No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Featured

BYOS: Mitigating the Risks of Shadow IT’s New Twist  

by Kevin Gibson
November 8, 2017
in Featured, Risk
business man carrying case

BYO Software, BYO Vulnerabilities

The shadow IT phenomenon—in which employees use their personal technology on the job—looms larger than ever. The latest twist- bring your own software.

First up was the bring-your-own-device (BYOD) movement, with employee-owned smartphones, tablets and laptops replacing company-owned devices in the workplace. Now there is a newer shadow IT twist—bring your own software (BYOS). In this increasingly popular model, employees download and utilize software, apps and the like—in some 99 out of 100 cases, web-based—for such work-related purposes as collaborating or exchanging information with colleagues.

Like its BYOD counterpart, the BYOS model affords employees the flexibility to use the tools that best help them fulfill their responsibilities, in turn increasing productivity and benefiting corporations’ bottom lines. But as is true of BYOD, BYOS also opens doors for significant risks, making risk mitigation a must for all corporations that embrace it to any extent.

The Risks

What, exactly, do organizations risk when they embrace BYOS? Governance-, litigation- and compliance-related complications rank at the top of the list. Quite often, corporations are unaware that certain data resides in employee-acquired software until such data is found during the discovery stage and/or in the midst of litigation. Negative consequences can ensue here. For one case of which we are aware, in-house corporate counsel was deeply involved in discovery before learning that data pertaining to pending litigation could be found on a collaboration platform that had been downloaded by an employee. This revelation was an extremely unwelcome surprise—and it had a poor impact on the case itself.

Additionally, companies can, as a result of BYOS, experience leaks of intellectual property or expose data that is mandated to be protected—e.g., personally identifiable information (PII) pertaining to customers or employees. The risk of PII disclosure from BYOS merits particular attention in light of the General Data Protection Regulation (GDPR), which takes effect on May 25, 2018. The regulation applies to PII that belongs to the customers and employees of corporate (and government) entities that are headquartered and/or do business in the European Union (EU). Fines for violating the GDPR will be stiff—up to €20 million ($23.5 million U.S.) or 4 percent of global revenue, whichever is higher.

Policies and Procedures

Mitigating BYOS risk begins with analyzing where the most significant vulnerabilities lie, which workflows lead to them and what individual platforms are meant to help employees to accomplish. With this in mind, organizations can formulate policies that govern the type of software employees can bring to the workplace and those they cannot, as well as how BYOS “products” are to be used.

Nonetheless, policies cannot completely eliminate the potential risks of permitting employees to download software to any device for use in the course of their work. Why? In certain instances, employees are so tempted by the ease of downloading and experimenting with software tools prior to purchasing them that they fail to consider whether accepting so-called “try before you buy” offers from vendors would violate corporate BYOS policy. Some circumvent policies, either unintentionally or based on the belief that they need the software to get their work done, no matter what the rules dictate.

Moreover, it is not uncommon for employees to inadvertently store data and/or make data accessible to others when it should not be so. For instance, employees communicating socially on a BYOS platform may move into a work-related discussion and, in the course of connecting, add sensitive customer information to the system, where it remains and can be accessed by anyone. Although policies might prevent employees from utilizing a certain type of software, they cannot prevent them from sharing or keeping data purely by accident.

The Technology Edge

Thus, technology is an essential weapon when it comes to shadow IT. Risks inherent in BYOD can be partially mitigated through BYOD management and monitoring software. On the BYOS side, corporations should implement survey and collection solutions or leverage them in software-as-a-service (SaaS) mode. Such solutions support BYOS risk mitigation by harnessing artificial intelligence to determine what data has been shared and on which software platform, as well as by collecting legally defensible data as necessary. Data can be archived for later retrieval during eDiscovery and for other purposes, again minimizing exposure to BYOS-induced risk. It can also be easily located, so that it may be promptly deleted from the system when an employee, former employee, or customer makes such a request in keeping with the Right of Erasure afforded by the GDPR.

Without harnessing survey and collection solutions, it is difficult, if not impossible, to render software discoverable and compliant. If a corporation is unaware that BYOS in the form of an app, Wiki, collaboration platform or other software exists and that certain data resides within it, such discoverability and compliance cannot be achieved—the “unknown,” as it can be called, continues to exist.

Organizations can also benefit from adding another layer of risk mitigation by harnessing technology that permits them to regularly execute “discovery crawls.” Through these crawls, they can determine which new software platforms employees have brought to the table and, if warranted, take action to foster compliance with BYOS policies.

Shadow IT will, without a doubt, continue to present new risks to organizations as it evolves. Understanding and addressing these risks with a combination of policies and technology constitutes the best approach for minimizing existing vulnerabilities and limiting the negative effects of emerging ones.

 


Tags: Cyber RiskEmerging Technologies
Previous Post

Compliance Job Interview Questions and Answers

Next Post

Getting to GDPR Compliance: Risk Evaluation and Strategies for Evaluation

Kevin Gibson

Kevin Gibson

Kevin Gibson is CEO & Chairman of Hanzo. Hanzo provides legally defensible collection, preservation and analysis of web and social media content for Global 2000 companies in the cloud, on premise or on demand.

Related Posts

news roundup new

Few Business Leaders Feel Fully Prepared for Challenges of 2025

by Staff and Wire Reports
June 20, 2025

Data center operators not using full slate of available sustainability tactics; companies continue to use AI without policies

matrix numbers cybersecurity concept

Why Scalable Global Frameworks Like ISO 27001 Matter

by Sam Peters
May 29, 2025

Updated security standard addresses modern threats with expanded digital protections

news roundup green bars

In-House Counsel Salary Increases Slow

by Staff and Wire Reports
May 2, 2025

Majority of execs predict rise in fincrime in ’25

data abstract green purple

66% of CISOs Worry Cyber Threats Are More Advanced Than Companies’ Defenses

by Staff and Wire Reports
April 25, 2025

US business sector falling behind in adoption of renewable energy

Next Post
Getting to GDPR Compliance

Getting to GDPR Compliance: Risk Evaluation and Strategies for Evaluation

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights