by clicking the arrows at the side of the page, or by using the toolbar.
by clicking anywhere on the page.
by dragging the page around when zoomed in.
by clicking anywhere on the page when zoomed in.
web sites or send emails by clicking on hyperlinks.
Email this page to a friend
Search this issue
Index - jump to page or section
Archive - view past issues
Connexus : Issue 43
operating system has been intentionally altered to bypass the device's security mechanisms, allowing any unauthorised software -- perhaps full of malware -- to be installed on it. Vale says there also needs to be a password policy that has guidelines for strong passwords and forced password changes. Password controls should also apply to emails because they store sensitive information. You should also have different policies for accessing the WiFi network for staff than you would for visitors. "Appropriate use of the device needs to be included in any policy," says Vale. "Even though employees are using their own devices, the organisation decides how they are used in the workplace. "For example, employees can use the device at work only for e-mails and calendar events, and not as a place to download movies for free." Egan strongly advises customer- owned banks to talk to employees about policies, guidelines and security rules. "They shouldn't just be uploaded to a website, because nobody will read them." Cynthia Karena is a freelance writer. Understand that BYOD is not about managing devices. It's about managing mobile employees. Ian Yip, NetIQ Phone 07 3839 5788 l www.fileoptics.com l firstname.lastname@example.org Loan les Client forms Letters Emails Signature cards Core banking reports Loan applications Statements Incoming mail Archived policies & procedures Employee records Board papers Infrastructure plans & diagrams etc Video les Marketing material Contracts Audio les Is all your business critical information immediately available? Ask Us How www.customerownedbanking.asn.au 39