Byod Pro's and Con's

Topics: Personal digital assistant, Mobile software, Mobile phone Pages: 9 (2327 words) Published: February 16, 2013
Bring Your Own Device


Bring Your Own device is a business policy of employees bringing personally owned mobile devices to work and using those devices to access privileged company resources like email, file servers and databases as well as personal applications and data. The types of devices that employees may use are smart cell phones and laptops. The reality is that there is no simple solution when it comes to regulating BYOD. Every organization is different and there are number of different factors that have to be taken into consideration.  First a company will have to decide which employees will be allowed access, as well as the types of devices they are going to support.

“Forrester Research reported in July of 2011 that nearly 60 percent of companies allow employees to use personal devices for work. “Bring Your Own Device (BYOD)” policies allow employees maximum choice and flexibility but raise new challenges in maintaining the personal privacy of the user, managing and securing valuable corporate information assets, and providing IT with an unpredictable and inconsistent mobile environment. There are also mobile technology considerations, while mobile devices are surpassing PCs and laptops as a user’s primary computing platform, they do have limited access to power, network and hardware resources. Devising a BYOD solution that will support both personal and business roles requires attention to all of these challenges”. The paper will be to identify most of the risks associated with companies allowing personal devices in the work place to access company information. I will also demonstrate the downside of the BYOD policy and the affects to the company and the employee. There are numerous risks associated with the BYOD policy many of them are security related the loss or theft of a mobile phone could lead to confidential data being stolen and interruption of services this could hurt the company legally as well as financially. Data is discoverable means the device and the information in the personally owned device are subject to litigation and the user has no right to privacy. The device and the information can be examined by the employer and used in a litigation lawsuit. The duty to preserve and disclose electronically stored information is usually initiated by a judicial order, a discovery request, or knowledge of a pending or future legal preceding that is likely to require gaining access to the electronically stored information. Determining what data is required for the matter, and then finding that data’s location across networks and archives is a huge challenge for legal and Information Technology departments, especially if pro-active planning is incorporated. The scope of data to be preserved or disclosed is determined by the subject matter of the dispute, and the law and procedural rules that a court or other authority will ultimately apply to resolve the dispute. In general, all data is potentially discoverable if it is relevant to the disputed transaction. Failure to preserve or disclose discoverable data may result in serious penalties. Employees need to be made aware that there is no privacy policy and the information may be used in litigation. Litigation expensive, when an employer allows multiple devices to be used this drives up the cost of lawyer fees when litigation is necessary. If there is a data breach an insurance company may not cover the claim if the BYOD program is not involved in the policy it may be only for corporate devices and not personal ones. Dealing with a data breach is expensive and time consuming if found guilty the lawyers fee and penalties can rack up a huge bill. Loss of personal files, employees need to be made aware that personal information may be lost and the company may not be responsible. When your personal smart phone, laptop or tablet is used for...

Cited: The BYOD Conundrum." Web log post. N.p., n.d. Web. 09 Dec. 2012.
Benigno, Richard. "10 Tips for Implementing BYOD Securely." N.p., 08 Sept. 2012. Web. 09 Dec. 2012.
Berkowitz, Philip. "Corporate Counsel." Corporate Counsel. N.p., 26 July 2012. Web. 09 Dec. 2012.
Messmer, Ellen. "BYOD-resistance Loosening but Security Practices Lacking."Consumerization of IT, BYOD. N.p., 25 Oct. 2012. Web. 09 Dec. 2012.
Savitz, Eric. "Developing A BYOD Strategy: The 5 Mistakes To Avoid." Forbes. Forbes Magazine, 27 Mar. 2012. Web. 07 Dec. 2012. Courbanou, Dave. "Dell, Intel: BYOD Is Productivity Powerhouse | Channelnomics."Channelnomics RSS. N.p., n.d. Web. 07 Dec. 2012.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Pro’s and Con’s of Interscholastic Sports Essay
  • Pro's and Con's of Genetic Engineering Essay
  • Pro's and Con's of the Prohibition Essay
  • Industrialization: The Pro's and Con's Essay
  • Essay about Pro's and Con's of Handguns on Campus
  • Byod Essay
  • Pro's and Con's of Abortion Essay
  • Pro's and Con's Section 8 Housing Essay

Become a StudyMode Member

Sign Up - It's Free