ethical mobility policy development & sustainability

2

Click here to load reader

Upload: global-business-professor

Post on 05-Jul-2015

19 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ethical mobility policy development & sustainability

Ethical Mobility Policy Development and Sustainability

Policy development for ethical mobility and mobile ecosystem sustainability is about protecting

all the stakeholders of an organization – employees, customers, patients, suppliers, etc. and

mitigating the risks associated with potential security breaches to valuable data. The reason that

security is a major topic in the discussion of mobility technologies is that today’s mobile devices

are so powerful that we all, from the elementary school student to the leaders of the land have

quickly learned to use them to facilitate our hearts’ most private desires – desires that we never

wish to go public, whether it be whom we find attractive or what our next military target will be.

Ideally everyone wants perfect security to keep our secrets secret, and when individuals bring

their secrets into a networked system, that system must be managed appropriately for purposes

of mitigating security risks. As is the case with wired networks, every system is protected as

much as is possible, given the limits of technology and budget. However, every network system

connecting technical devices together is also connecting the operators of those devices

together. The operators are already socially connected with a hierarchy. Students have

teachers, who have principals, who have superintendents. Employees have managers, who

have mid-level managers, who have executive managers, who answer to CEOs and

chairpersons – the higher the level of hierarchy, the greater the access to information. In an

ethical society, everyone respects the power and responsibility of their hierarchal position and

avoid abusing their powers. When the society has strong, clear laws that are quickly and

effectively enforced, everyone has even more incentive to at least act legally, but perhaps not

ethically. Networks that shares everyone’s data from machine to machine or mobile device to

mobile device and around the planet have IT professionals, who carry the keys.

It could be said that the security of the entire system is in the hands of two people: whoever is at

the top of the client’s organization and whoever is at the top of the IT solutions provider. Here is

where mobile system policy for stakeholder protection is needed. Organizational leaders must

take final responsibility and ensure that third-party providers or other authorized personnel do

not take advantage of data access by using their keys in appropriately. The executive must

trust the IT provider, but more importantly, the executive must trust in their own ability to make

good decisions and protect digital assets and sensitive stakeholder data. Therefore, the

processes of vendor selection and vendor management practices are critical components in

mobility policy.

Another critical perspective is the IT provider and its tremendous access powers, making it

perhaps the only entity with ability to observe an organizational executive going rouge – that is,

abusing powers of authority to self-deal and/or purposely sabotage or steal intellectual property.

Therefore, the IT provider must also have a well-understood ethical obligation to observe,

capture, investigate and report any client actions which may be unlawful.

Page 2: Ethical mobility policy development & sustainability

Sustainability of a well-constructed, ethical mobility system must be planned and prepared for

changes to the environment are inevitable. Two factors are the most critical: Mobile technology

is rapidly changing, becoming more powerful every day; and Client and IT company personnel

are frequently moving within their respective organizations. The system will lose all protection if

something, either technology or staffing, changes enough to create a leak in the security.

Therefore, the mobile policy must be developed with careful consideration to address all areas

of strength, weakness, opportunity, and threat (SWOT).

For example, let us consider the example of an MDM Platform provider in a third world nation –

which may have weak national laws or perhaps even an openly corrupt government – offering a

really attractive product to an multinational resource extracting company operating in that

nation. There might even be contractual coercion for the multinational to employ the local MDM

Platform provider. In good faith, the multinational agrees to purchase and use the provider’s

MDM Platform for all their employees and contractors’ employees working within that country.

Unfortunately, a year later they lose their resource extraction contract to a local company that

now seems to have all of their proprietary information – a result of unseen leaks in the MDM

Platform. The multinational has now been exposed to serious data security risk with hefty

financial implications. Proper planning in this scenario would include SWOT analysis to consider

the political, legal, social, cultural, technological, and economic implications of using foreign

third-party vendors.

Ethical considerations are a necessary party of the ongoing evolution in Mobility. Consider the

evolution of Facebook policy, which began with allowing third-party developers of Facebook

Applications access to the user’s basic information and in many cases by default, access to

status updates, photos, friend lists, birthday, religion, hobbies, etc. However, the public outcry

for greater privacy and controls influenced changes for improved user protection.

For example, with each major release of Apple’s iOS system, protection of third-party account

information has transitioned from being the sole responsibility of the each app, and said

developer, to a process which the original equipment manufacturer (OEM) is now able to

provide an option where they hold that data in a single place for multiple apps to access at any

time. Data holding allows for greater protection of the user’s information, and an easier way for

developers to help protect and access that information.

Bottom Line: There are too many valuables at risk for mobility management policymakers to not

consider the ethical implications on all aspects of IT mobility and stakeholder data.

Conclusion

In summary, ethical considerations affect all aspects of Mobility including OTA, Network

Infrastructures, Mobile Device Management, Security, and Troubleshooting. IT and security

policies are needed to help prevent unethical practices through effective implementation of a

strict policy or by physically and logically locking a system to prevent malicious behavior. The

fact is that the world we live in is fiercely competitive and mobile technology is a powerful new