{"id":4342,"date":"2012-07-20T09:04:13","date_gmt":"2012-07-20T14:04:13","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=4342"},"modified":"2012-08-20T21:45:06","modified_gmt":"2012-08-21T02:45:06","slug":"considering-byod-in-the-workplace-what-you-should-know","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2012\/07\/considering-byod-in-the-workplace-what-you-should-know\/","title":{"rendered":"Considering BYOD in the workplace? What you should know"},"content":{"rendered":"

Many organisations, especially in the Caribbean, have informal Bring-Your-Own-Device arrangements. Although there may be cost saving benefits to such arrangements, there are a number of far-reaching consequences that should be considered.<\/em><\/p>\n

\"\"<\/a>Historically, an individual\u2019s first exposure to IT was either in the work place or at school (university or college). The equipment was expensive, and was not readily affordable to the average household. As a result, equpiment (and even software) manufacturers catered almost exclusively to the needs of the business sector in terms of the features and functionality of their product offerings.<\/p>\n

Over the last decade, computing equipment have become more affordable. However in the last five years or so, heralded by the release of the iPhone<\/a>, there was a distinct change of focus to towards developing products primarily for the mass market, which has been loosely\u00a0refrred to \u201cIT consumerism<\/em>\u201d. As a result, the needs and\u00a0interests of the consumer markets are driving IT innovation, and new developments are being targeted at that market first, and thereafter the private and public sectors.<\/p>\n

With more individuals being able to afford technology, the phenomenon, Bring Your Own Devices (BYOD), where employees use their own personal devices \u2013 such as mobile\/cellular phones, smartphones, tablets and laptops \u2013 in the workplace, has begun to emerge. On first thought, organisations, especially those in the Caribbean, might welcome this changing paradigm, as it could signal reduced expenditure and a\u00a0changing obligation to provide ICT equipment to employees. However, there are a number of implications that employers ought to consider, some of which are highlighted below.<\/p>\n

Financial<\/h3>\n

As indicated above, organisations might initially be quick to accept and implement a BYOD policy, due to the savings that may be realised from not having to supply employees with devices, and to varying degrees, subscriptions to telecoms services. However, there is a wealth of equipment choices and platforms from which employees can choose. As a result, instead of supporting one platform, such as the BlackBerry Enterprise Server, an organisation should be prepared to invest in a number of additional platforms in order to provide their employees with the requisite interface\u00a0to successfully connect to the company\u2019s network.<\/p>\n

Network\/systems security<\/h3>\n

\"http:\/\/www.freedigitalphotos.net\/images\/view_photog.php?photogid=4036\"<\/a>With very few exceptions, organisations typically seek to maintain control over how their resources are accessed and used. Hence a particular focus of most IT departments is establishing and maintaining a suitably rigorous security framework that governs connectivity to the workplace\u2019s network and equipment. However, in a BYOD context, the integrity of that system could be greatly undermined by the differing security features and options offered by the employee\u2019s choice of equipment.<\/p>\n

As highlighted in The future of the enterprise-ready smartphone<\/a><\/em><\/strong>, some of today\u2019s popular portable devices might not be particularly suited for the corporate environment. Their greatest challenge is that they have limited security and management features, which might be due in part to a focus on the mass market, or a particular demographic, rather than on the needs of the corporate client.<\/p>\n

Expertise<\/h3>\n

The incorporation of additional platforms and Operating Systems into a existing\u00a0enterprise network has implications to an organisation\u2019s IT department, or the team that maintains the network. With the introduction of a BYOD policy, provision must be made to upgrade and broaden the skills and expertise of IT personnel to ensure proficiency with the other platforms and their coherent integration into the existing system. Additional training might be necessary, but organisations may also need to secure new specialist skills to address their changing IT needs, which will also have financial implications.<\/p>\n

Acceptable use policies<\/h3>\n

\"\"<\/a>In many organisations, it is the norm to establish policies that govern the use of its equipment, Internet access, and its email facilities. Many of those policies aim to establish what might be acceptable use within the workplace and with an organisation\u2019s resources. However, as reflected in 7 useful tips when implementing policies for Internet\/email use<\/em><\/strong><\/a>, the premise of such policies is that the employer has supplied employees with certain facilities, and thus can stipulate certain conduct. However, in a BYOD setting, the organisation might find it difficult to dictate what might be acceptable use of an employee\u2019s own personal device.<\/p>\n

Information security<\/h3>\n

Coupled with the implications for network security, it is also important to consider the impact of BYOD policies on data security, especially in environments that might have established compliance measures. Examples where stringent measures usually exist are in financial services and health care sectors, but it would also include any industry where organisations must manage personal or highly sensitive data. In a BYOD setting, an organisation might not be seen as have ultimate control of that data, since is does not own, and would have limited control of, the devices used to access and manipulate that information.<\/p>\n

The situation becomes even more acute when an employee leaves an organisation. Data may need to be retrieved from that employee\u2019s devices. However, when the employee owns such facilities, it can again be problematic to maintain the integrity of any information security and management system that has been established.<\/p>\n

Moving forward\u2026<\/h3>\n

Although it can be argued that the above points make an excellent case not to pursue BYOD in the workplace, the truth is that the BYOD trend is growing. \u00a0Many organisations already provide their senior managers with smartphones and\/or tablets (usually as a perk), but usually cannot afford to provide such amenities to their mid-level and lower tiered staff. However, it is often a de facto practice, especially in the Caribbean, for organisations to piggyback on the fact that employees have their own devices, and expect them to be used in the conduct of the organisation\u2019s business.<\/p>\n

Having said this, it is strongly recommended that organisations develop a clear framework for any\u00a0BYOD scheme it supports. The issues outlined above should have highlighted some of the ramifications of BYOD, be they formal or informal, on both the integrity of an organisation\u2019s information network, and its operations. Hence a comprehensive examination of the issues, corporate imperatives and priorities, the interests of employees, along with the trade-offs that must be made, can lead to a workable\u00a0policy to the mutual benefit of all concerned.<\/p>\n

Image credit: Lasoo<\/a>\u00a0\/\u00a0Victor Habbick<\/a>, FreeDigitalPhotos.net \/\u00a0An English Shooters Blog<\/a><\/em><\/p>\n

_______<\/p>\n","protected":false},"excerpt":{"rendered":"

Many organisations, especially in the Caribbean, have informal Bring-Your-Own-Device arrangements. Although there may be cost saving benefits to such arrangements, there are a number of far-reaching consequences that should be […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[82,17,27,11,19],"tags":[69,71,38,36,39,94,37],"class_list":["post-4342","post","type-post","status-publish","format-standard","hentry","category-business","category-caribbean","category-computing","category-ict-tech","category-mobile-telecoms-2","tag-blackberry","tag-businesses","tag-data-protection","tag-devices","tag-equipment-security","tag-iphone","tag-smartphones","et-doesnt-have-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-182","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/4342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=4342"}],"version-history":[{"count":14,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/4342\/revisions"}],"predecessor-version":[{"id":4543,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/4342\/revisions\/4543"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=4342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=4342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=4342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}