When Saman Rajaee resigned from his sales position at Design Tech Homes in Texas, he wasn't...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
When Saman Rajaee resigned from his sales position at Design Tech Homes in Texas, he wasn't prepared for the next move the company made.⁹0 He used his personal iPhone to conduct business on behalf of the company, and as part of the standard separation process, the company's IT department remotely wiped his phone and restored it to factory settings. He lost all of his contacts, data stored, and also irreplaceable family photos. He then sued the company under Texas privacy laws. The courts ultimately ruled in the employer's favor, but the story creates a cautionary tale for employers. Complicating the typical privacy and security concerns created by technology in the workplace is the "Bring Your Own Device" (BYOD) trend emerging in many com- panies. BYOD programs allow employees to use their own personal mobile devices such as smartphones, tablets, or laptops in the workplace. While companies often reimburse employees for expenses related to BYOD programs, the company ultimately saves money by not purchasing the technology. The practice is also appealing to those employees who prefer to use their own devices. Given that the boundaries between work and personal lives are becoming increasingly blurred, many employees want to have access to both on one piece of technology. From a privacy perspective, some employees fear BYOD programs give the com- pany too much access to their own personal business. A BYOD program typically has guidelines that state that the employer has the right to access the device. When you consider control and security issues, employers should want to access any device that contains work-related information and data. Management must be extra cautious to assure that the technology is secure and does not make company secrets vulnerable. Also if employees are using their device to log in to company systems, the log-in in- formation is typically stored on the device, putting the company at risk if it is lost or stolen. Many companies have established BYOD policies or asked employees to sign agreements that make the security concerns clear and provide the company permission to access the device. Policies or agreements help establish privacy expectations as well. When it comes to wiping phones, it is best for companies to take more of a "surgical" approach and remove only work-related information from an employee's phone. A more cautious approach can help keep company information secure, while reducing the risk of employees losing precious pictures of Grandma. DISCUSSION QUESTIONS 18-17. Would you want to use your personal device for work purposes? 18-18. Can you think of any other privacy or security concerns for companies that have a BYOD program? 18-19. Given the privacy and security concerns, are BYOD programs really a good idea for companies? 18-20. Are there any productivity concerns with allowing employees to use their personal devices at work? When Saman Rajaee resigned from his sales position at Design Tech Homes in Texas, he wasn't prepared for the next move the company made.⁹0 He used his personal iPhone to conduct business on behalf of the company, and as part of the standard separation process, the company's IT department remotely wiped his phone and restored it to factory settings. He lost all of his contacts, data stored, and also irreplaceable family photos. He then sued the company under Texas privacy laws. The courts ultimately ruled in the employer's favor, but the story creates a cautionary tale for employers. Complicating the typical privacy and security concerns created by technology in the workplace is the "Bring Your Own Device" (BYOD) trend emerging in many com- panies. BYOD programs allow employees to use their own personal mobile devices such as smartphones, tablets, or laptops in the workplace. While companies often reimburse employees for expenses related to BYOD programs, the company ultimately saves money by not purchasing the technology. The practice is also appealing to those employees who prefer to use their own devices. Given that the boundaries between work and personal lives are becoming increasingly blurred, many employees want to have access to both on one piece of technology. From a privacy perspective, some employees fear BYOD programs give the com- pany too much access to their own personal business. A BYOD program typically has guidelines that state that the employer has the right to access the device. When you consider control and security issues, employers should want to access any device that contains work-related information and data. Management must be extra cautious to assure that the technology is secure and does not make company secrets vulnerable. Also if employees are using their device to log in to company systems, the log-in in- formation is typically stored on the device, putting the company at risk if it is lost or stolen. Many companies have established BYOD policies or asked employees to sign agreements that make the security concerns clear and provide the company permission to access the device. Policies or agreements help establish privacy expectations as well. When it comes to wiping phones, it is best for companies to take more of a "surgical" approach and remove only work-related information from an employee's phone. A more cautious approach can help keep company information secure, while reducing the risk of employees losing precious pictures of Grandma. DISCUSSION QUESTIONS 18-17. Would you want to use your personal device for work purposes? 18-18. Can you think of any other privacy or security concerns for companies that have a BYOD program? 18-19. Given the privacy and security concerns, are BYOD programs really a good idea for companies? 18-20. Are there any productivity concerns with allowing employees to use their personal devices at work?
Expert Answer:
Answer rating: 100% (QA)
1 No I would never choose to use my device for operational purposes because I believe that in addition to the companys trade secrets and confidential ... View the full answer
Related Book For
Business Law Text and Cases
ISBN: 978-0324655223
11th Edition
Authors: Kenneth W. Clarkson, Roger LeRoy Miller, Gaylord A. Jentz, F
Posted Date:
Students also viewed these general management questions
-
On behalf of consumers, employers and local purchasers in your market are committed to slowing healthcare costs by improving visibility on hospital prices. A recent media story revealed that prices...
-
Of 2050 American tech employees who took part in an online survey, 389 said they had stolen at least one object from their work. The reasons why they said they stole are described by the bar graph in...
-
During your career, you will face morally ambiguous situations. While your alternatives may be legal, even profitable, they may not be ethical. Ethical behavior may not pay off right away, but in the...
-
Write a program that takes the name of an image file as a command-line argument, and creates and shows three Picture objects, one that contains only the red components, one for green, and one for...
-
The accounting records of Shinault Inc. show the following data for 2017 (its first year of operations). 1. Life insurance expense on officers was $9,000. 2. Equipment was acquired in early January...
-
Differentiate between theoretical and applied research.
-
Zappos.com is a popular website known mainly for its discounted shoe sales. In 2012, a hacker hacked into the Zappos website in an effort to obtain the personal account information of Zappos...
-
The cash account for Interactive Systems at February 28, 2010, indicated a balance of $7,635. The bank statement indicated a balance of $13,333 on February 28, 2010. Comparing the bank statement and...
-
below is the code for quick sort. Modify this code so it runs in O(nlogn) time on sorted input. int partition(std::vector arr, int p, int r) int pivot int i=p for (int arr[r]; 1; p;j
-
Bug-Off Exterminators provides pest control services and sells extermination products manufactured by other companies. The following six-column table contains the companys unadjusted trial balance as...
-
Posey, a member, provides bookkeeping services for Giant Construction, a sole owner company of ten employees. On a monthly basis the owner sends Posey copies of check stubs and bank statements so...
-
Security Returns if State Occurs State of Economy Probability of State of Economy Bust Boom .60 .40 Roll -15% Ross 15% 32 5 Calculate the expected returns for Roll and Ross by filling in the...
-
Sexton Corporation has projected the following sales for the coming year: Q1 Sales $810 Q2 Q3 Q4 $ 890 $850 $950 Sales in the year following this one are projected to be 10 percent greater in each...
-
A senior lending officer has provided you with the data below and you have to consider what analysis your wish to undertake. Please discuss pertinent questions that you would ask the senior lending...
-
A group of venture investors is considering putting money into Lemma Books, which wants to produce a new reader for electronic books. The variable cost per unit is estimated at $200, the sales price...
-
A toy rocket is launched from the top of a building 146 feet tall at an initial velocity of 242 feet per second. a) Give the function that describes the height of the rocket in terms of time t. b)...
-
Explain in detail the scheduling plan used in your location. Consider all special requests, e.g. PTO, extra staffing needs, call offs, etc. How/when are schedule changes communicated? What do you...
-
Why is a help desk and production support critical to system implementations? Discuss its interrelationship with the problem management and reporting system.
-
Go to this texts Web site at academic. cengage.com/blaw/clarkson and select Chapter 19. Click on Video Questions and view the video titled E-Contracts: Agreeing Online. Then answer the following...
-
National Distillers Products Co. was founded to market and sell a vodka called Teton Glacier, and the company registered this mark with the U.S. Patent and Trademark Office. National Distillers...
-
Did Matlin commit a misrepresentation on his policy application? Provident Insurance, Inc., issued an insurance policy to a company providing an employee, Steve Matlin, with disability insurance....
-
Identify and describe the elements of a two-way communication process.
-
Identify and describe the major communication channels.
-
Identify and describe the strategies for creating effective written communication.
Study smarter with the SolutionInn App