Tech

How to operate the enterprise BYOD

The BYOD (Bring Your Own Device) is a lot of attention within IT departments. Although it can be considered a good thing overall, there are pitfalls that employers and employees should keep in mind when s’embarquent on this path.

By 2017, an estimated 50% of companies require their employees to use personal devices in the workplace. So if you think that the phenomenon is already considerable, wait to see what will happen in a few years.

However, it is the BYOD suitable for you? Whether you are an employee, an employer or an IT administrator who needs to ensure that everything works, the use of personal devices in this business potential hazards that must be carefully considered.

Challenges for employees

Employees must determine whether to use their own personal device on the workplace suits them. The stakes are indeed much more substantial than just power or not work with their new smartphone, tablet or laptop.

This raises such issues of respect for private life, whether the company can track the movements of the employee via their device, or if the internet is monitored. Like most recent devices are equipped with an integrated GPS, they can be monitored almost permanently. The endpoint security software is able to identify the location of a device, they know exactly where to find the employee at any time when his camera with him and what he is doing with. An effective policy must deal clearly and concisely the issues of respect for private life and systems must be in place to prevent abuse such as stalking and spying on the workspace.

This raises also the question of security. Most companies that adopt the use of personal devices in the workplace impose that the devices are configured so that they can be erased remotely if lost or stolen. Now what happens there if your youngest s’amuse trying to guess the secret code of your iPad to play Angry Birds and all his attempts trigger alarms within the IT department, so that the software monitoring or individual, wrongly interprets this as an intrusion attempt and began to remotely wipe your device?

Countless stories of people who have seen their personal device to be remotely wipe because of an overzealous security policy on the use of personal devices in the workplace. This happens, and it happens even more frequently than are willing to admit the stakeholders.

The reasons for deletion may be diverse, but the most common are the following.

  • Loss or theft : This is the most common reason for erasing devices. If the goal is to prevent the company data falling into the wrong hands, personal data also disappear at the same time. Moreover, if the device never resurfaced later (because it had slipped between the cushions of the sofa, for example), the IT team is left with more work.
  • Unpacking or rootage : play with the security features built into your device and expect it to be erased.
  • Activity irregular : your toddler puts his hand on your device and try to penetrate to play Angry Birds … Enter the secret code wrong too many times can trigger a deletion.
  • Installing an application unauthorized : if you’re lucky, prohibited only the application will be deleted, but do not count.
  • Erasing starting : some companies perform a “wipe to start” on devices when an employee leaves. Users are warned sometimes, but other times it much differently
  • accidental or malicious Erasing . This is also something that happens

Once they have accepted the pill the use of personal devices in the workplace, employees will do fewer things with their devices. There will likely be limitations on the applications that can be downloaded and installed, while bypassing the limitations imposed by the operating system through the unlock and rootage will almost certainly impossible. The devices will also become obsolete over time, which implies that it will keep an upgrade cycle that may not suit them.

A tablet or smartphone staff used at the place of work can very quickly give the feeling that he no longer belongs to its owner.

“A lot of smartphones”

The use of personal devices in the workplace is definitely not for everyone, so that some employees of companies that require users to “bring their own devices” to work choosing to purchase separate devices for work and home. Thus we see more and more people walking around with “a bunch of smartphones.” This n’est not an ideal solution, but it allows employees to create a separation between work and home; it limits the intrusion of work into their personal device while avoiding their stupid acts like sending a bad joke to their leader or their colleagues.

Employees must take responsibility for safeguarding their data. While most companies will take things in hand s’agissant data work, personal data are the responsibility of the owner of the device that must s’assurer they are safe.

The device can be seized

If there is still a risk that a smartphone or tablet is lost, stolen or damaged, the use of personal devices in the workplace introduced some additional risks that you may have not thought of. Thus, besides the risk of remote wipe, the unit can be entered for examination in the legal proceedings involving the company or another legal issue or security. In such a case, the employee can expect that whatever is on his device is considered, which can be very unpleasant.

Moreover, at any time and for various reasons, the employee may end up with his camera out, and data on it inaccessible. For most people, this is the biggest drawback of the use of personal devices in the workplace. If the employee should not be troubled with such a situation neither be out of pocket, whole story when it happens.

Again, it is vital to have a data backup in case of loss, assuming that the policy of use of personal devices in the workplace allows users to perform a personal backup.

The stakes for the company

For companies, the problems to be addressed are many and varied. They revolve generally around the creation of a workable policy for using personal devices in the workplace should encompass a wide range of topics from the security and support to the identification of who pays what, through what happens if a device is confiscated or seized, or what happens when an employee leaves or is dismissed (do not forget that there is not the data on the device which we should be concerned, but the backups that have been made). All companies, large and small, who engage in the use of personal devices in the workplace should have a policy on the matter that is clear and easy to understand, to which everyone should be aware that everyone must accept and, to some extent, which is to please everyone.

The development of such a policy on the job (or, worse, by adopting an approach “organic”) invariably leads to disaster. Similarly, it n’est not the same as simply allowing employees to bring their devices (for example, you might allow compatible devices with Exchange ActiveSync or devices iOS or Android) to have a policy in place .

A policy of effective use of personal devices in the workplace must address the following points:

  • acceptable use;
  • authorized devices;
  • responsibility, risk and liability exclusion clause.

If you think you can take things lightly, think twice.

Follow the use of data

If you are an IT administrator in a company supports the use of personal devices in the workplace, you are already aware of the creation and the implementation of policies. However, if you work in a company that is leaking now using personal devices in the workplace, it is likely that you will need in the years to deal with employees who bring their equipment staff work with.

You will also need to get used to track data usage, text messages and voice of everyone to avoid misuse, maximize safety and control costs. Do not hope that this practice is regulated by itself, because it will not happen, and things will degenerate into a real mess in less time than it takes to tell.

In addition, you will take the reins of applications. This implies transferring applications required, to set the black list covert applications or applications hinder time-consuming. These measures may certainly seem draconian, but they must be taken.

Finally, you have to get used to ban the devices. These devices can also be banned from unbridled iOS devices, Android devices Rootes, that hardware and operating systems simply obsolete. You must be very clear what is allowed and is not and you must be able to communicate clearly to employees, not to pass on information about devices that are no longer supported, for example, enough early to avoid disruption.

Conclusion

If the use of personal devices in the workplace can and does work effectively, it is at best a compromise prepared in advance and concluded between the employer and the employee, the employer keeping the hand in most cases. A clearly defined policy on the use of personal devices in the workplace helps everyone to know what it is and is a vital tool to harmonize relations between the two parties.

  • Employees: make sure you fully understand the policy of use of personal devices in the workplace so that you know exactly what you’re getting into.
  • Employers: are developing a comprehensive policy on the use of personal devices in the workplace and make sure that everyone understands it.

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS