Bring Your Own Device
“Solving The BYOD Problem For The Enterprise”
Page | 1
Introduction Enterprise computing, as we know it, is facing a dimensional shift with the widespread
diffusion of the BYOD (Bring Your Own Device) phenomenon. BYOD is the latest trend hitting businesses where employees are bringing their own personal mobile devices. Some of these devices include smartphones and tablets which are brought into their place of work, and used on the corporate network for purposes such as accessing files, email servers, and databases. Over the past few years, employees in many organizations are bringing their own personal devices to the work environment to handle business needs. With employees using their own devices, CIOs and IT departments across the nation are frantically trying to keep up with their employees by ensuring their networks are safe and secure. There is no doubting mobile devices have taking over a big part of our lives. These devices travel with us wherever we go while always being within a short reach away. People are beginning to realize the usefulness of getting work done from their own mobile devices. With this trend enterprises are in need of a policy for employees bringing their own devices to work. Although a relaxed BYOD policy can offer an organization many benefits, it tends to be a double edged sword. A lax policy leaves sensitive data vulnerable; an overly strict one stifles employees trust relationship with their employer. A balance must be struck between offering employees a pleasant and enjoyable work environment and maintaining the security of enterprise data. As the expectations of workspace personnel evolve, organization leaders must find ways to adapt and overcome the challenges that arise when corporate culture has a conflict with social standards and consumer trends. Management must consider the potential detriment to the workforce morale and how this could ultimately result in productivity loss. Page | 2
This is evident in the current 90% of employers who have chosen to allow personal devices at work with little or no precautions (Miller, Voas, and Hurlburt, 2012). Most workers consider themselves, not the company, to be responsible for the personal devices they use for work purposes. This all begs the question, how should an organization go about implementing a BYOD policy? Which policy can best suit a particular type of business? Should organization leaders place priority on protecting its data assets, or must they protect the health of their workers? If the latter is chosen, what compromises must employees be expected to make to ensure a necessary, minimal level of security is in place? These are all the major questions IT departments are seeking answers for when providing a BYOD environment. This research paper will provide a working outline with the correct steps needed for the development process for a BYOD work environment. The paper will touch upon key subjects addressing the careful decisions that must be made in order to set up the proper policies. An organization’s main goal is making certain your business has both a safe and secure network while keeping the employees satisfied.
Key Issues. The key issues for the implementation of BYOD involve five main areas. The main areas
are people, planning, management of technology, assessment and execution. The first main area, people, involves how management must communicate with the enterprise’s employees, provide leadership and proper governance. The second area, planning, management must provide a plan to implement BYOD into the enterprise that aligns with the business,
Page | 3
communicates the IT strategy to the business and provides sound quality control. The third area, management of technology, IT management should provide a flexible and standard BYOD policy for employees. The fourth area, assessment,...