Comments on: 3 key questions to ask about BYOD to the workplace https://ict-pulse.com/2016/01/3-key-questions-byod-workplace/?utm_source=rss&utm_medium=rss&utm_campaign=3-key-questions-byod-workplace&utm_source=rss&utm_medium=rss&utm_campaign=3-key-questions-byod-workplace Discussing ICT, telecommunications and technology Issues from a Caribbean perspective Sat, 08 Apr 2017 00:42:06 +0000 hourly 1 By: Gerry Yaw https://ict-pulse.com/2016/01/3-key-questions-byod-workplace/#comment-171948 Thu, 18 Feb 2016 13:34:37 +0000 http://www.ict-pulse.com/?p=80956#comment-171948 This article is very relevant to current working arrangements.

]]>
By: Anton Shepherd https://ict-pulse.com/2016/01/3-key-questions-byod-workplace/#comment-171944 Tue, 09 Feb 2016 16:03:49 +0000 http://www.ict-pulse.com/?p=80956#comment-171944 Great synopsis. I just wanted to leave a further issue which is becoming more and more troublesome in this area. When an employee uses his/her personal email address during the employment, and is terminated (especially under duress or conflict), unless the organisation has a comprehensive CRM system or is willing to make the event public, the employee retains access to the network of the organisation via their personal email, which by its previous use has been automatically authorised as a business communication. This opens the possibility to continue to have access to the organisation’s information, and even conduct business in the name of the organisation without the requisite authority or endorsement.

Thanks, and keep informing!

]]>
By: Kamutula https://ict-pulse.com/2016/01/3-key-questions-byod-workplace/#comment-171940 Mon, 01 Feb 2016 00:32:45 +0000 http://www.ict-pulse.com/?p=80956#comment-171940 Or when the BYOD device in question has pre-loaded software that, as part of the internal rules, is not permitted by the organisation?

Or the same BYOD in question has been re-configured to a point of being illegal ( eg “jailbroken” device )?

]]>