Tom Kaneshige covers Apple, BYOD and Consumerization of IT for CIO.com. Follow Tom on Twitter @kaneshige. Follow everything from CIO.com on Twitter @CIOonline, Facebook, Google + and LinkedIn. Email Tom at tkaneshige@cio.com

Read more about byod in CIO's BYOD Drilldown.

Tags Consumerization of IT | BYODLinkedInCIOIT managementbring your own devicemobileFacebookprivacyBYODconsumerization of ITAppleGooglesecurityMobile device managementtwittertrust issuesGappersonal dataMobileIron

Comments

Comments are now closed

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Solutions-GigaVUE-2404

Newgen provides innovative network monitoring and security solutions based upon Gigamon’s GigaVUE-2404

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.