| Abstract [eng] |
In today’s business climate, mobile smart devices are becoming an integral part of everyday business practices. Smart mobile devices have become platforms for viewing, exchanging and sharing data. Companies around the world are trying to adopt innovative practices to increase the quality and productivity of their business operations. Previous practices provided the employee with all the tools required for the job. However, these days, the number of items with an internet connection exceeds the number of people in the world several times over, and 8 out of 10 people in the world have a smart device. Additional devices cause inconvenience to the employee and additional costs to the business. In the modern business environment, there is an increasing practice where an employee can use a personal device for work purposes - a laptop, a tablet, a smartphone, etc. The employee is already well acquainted with the functions of personal devices, he does not need training in the operation of the device, the employee does not need to physically have several devices with him at the same time. As a result, the level of employee satisfaction increases, which affects more productive work, company‘s customer service, additionaly saving the company‘s financial resources. However, no practice brings its own shortcomings. Storing, viewing, and exchanging both personal and corporate data on a single device poses an additional risk of leaking private company data. Employees can connect to an insecure network, use devices with insecure settings, or malicious files. The problem is how to ensure the security of company data for an employee using a personal mobile device. Unsafe practices expose the company or employee to legal liability for violations. Companies that have access to customer, financial or other legally protected information must practice actions and procedures to ensure the confidentiality of the information. In regard to this, companies develop information technology security policies. The purpose of the information technology security policy is to ensure the confidentiality, integrity and availability of information when it is available to employees of the company. |