USE CASE #1 Organizations globally are adopting the concept of BYOD (Bring Your Own Device). enabling users to compute using cloud technologies and use Web-based tools including social media sites as

USE CASE #1 Organizations globally are adopting the concept of BYOD (Bring Your Own Device). enabling users to compute using cloud technologies and use Web-based tools including social media sites as a way to do business, share knowledge, conduct training, and communicate. Many of these organizations are mandating that you either install software on your device to protect their interest or not access these systems at all. The software captures every action taken to ensure the enterprise backbone (be it the school or corporation) is safe. Two Questions • If you are the owner of a device (i.e. iPhone, iPad, Laptop etc) or even work remotely using your own telecommunications provider (i.e. high speed Internet) to conduct your work, do you think that it is appropriate to put restrictions on the user? Why or why not? • What do you think is the happy medium? Should the organization also control and own the data – or is it the device owner who owns the data and responsible for securing that data? USE CASE #2 Schools and training organizations constantly push for the use of social media as a learning agent. Yet, social media is often considered the “wild west”. The “wild west” includes access to downloads that can be virus prone, links that take you to spam-like content and/or opt-in list, or systems that can compromise not only computer security but the server which is controlling Internet traffic. One Question • What kind of policies would you implement to ensure people in your organization are safe in the world of social media, and that organizational infrastructure is not compromised by a social media security breach?