BYOD Creates Trust Gap Between Workers and Employers

Only three out of 10 employees completely trust their employer to keep personal information private. The others aren't so sure. This should be a warning sign to CIOs that they've got a trust gap to overcome.

The problem gets worse if you've got a "bring your own device" (BYOD) policy that favors corporate efforts to keep company data safe over employee privacy rights.

BYOD has become a flashpoint for privacy, says Ojas Rege, vice president of strategy at MobileIron, a mobile device management software developer.

MobileIron commissioned a survey of 3,000 workers across the United States, U.K. and Germany to learn more about the trust gap in the enterprise. The infographic below illustrates the survey's findings:

Tom Kaneshige covers Apple, BYOD and Consumerization of IT for CIO.com. Follow Tom on Twitter @kaneshige. Follow everything from CIO.com on Twitter @CIOonline, Facebook, Google + and LinkedIn. Email Tom at tkaneshige@cio.com

Read more about byod in CIO's BYOD Drilldown.

Tags: Consumerization of IT | BYOD, LinkedIn, CIO, IT management, bring your own device, mobile, Facebook, privacy, BYOD, consumerization of IT, Apple, Google, security, Mobile device management, twitter, trust issues, Gap, personal data, MobileIron

Google introduces Chrome 'factory reset' pop-ups to tackle extensions hijacks

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Deep Security - Enterprise Virtualization Security

Advanced protection for physical, virtual and cloud servers

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.