Get the latest news, exclusives, sport, celebrities, showbiz, politics, business and lifestyle from The VeryTime,Stay informed and read the latest news today from The VeryTime, the definitive source.

BYOD - Policy Making and Future

25
Bring Your Own Device (BYOD) crept in so slowly that sometimes IT is unaware of the devices being connected to the network. BYOD will require IT departments to combine new product roll outs, educate users and adopt new processes. Factors that influence BYOD are device compatibility, Wi-Fi access, network bandwidth, impact on application performance, and security. Personal technology buying behavior is very different from IT's buying behavior for corporate technology. Implementing a BYOD policy requires contribution and involvement from all the functional departments. The policy has to establish rules on how software/apps are controlled and monitored.
BT-Cisco survey of 2,200 IT decision-makers in US acknowledges security may be the biggest challenge for companies to overcome when it comes to BYOD. Statistics indicate 33% of global companies have already experienced a security breach due to unauthorized devices being brought in. Other top security risks identified include lack of control over devices; unauthorized data distribution after data is on device, theft/loss of mobile devices and employees leaving the company with insider knowledge/threat to IP. In spite of the challenges, 90% enterprises in the U.S. believe embracing personally-owned devices for work will provide a competitive advantage over those that have not adapted to enterprise mobility yet.
Right policies and guidelines will help employees and the enterprises to have secure BYOD system. Following are some essential steps that will help in establishing an effective BYOD policy in the enterprise
1. Employee-Owned Device: Define what constitutes an €Employee-Owned€ device in an enterprise. State the liability of the device in case of theft/loss. Create a list of accepted devices & Operating Systems.
2. User's Roles & Privileges: Define the responsibilities with a BYOD policy. The responsibility of the employee in case of device theft/loss, privacy levels to the user should be stated in the policy. Privileges with respect to privacy & monitor will vary depending on the position of the employee. Define the BYOD eligibility based on location, line of business, and seniority.
3. Back-up Solutions: The policy has to specify acceptable backup solutions that are compliant with corporate security policies.
4. Built-In feature control: Define the ways the built in features of the mobile device will be controlled like photos, videos, audios.
5. User Safety: The BYOD policy has to define means of user safety in the event of any injury while using the device.
6. Device Controls: Define scenarios during part replacements; call reimbursements, device surrender in case of employee exits, and overseas travel of the employee with the device, and sharing device/data with family members.
BYOD is a phenomenon of consumerization of IT. Cloud computing is yet another phenomenon of IT consumerization which also influences enterprise mobility to a large extent. Cloud will have a major impact on how mobile devices are being used within the enterprise. Cloud will reduce the gap between mobile and on-mobile devices. Traditional ways of provisioning for mobile devices will be replaced by cloud's interference. It will simplify many processes like tunnelling through the firewall, case-by-case permission scenario.
Source...
Subscribe to our newsletter
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
You can unsubscribe at any time

Leave A Reply

Your email address will not be published.