Will putting users in control of BYOI solve our privacy problem or BYOi privacy?. Let’s start from something everyone is familiar with, since it happens from time to time in the local news headline. A recent US journal report about 12 millions people’s location information being leaked, brings the headline for consumers to large privacy matters. If you think that do not brother you as nobody, it matters for somebody only, think twice. With the location can be leakage, that also means a lot of information can be leaked from the smartphone that you carry all the time. Website service you used, shopping items, banking you used, up to all the privacy information we do not want to be tracked.
A lot of mobile software is installed, they will grant with a lot of permission, and they are running behind the processes. For those with the bad intention app, or embedded with the bad intention software component from open source or unknown source, end up keep bringing in the news that have unusual application behavior that breach a lot of privacy concern, or perform some of the information leakage the user is not even aware of.
BYOI over all the services you used and visit and grant the access, may potentially become a risk if not handled properly, in particular for those malware with bad intention in design, may leverage BYOI to discover more privacy you do not want to disclose in the public. Enterprise own control identity seems in one way to provide a good solution to the bigger problem on a partial basis. This is why we keep seeming for a lot of cross sector collaboration or service providers attempting to cross deploy their solution on a larger scale with the intent to make their solution become “universal” applicable to all the scenarios. But to that extent, did it different from being another BYOI for the consumer at large? so, we are now in the middle of the transition, cybersecurity awareness for the potential abuse of the user data and the industry is making progress to resolve user privacy matters. Until a new “universal” solution becomes de facto, before that, we will still need to live in the hybrid solution where some is using BYOI and some is using enterprise issue and control identity. Both have their strengths and weaknesses. Let’s have an eye open for what is moving forward.
E-SPIN being active in the business of supplying enterprise technology for digital transformation, including Identity and Access Management (IAM), feel free to contact E-SPIN for your project and operation requirement.