SUBSCRIBE TO TMCnet
TMCnet - World's Largest Communications and Technology Community

CHANNEL BY TOPICS


QUICK LINKS




Starting a BYOD Policy: Recommendations for Success

Enterprise Communications Featured Article

Starting a BYOD Policy: Recommendations for Success

 
June 26, 2014

Share
Tweet
  By David Gutbezahl,
TMCnet Contributing Writer
 


People are attached to their devices, and they go for the one that fits their personality and their needs. So, when they go to work, it makes sense that they would want to use their “perfect” device, rather than a device provided for them by their employer. Businesses are definitely aware of this, and are implementing BYOD policies as part of their enterprise communication strategies. Allowing employees to bring their own device definitely has its advantages beyond the comfort of employees. A BYOD policy saves companies money, not having to upgrade equipment, and it can increase efficiency by giving employees access to data outside of the work space.


Of course, a BYOD policy can also bring with it some major risks, and the policy must be implemented very carefully to minimize these. In an article for Tadiran Telecom, Mike Davis wrote five recommendations for how a business should set up their BYOD policies.

Davis' first recommendation is to seek feedback beforehand. Perhaps true for almost any major policy change, those being touched by the BYOD policy should be consulted. A CIO should discuss the new policy with their managers, and even gauge interest and thoughts from lower-level employees. Doing so will allow them to better understand what the concerns may be later during implementation, and it will also help make employees feel as if their thoughts were heard.

When it comes time to create a BYOD policy, it is vital that the policy be as comprehensive as possible. With their own devices in hand, employees will inevitably feel as if they have more freedom than with a company phone. A detailed policy, letting employees know exactly what is or isn't allowed with their devices is vital to preventing later issues. Davis also wisely recommends getting this comprehensive policy out as fast as possible in order to prevent the development of bad habits among employees.

In order to prevent the possibility of data falling into the wrong hands, remote wipe technology is absolutely vital. Such technologies have the ability to delete sensitive data from a device even when access to the device is lost. Lost cell phones or angry ex-employees will not be something to worry about with remote wipe technologies.

While a remote wipe technology will protect your businesses data, Davis brings up a valid point in being concerned for the private data of the employee. The device is the employee's personal device, and therefore it can be expected that the employee will have private data on their phone. A business should not be delving too far into the private lives of employees. Therefore, Davis recommends setting up a technology that will separate the private and business data from one another.

Disaster recovery and business continuity plans must be considered. A switch to BYOD will likely require some updating of these plans, but it is absolutely essential that a CIO ensure the business continues running. Devices that are being brought in need to be follow requirements for data management and retention. Doing so could save a business if something were to happen.

As Davis admits, the list above only lightly touches upon what a business should do in order to implement a BYOD policy. Careful attention of the details and research must be taken when developing the BYOD strategy.




Edited by Alisen Downey
Enterprise Communications Homepage





Technology Marketing Corporation

2 Trap Falls Road Suite 106, Shelton, CT 06484 USA
Ph: +1-203-852-6800, 800-243-6002

General comments: [email protected].
Comments about this site: [email protected].

STAY CURRENT YOUR WAY

© 2024 Technology Marketing Corporation. All rights reserved | Privacy Policy