Dual-service technologies have the ability to propose security difficulties to the nonprofits that distribute them to their employees. Specific controls vary depending on the device and the mobile platform that it uses.
The Littler Report introduced a study in May 2012 — “The Bring Your Own Device to Work Movement: Engineering Practical Employment and Labor Law Compliance Solutions” — which hit on the topic of mobile management.
The idea of a Mobile Device Management (MDM) allows for options in control of dual-service mobile technologies. Implementing these features of MDM allow a company to remotely manage and configure many aspects of these technologies.
Here are some of the more common security controls these tools allow:
- Require encryption of all data stored on the device
- Require strong passwords for access
- Force the wipe of the device after 10 unsuccessful password attempts
- Lock the device after a period of inactivity to prevent unauthorized use if the device is inadvertently left available or lost or is stolen
- Prohibit “jailbroken” devices (Jailbroken refers to the process of bypassing features or protections in the operating system of the device. This process can introduce a variety of security vulnerabilities)
- Use the remote wipe features to delete all data on the device
- Use remote location features (e.g. the iOS “Find My iPhone” feature)