action. 12. Controls placed on employee-owned devices can infringe on personal privacy. For instance, organizations could know what sites were visited or movies were watched, what was done on sick days, what texts were sent/received, and all social media activities during work hours and off-hours. 13. To reduce the threat of security breaches related to employee owned devices, data and ISs need to be protected from unauthorized access, including when an employee’s device is lost or stolen…
Words 3880 - Pages 16