Intelligent CIO North America Issue 25 | Page 45

CIO OPINION owned Apple devices for work while maintaining user privacy . IT admins are still able to perform critical functions such as locking devices , applying corporate configurations , installing and removing corporate apps , collecting security information from devices and adding / removing restrictions to protect corporate data .
Simultaneously , individual employees ’ privacy is protected by blocking admins from activities such as viewing or erasing private data , removing or restricting personal apps , tracking locations and collecting users ’ private information .
Whether employees are using personal or companyprovided devices , vigilance and control over all devices within a network is essential to combat the challenges that have developed in recent years .
As a result , the temptation is to implement widespread , invasive security measures that have strict control on employees ’ activity , and monitor their movement using the network , whether on a personal or companyowned device .
However , with this comes a growing problem in the dichotomy between protecting company assets from external threats and the call from employees for their privacy to be protected , wanting their digital activity to be unencumbered by too much oversight and tracking .
Finding a balance between these two seemingly conflicting needs is essential and raises the question
Finding a balance between these two seemingly conflicting needs is essential and raises the question of how business leaders find the right balance .
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 45