“Taking ownership for failures rather than success”to Edit
BYOD- A Productivity Catalyst
1. 1
BYOD–A Productivity Catalyst?
Bring Your Own Device (BYOD) is a consumer-led movement that is
transforming enterprise workspaces by extending the notion that 21st
century employees need to work from anywhere, at anytime and on
their devices of choice, both within and outside of the traditional
corporate structure.
Current Trends
The days of a static, one-size-fits-all policy applied to company-owned
assets are nearing its end. Today, IT departments are expected to
comprehend what devices are trying to connect to their networks, so
they can provide convenient, secure access to those that are authorized,
including personal iPads and smartphones. This approach is bound to
improve network security andmanageability, save IT staff time, enhance
employee productivity and gain strategic business advantage.
With the proliferation of mobile devices and the consumerization of IT,
corporate networks are becoming more demanding to manage and
control risks every day. Traditional network control methods are not
likely to succeed in the long run. This may endanger security and also
risk putting organizationsat a strategic disadvantage.BYOD is not only
2. 2
disrupting the traditional way technology is provisioned, paid for and
used. It also promises the dual benefits of simultaneously driving down
IT costs while improving employee productivity and
satisfaction.ThoughtWorks and Cisco are some of the established
organizations that have reaped the benefits of BYOD.
Business Case
I have the following reasons to consider BYOD in our organization
IS Strategy
Cloud services can help bridge the gap by providing the needed level of
visibility, compliance and even security. Employees generally want to do
the right thing, and it is just a matter of providing them with the
appropriate tools and training. Cloud services offer an automated
system that enables employees to properly perform tasks, ensuring
accuracy and reducing the potential for fraud, unintentional or not.
Policies and workflow reside in the cloud, which enforces the same rules
and security protections for all access points whether they are
computers or mobile devices.Despite problems, BYOD and the cloud can
co-exist. As HTML5 support matures; it's likely the feature overlap
among various mobile browsers will increase, solving one of the major
problems with BYOD in the workplace. By developing effective processes
in the present and planning for the future, a company can build a cloud
strategy that supports BYOD.
3. 3
Flexibility at Work
We have a majority of our workforce between the 25 to 35 years. There
are many interns and young candidates who will join us in the coming
years.As a forward thinking organization we can use BYOD as a way of
attracting andretaining talent. Students leaving school and university
where they have been able toplug in their own devices – smartphone,
tablet, laptop etc.; are not going to besatisfied when told by us that they
have to use equipmentprovided by the employer and are not allowed to
connect their own devices. This willbe seen as archaic, restrictive and
unsatisfactory. The likelihood is that the equipmentbeing provided by
the employer is inferior to the leading edge technology owned bythe
employee.
BYOD Implementation Criteria
1. Trust model
“Ownership” is a key success factor for BYOD.As a result, personal
and corporate devices will each have different sets of policies for
security, privacy, and app distribution.
2. Sustainability
BYOD will be new to our organization. Hence, best practices for
implementation will evolve as we take the next steps.
3. Device Choice
4. 4
A BYOD program that doesn’t support current and intended
purchases will have limited appeal. Hence is it important to analyze
employee preference and understanding which devices they have
already bought.
4. Liability
Defining the elements of baseline protection for enterprise data
on BYOD devices
Assessing liability for personal web and app usage
Assessing liability for usage onsite vs. offsite, and inside work
hours vs. outside
Evaluating whether the nature of BYOD reimbursement affects
liability (partial stipend vs. full payment of service costs)
Assessing the risk and resulting liability of accessing and damaging
personal data
5. User Experience and Privacy
The core tenet of successful BYOD deployments is preservation of
user experience. A social contract must be established between the
company and the employee.
6. Economics
The ROI of BYOD programs is a combination of the above variables
weighed against the value of employee satisfaction and productivity.
The hidden economics of BYOD centre on increasing productivity,
5. 5
managing the cost of complexity, and realizing the value of more
responsible employee usage.
7. Internal Marketing
BYOD puts the burden on IT to provide a positive end-to-end
experience to users, who need to easily understand the program,
choose and provision the device, troubleshoot problems, and
potentially migrate to new devices each year. The reality of the BYOD
program needs to match its marketing.
Challenges
It is important to ensure that no matter who owns the device;
employees must abide by corporate information security protocols if
they are using the device for business. A BYOD policy should cover the
basics like requiring an auto-locking capability and a personal
identification number (PIN) as well as support encryption and remote
wipe in case of theft. The policy should also cover what types of data can
and can't be stored on the device, what to do if it's stolen, and
acceptable and unacceptable backup processes. Most importantly,
having a written user agreement policy and communicating regularly the
importance of following security procedures when using their devices is
critical.
Conclusion
There are tangible gains by utilizing the BYOD approach. BYOD provides
theflexibility that employees seek to respond instantly to work requests
6. 6
outside ofwork hours, thus reducing process times and improving
operational efficiency.In addition, employees report higher satisfaction
levels with such flexible workarrangements and the freedom to use their
devices of choice.Many new entrants openly seek environmentsthat
allow them the freedom to use tools and technologies native to
theirupbringing and customized to their work and life preferences. This
can help us attract, retain and support new talent in our organization.
We should take a measured approach to transitionto BYOD and chart a
middle path to reap its benefits to avoid falling behindproactive
competitors.The BYOD movement is an exciting opportunity that will
strikethe right balance between employee freedom and corporate
control overtechnology.
References
http://www.2x.com/what-is-byod/
http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_
own_device_.html
https://www.capgemini-consulting.com/resource-file-
access/resource/pdf/bringyourowndevice_29_1.pdf
http://www.arubanetworks.com/pdf/technology/whitepapers/WP_BYOD.pdf
http://searchsecurity.techtarget.com/feature/Developing-a-BYOD-Strategy-
Weigh-the-Risks-Challenges-and-Benefits