Many challenges created by the bring-your-own-device (BYOD) trend can be addressed through the integration of technology and enterprise policy, according to a recent TechNewsWorld article.
Enterprise policy can address BYOD challenges
Many challenges created by the bring-your-own-device (BYOD) trend can be addressed through the integration of technology and enterprise policy, according to a recent TechNewsWorld article. Technology plays a vital role in mitigating risks such as data security and loss. While it is the role of IT to implement mobile device management (MDM) technology that can protect company data in a highly diverse environment, enterprise policies are necessary to address legal issues.
The article uses email as an example. When employees use company-owned devices to send an email, it is understood that the company has the right to look at that email, but that clarity begins to break down when emails are sent from personal devices. More often than not, there are no clear legal answers for these kinds of issues, so enterprise policies must address accepted use issues while employees are at work.
"Given all these BYOD issues, it seems pretty clear that there should be a written document specifically delineating the rights and obligations relating to the employee's use of employee-owned smartphones, tablets and computers," the article states. "In addition to addressing IP and email, the document should address employer requirements for security software, encryption and passwords on these devices if the employees have access to the employer's email, system and the like."
Recommendations for mobile device management policies
As businesses start to plan for BYOD, it's important that they consider the right things so important aspects of policy can be addressed. A recent ZDNet article highlights several considerations enterprises need to think about for BYOD.
One important consideration is security, including how they will enforce strong passwords, antivirus software and take other precautions to protect sensitive data from malware. Businesses can make their employees sign contracts, but they can also implement mobile security technology to prevent devices that don't meet security requirements from accessing the network.
Plan for ongoing mobile device management
Organizations must also consider the best approach for application delivery and the type of infrastructure they will require. In addtition, they will need to determine whether any changes must be made to the existing network environment.
"Traditional, platform-dependent software applications will create technology and data compatibility issues for the business," the article states. "IT organizations must begin to ease the transition now by moving to cloud-based, platform-agnostic, extremely accessible applications now."
Once a plan for implementing BYOD policies is in place, the next step is determining how BYOD will be supported on an ongoing basis. If the IT department will provide tech support for personal devices, IT personnel need to determine how support will be provided. ZDNet suggests setting up social IT solutions to enable information sharing between users.
Recommended Articles for You
More from this Author
Fresh from the Desk