{"id":905,"date":"2014-06-17T16:04:54","date_gmt":"2014-06-17T21:04:54","guid":{"rendered":"http:\/\/flevy.com\/blog\/?p=905"},"modified":"2014-06-17T16:07:00","modified_gmt":"2014-06-17T21:07:00","slug":"byod-in-the-workplace-mitigating-the-risks-reaping-the-rewards","status":"publish","type":"post","link":"https:\/\/flevy.com\/blog\/byod-in-the-workplace-mitigating-the-risks-reaping-the-rewards\/","title":{"rendered":"BYOD in the Workplace: Mitigating the Risks, Reaping the Rewards"},"content":{"rendered":"<p><a href=\"https:\/\/flevy.com\/blog\/wp-content\/uploads\/2014\/06\/shutterstock_164143364.jpg\"><img decoding=\"async\" class=\"alignright size-medium wp-image-906\" alt=\"ipad\" src=\"https:\/\/flevy.com\/blog\/wp-content\/uploads\/2014\/06\/shutterstock_164143364-300x200.jpg\" width=\"300\" height=\"200\" srcset=\"https:\/\/flevy.com\/blog\/wp-content\/uploads\/2014\/06\/shutterstock_164143364-300x200.jpg 300w, https:\/\/flevy.com\/blog\/wp-content\/uploads\/2014\/06\/shutterstock_164143364.jpg 500w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The data management firm SailPoint found in its 2013 Market Pulse survey that 82 percent of large companies (those with 5,000-plus employees) have some sort of bring your own device policy. Cisco reported in its 2012 report, &#8220;BYOD: A Global Perspective,&#8221; that U.S., Asian and Latin American firms are the most receptive to BYOD policies, while Europe is more cautious about implementation. BYOD offers companies several obvious benefits, such as cost savings on equipment and increased employee productivity. For businesses thinking about adopting a BYOD policy, security remains the primary concern.<\/p>\n<p><strong>Confidential and Proprietary Information<\/strong><\/p>\n<p>One of the top concerns IT departments have when administering BYOD policies is keeping company information safe. This is especially concerning when employees leave the company and still have emails, documents and other company information stored on their iPad, notebook or smartphone.<\/p>\n<p>The best way to handle this issue is to plan ahead. A written BYOD policy that details exactly what the company expects from employees is essential. It should clearly articulate, among other things, acceptable uses of data, limits of data use and a termination\/leaving the company policy.<\/p>\n<p>One solution is to use a third-party enterprise mobility management service to balance the company&#8217;s security interests with employees&#8217; desire to use their own devices for work and personal use.\u00a0<a href=\"http:\/\/us.blackberry.com\/business\/enterprise-mobility\/byod.html\">BlackBerry<\/a>\u00a0offers a popular mobile device management platform, and there are others. Just make sure whichever solution you choose can be implemented across BlackBerry, iOS and Android devices.<\/p>\n<p><strong>International Issues<\/strong><\/p>\n<p>Regulations as they pertain to BYOD administration vary between countries, which can present problems for multinational firms. Compliance issues are one of the main reasons companies operating in more than one country are slow to embrace a BYOD policy.<\/p>\n<p><a href=\"http:\/\/www.mayerbrown.com\/Electronic-Discovery--Information-Governance---Tip-of-the-Month-Managing-the-Risks-of-Bring-Your-Own-Device\/\">Mayer Brown<\/a>, a global provider of legal services, recommends getting all relevant stakeholders\u2014including IT, HR, security, and compliance departments\u2014involved in drafting your BYOD policy. Companies should also consider which employees are allowed to participate in BYOD programs. Those who have been with the company for more than a year and hold positions with low turnover are good BYOD candidates.<\/p>\n<p><strong>Remote Wiping<\/strong><\/p>\n<p>Another solution being widely implemented is remote wiping. The hard drive of a former employee&#8217;s BYOD laptop, smartphone or tablet can be completely erased by an IT department without warning.<\/p>\n<p>Despite cloudy legal factors associated with this practice, 21 percent of companies surveyed by data security firm Acronis in 2013 said they utilize remote wiping. Lewis Maltby of the National Workrights Institute told\u00a0<a href=\"http:\/\/bgr.com\/2014\/01\/22\/byod-remote-wipe\/\">BGR.com<\/a>\u00a0that complaints from former employees whose devices were wiped are on the rise.<\/p>\n<p>Though a written policy can provide employers some legal protection, remote wiping could potentially violate state computer trespassing laws. Make certain your legal advisors have looked over your BYOD policy before publication, especially if remote wiping is part of it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The data management firm SailPoint found in its 2013 Market Pulse survey that 82 percent of large companies (those with 5,000-plus employees) have some sort of bring your own device policy. Cisco reported in its 2012 report, &#8220;BYOD: A Global Perspective,&#8221; that U.S., Asian and Latin American firms are the most receptive to BYOD policies,&hellip;&nbsp;<a href=\"https:\/\/flevy.com\/blog\/byod-in-the-workplace-mitigating-the-risks-reaping-the-rewards\/\" rel=\"bookmark\"><span class=\"screen-reader-text\">BYOD in the Workplace: Mitigating the Risks, Reaping the Rewards<\/span><\/a><\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[84],"tags":[424,423,425,426],"class_list":["post-905","post","type-post","status-publish","format-standard","hentry","category-information-technology","tag-bring-your-own-device","tag-byod","tag-mobile-device","tag-workforce-mobility"],"_links":{"self":[{"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/posts\/905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/comments?post=905"}],"version-history":[{"count":3,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/posts\/905\/revisions"}],"predecessor-version":[{"id":909,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/posts\/905\/revisions\/909"}],"wp:attachment":[{"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/media?parent=905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/categories?post=905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/tags?post=905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}