SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
1
BYOD–A Productivity Catalyst?
Bring Your Own Device (BYOD) is a consumer-led movement that is
transforming enterprise workspaces by extending the notion that 21st
century employees need to work from anywhere, at anytime and on
their devices of choice, both within and outside of the traditional
corporate structure.
Current Trends
The days of a static, one-size-fits-all policy applied to company-owned
assets are nearing its end. Today, IT departments are expected to
comprehend what devices are trying to connect to their networks, so
they can provide convenient, secure access to those that are authorized,
including personal iPads and smartphones. This approach is bound to
improve network security andmanageability, save IT staff time, enhance
employee productivity and gain strategic business advantage.
With the proliferation of mobile devices and the consumerization of IT,
corporate networks are becoming more demanding to manage and
control risks every day. Traditional network control methods are not
likely to succeed in the long run. This may endanger security and also
risk putting organizationsat a strategic disadvantage.BYOD is not only
2
disrupting the traditional way technology is provisioned, paid for and
used. It also promises the dual benefits of simultaneously driving down
IT costs while improving employee productivity and
satisfaction.ThoughtWorks and Cisco are some of the established
organizations that have reaped the benefits of BYOD.
Business Case
I have the following reasons to consider BYOD in our organization
IS Strategy
Cloud services can help bridge the gap by providing the needed level of
visibility, compliance and even security. Employees generally want to do
the right thing, and it is just a matter of providing them with the
appropriate tools and training. Cloud services offer an automated
system that enables employees to properly perform tasks, ensuring
accuracy and reducing the potential for fraud, unintentional or not.
Policies and workflow reside in the cloud, which enforces the same rules
and security protections for all access points whether they are
computers or mobile devices.Despite problems, BYOD and the cloud can
co-exist. As HTML5 support matures; it's likely the feature overlap
among various mobile browsers will increase, solving one of the major
problems with BYOD in the workplace. By developing effective processes
in the present and planning for the future, a company can build a cloud
strategy that supports BYOD.
3
Flexibility at Work
We have a majority of our workforce between the 25 to 35 years. There
are many interns and young candidates who will join us in the coming
years.As a forward thinking organization we can use BYOD as a way of
attracting andretaining talent. Students leaving school and university
where they have been able toplug in their own devices – smartphone,
tablet, laptop etc.; are not going to besatisfied when told by us that they
have to use equipmentprovided by the employer and are not allowed to
connect their own devices. This willbe seen as archaic, restrictive and
unsatisfactory. The likelihood is that the equipmentbeing provided by
the employer is inferior to the leading edge technology owned bythe
employee.
BYOD Implementation Criteria
1. Trust model
“Ownership” is a key success factor for BYOD.As a result, personal
and corporate devices will each have different sets of policies for
security, privacy, and app distribution.
2. Sustainability
BYOD will be new to our organization. Hence, best practices for
implementation will evolve as we take the next steps.
3. Device Choice
4
A BYOD program that doesn’t support current and intended
purchases will have limited appeal. Hence is it important to analyze
employee preference and understanding which devices they have
already bought.
4. Liability
 Defining the elements of baseline protection for enterprise data
on BYOD devices
 Assessing liability for personal web and app usage
 Assessing liability for usage onsite vs. offsite, and inside work
hours vs. outside
 Evaluating whether the nature of BYOD reimbursement affects
liability (partial stipend vs. full payment of service costs)
 Assessing the risk and resulting liability of accessing and damaging
personal data
5. User Experience and Privacy
The core tenet of successful BYOD deployments is preservation of
user experience. A social contract must be established between the
company and the employee.
6. Economics
The ROI of BYOD programs is a combination of the above variables
weighed against the value of employee satisfaction and productivity.
The hidden economics of BYOD centre on increasing productivity,
5
managing the cost of complexity, and realizing the value of more
responsible employee usage.
7. Internal Marketing
BYOD puts the burden on IT to provide a positive end-to-end
experience to users, who need to easily understand the program,
choose and provision the device, troubleshoot problems, and
potentially migrate to new devices each year. The reality of the BYOD
program needs to match its marketing.
Challenges
It is important to ensure that no matter who owns the device;
employees must abide by corporate information security protocols if
they are using the device for business. A BYOD policy should cover the
basics like requiring an auto-locking capability and a personal
identification number (PIN) as well as support encryption and remote
wipe in case of theft. The policy should also cover what types of data can
and can't be stored on the device, what to do if it's stolen, and
acceptable and unacceptable backup processes. Most importantly,
having a written user agreement policy and communicating regularly the
importance of following security procedures when using their devices is
critical.
Conclusion
There are tangible gains by utilizing the BYOD approach. BYOD provides
theflexibility that employees seek to respond instantly to work requests
6
outside ofwork hours, thus reducing process times and improving
operational efficiency.In addition, employees report higher satisfaction
levels with such flexible workarrangements and the freedom to use their
devices of choice.Many new entrants openly seek environmentsthat
allow them the freedom to use tools and technologies native to
theirupbringing and customized to their work and life preferences. This
can help us attract, retain and support new talent in our organization.
We should take a measured approach to transitionto BYOD and chart a
middle path to reap its benefits to avoid falling behindproactive
competitors.The BYOD movement is an exciting opportunity that will
strikethe right balance between employee freedom and corporate
control overtechnology.
References
 http://www.2x.com/what-is-byod/
 http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_
own_device_.html
 https://www.capgemini-consulting.com/resource-file-
access/resource/pdf/bringyourowndevice_29_1.pdf
 http://www.arubanetworks.com/pdf/technology/whitepapers/WP_BYOD.pdf
 http://searchsecurity.techtarget.com/feature/Developing-a-BYOD-Strategy-
Weigh-the-Risks-Challenges-and-Benefits

Weitere ähnliche Inhalte

Was ist angesagt?

ManageEngine Desktop management - Strathallan school case study
ManageEngine Desktop management - Strathallan school   case studyManageEngine Desktop management - Strathallan school   case study
ManageEngine Desktop management - Strathallan school case study
ManageEngine
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
BlackBerry
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
Sno Jutt
 

Was ist angesagt? (19)

Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
ManageEngine Desktop management - Strathallan school case study
ManageEngine Desktop management - Strathallan school   case studyManageEngine Desktop management - Strathallan school   case study
ManageEngine Desktop management - Strathallan school case study
 
Role of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationRole of Mobility in Workplace Transformation
Role of Mobility in Workplace Transformation
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
Capgemini Super Techies Show Season 2: The LinkedIn Challenge Presentation
Capgemini Super Techies Show Season 2: The LinkedIn Challenge PresentationCapgemini Super Techies Show Season 2: The LinkedIn Challenge Presentation
Capgemini Super Techies Show Season 2: The LinkedIn Challenge Presentation
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profile
 
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
 
Social Media - Transforming B2B Organizations: Contemporary Concerns Study
Social Media - Transforming B2B Organizations: Contemporary Concerns StudySocial Media - Transforming B2B Organizations: Contemporary Concerns Study
Social Media - Transforming B2B Organizations: Contemporary Concerns Study
 
Govt & amp
Govt & ampGovt & amp
Govt & amp
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
 

Andere mochten auch

Role of Internal Communcations(IC)
Role of Internal Communcations(IC)Role of Internal Communcations(IC)
Role of Internal Communcations(IC)
Packet One
 
Chapter 3 Mis Organizational Management And Information Systems
Chapter 3 Mis Organizational Management And Information SystemsChapter 3 Mis Organizational Management And Information Systems
Chapter 3 Mis Organizational Management And Information Systems
management 2
 
Chapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case StudyChapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case Study
management 2
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
management 2
 
Chapter 12 Toshiba Case Study
Chapter 12 Toshiba Case StudyChapter 12 Toshiba Case Study
Chapter 12 Toshiba Case Study
management 2
 
Chapter 4 Mis Case Study Mumbai Dabbawalas
Chapter 4 Mis Case Study Mumbai DabbawalasChapter 4 Mis Case Study Mumbai Dabbawalas
Chapter 4 Mis Case Study Mumbai Dabbawalas
management 2
 
Chapter 6 Mis And Erp
Chapter 6 Mis And ErpChapter 6 Mis And Erp
Chapter 6 Mis And Erp
management 2
 
Chapter 16 Motivating Employees
Chapter 16   Motivating EmployeesChapter 16   Motivating Employees
Chapter 16 Motivating Employees
management 2
 
Chapter 3 Organizational Culture And Environment The Constraints
Chapter 3   Organizational Culture And Environment The ConstraintsChapter 3   Organizational Culture And Environment The Constraints
Chapter 3 Organizational Culture And Environment The Constraints
management 2
 
Logistiques des Achats Internationaux au TERROUBI
Logistiques des Achats Internationaux au TERROUBILogistiques des Achats Internationaux au TERROUBI
Logistiques des Achats Internationaux au TERROUBI
Abdoulaye MBENGUE
 
Audit personnalisé Performance Tourisme
Audit personnalisé Performance TourismeAudit personnalisé Performance Tourisme
Audit personnalisé Performance Tourisme
Performance_Tourisme
 

Andere mochten auch (20)

Presentación centro de decisiones 28042016 v2 2
Presentación centro de decisiones 28042016 v2 2Presentación centro de decisiones 28042016 v2 2
Presentación centro de decisiones 28042016 v2 2
 
Toma de decisión ante variaciones climáticas inciertas
Toma de decisión ante variaciones climáticas inciertasToma de decisión ante variaciones climáticas inciertas
Toma de decisión ante variaciones climáticas inciertas
 
Leninsky raion
Leninsky raionLeninsky raion
Leninsky raion
 
Nay
NayNay
Nay
 
National water planning in mexico v2
National water planning in mexico v2National water planning in mexico v2
National water planning in mexico v2
 
Role of Internal Communcations(IC)
Role of Internal Communcations(IC)Role of Internal Communcations(IC)
Role of Internal Communcations(IC)
 
Chapter 3 Mis Organizational Management And Information Systems
Chapter 3 Mis Organizational Management And Information SystemsChapter 3 Mis Organizational Management And Information Systems
Chapter 3 Mis Organizational Management And Information Systems
 
Chapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case StudyChapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case Study
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
 
Chapter 12 Toshiba Case Study
Chapter 12 Toshiba Case StudyChapter 12 Toshiba Case Study
Chapter 12 Toshiba Case Study
 
Chapter 4 Mis Case Study Mumbai Dabbawalas
Chapter 4 Mis Case Study Mumbai DabbawalasChapter 4 Mis Case Study Mumbai Dabbawalas
Chapter 4 Mis Case Study Mumbai Dabbawalas
 
Chapter 6 Mis And Erp
Chapter 6 Mis And ErpChapter 6 Mis And Erp
Chapter 6 Mis And Erp
 
Ch01
Ch01Ch01
Ch01
 
Chapter 16 Motivating Employees
Chapter 16   Motivating EmployeesChapter 16   Motivating Employees
Chapter 16 Motivating Employees
 
Du cours papier au cours online
Du cours papier au cours onlineDu cours papier au cours online
Du cours papier au cours online
 
Chapter 3 Organizational Culture And Environment The Constraints
Chapter 3   Organizational Culture And Environment The ConstraintsChapter 3   Organizational Culture And Environment The Constraints
Chapter 3 Organizational Culture And Environment The Constraints
 
Logistiques des Achats Internationaux au TERROUBI
Logistiques des Achats Internationaux au TERROUBILogistiques des Achats Internationaux au TERROUBI
Logistiques des Achats Internationaux au TERROUBI
 
L'art d'être parent à l'ère numérique
L'art d'être parent à l'ère numériqueL'art d'être parent à l'ère numérique
L'art d'être parent à l'ère numérique
 
Optimisation SEO
Optimisation SEOOptimisation SEO
Optimisation SEO
 
Audit personnalisé Performance Tourisme
Audit personnalisé Performance TourismeAudit personnalisé Performance Tourisme
Audit personnalisé Performance Tourisme
 

Ähnlich wie BYOD- A Productivity Catalyst

A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
Транслируем.бел
 
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
Lou Milrad
 

Ähnlich wie BYOD- A Productivity Catalyst (20)

Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
BYOD
BYODBYOD
BYOD
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
 
BYOD in an Enterprise
BYOD in an EnterpriseBYOD in an Enterprise
BYOD in an Enterprise
 
Finding the value in byod capgemini consulting - digital transformation
Finding the value in byod   capgemini consulting - digital transformationFinding the value in byod   capgemini consulting - digital transformation
Finding the value in byod capgemini consulting - digital transformation
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Byod
ByodByod
Byod
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
 

Mehr von Packet One (6)

Ten cs for effective communication annual compensation reviews
Ten cs for effective communication annual compensation reviewsTen cs for effective communication annual compensation reviews
Ten cs for effective communication annual compensation reviews
 
Decision making made easy !
Decision making made easy !Decision making made easy !
Decision making made easy !
 
Conflict resolution : A litmus test for your character !
Conflict resolution : A litmus test for your character !Conflict resolution : A litmus test for your character !
Conflict resolution : A litmus test for your character !
 
Performance reviews : A necessary evil ?
Performance reviews : A necessary evil ?Performance reviews : A necessary evil ?
Performance reviews : A necessary evil ?
 
Leadership
LeadershipLeadership
Leadership
 
“Taking ownership for failures rather than success”to Edit
“Taking ownership for failures rather than success”to Edit“Taking ownership for failures rather than success”to Edit
“Taking ownership for failures rather than success”to Edit
 

BYOD- A Productivity Catalyst

  • 1. 1 BYOD–A Productivity Catalyst? Bring Your Own Device (BYOD) is a consumer-led movement that is transforming enterprise workspaces by extending the notion that 21st century employees need to work from anywhere, at anytime and on their devices of choice, both within and outside of the traditional corporate structure. Current Trends The days of a static, one-size-fits-all policy applied to company-owned assets are nearing its end. Today, IT departments are expected to comprehend what devices are trying to connect to their networks, so they can provide convenient, secure access to those that are authorized, including personal iPads and smartphones. This approach is bound to improve network security andmanageability, save IT staff time, enhance employee productivity and gain strategic business advantage. With the proliferation of mobile devices and the consumerization of IT, corporate networks are becoming more demanding to manage and control risks every day. Traditional network control methods are not likely to succeed in the long run. This may endanger security and also risk putting organizationsat a strategic disadvantage.BYOD is not only
  • 2. 2 disrupting the traditional way technology is provisioned, paid for and used. It also promises the dual benefits of simultaneously driving down IT costs while improving employee productivity and satisfaction.ThoughtWorks and Cisco are some of the established organizations that have reaped the benefits of BYOD. Business Case I have the following reasons to consider BYOD in our organization IS Strategy Cloud services can help bridge the gap by providing the needed level of visibility, compliance and even security. Employees generally want to do the right thing, and it is just a matter of providing them with the appropriate tools and training. Cloud services offer an automated system that enables employees to properly perform tasks, ensuring accuracy and reducing the potential for fraud, unintentional or not. Policies and workflow reside in the cloud, which enforces the same rules and security protections for all access points whether they are computers or mobile devices.Despite problems, BYOD and the cloud can co-exist. As HTML5 support matures; it's likely the feature overlap among various mobile browsers will increase, solving one of the major problems with BYOD in the workplace. By developing effective processes in the present and planning for the future, a company can build a cloud strategy that supports BYOD.
  • 3. 3 Flexibility at Work We have a majority of our workforce between the 25 to 35 years. There are many interns and young candidates who will join us in the coming years.As a forward thinking organization we can use BYOD as a way of attracting andretaining talent. Students leaving school and university where they have been able toplug in their own devices – smartphone, tablet, laptop etc.; are not going to besatisfied when told by us that they have to use equipmentprovided by the employer and are not allowed to connect their own devices. This willbe seen as archaic, restrictive and unsatisfactory. The likelihood is that the equipmentbeing provided by the employer is inferior to the leading edge technology owned bythe employee. BYOD Implementation Criteria 1. Trust model “Ownership” is a key success factor for BYOD.As a result, personal and corporate devices will each have different sets of policies for security, privacy, and app distribution. 2. Sustainability BYOD will be new to our organization. Hence, best practices for implementation will evolve as we take the next steps. 3. Device Choice
  • 4. 4 A BYOD program that doesn’t support current and intended purchases will have limited appeal. Hence is it important to analyze employee preference and understanding which devices they have already bought. 4. Liability  Defining the elements of baseline protection for enterprise data on BYOD devices  Assessing liability for personal web and app usage  Assessing liability for usage onsite vs. offsite, and inside work hours vs. outside  Evaluating whether the nature of BYOD reimbursement affects liability (partial stipend vs. full payment of service costs)  Assessing the risk and resulting liability of accessing and damaging personal data 5. User Experience and Privacy The core tenet of successful BYOD deployments is preservation of user experience. A social contract must be established between the company and the employee. 6. Economics The ROI of BYOD programs is a combination of the above variables weighed against the value of employee satisfaction and productivity. The hidden economics of BYOD centre on increasing productivity,
  • 5. 5 managing the cost of complexity, and realizing the value of more responsible employee usage. 7. Internal Marketing BYOD puts the burden on IT to provide a positive end-to-end experience to users, who need to easily understand the program, choose and provision the device, troubleshoot problems, and potentially migrate to new devices each year. The reality of the BYOD program needs to match its marketing. Challenges It is important to ensure that no matter who owns the device; employees must abide by corporate information security protocols if they are using the device for business. A BYOD policy should cover the basics like requiring an auto-locking capability and a personal identification number (PIN) as well as support encryption and remote wipe in case of theft. The policy should also cover what types of data can and can't be stored on the device, what to do if it's stolen, and acceptable and unacceptable backup processes. Most importantly, having a written user agreement policy and communicating regularly the importance of following security procedures when using their devices is critical. Conclusion There are tangible gains by utilizing the BYOD approach. BYOD provides theflexibility that employees seek to respond instantly to work requests
  • 6. 6 outside ofwork hours, thus reducing process times and improving operational efficiency.In addition, employees report higher satisfaction levels with such flexible workarrangements and the freedom to use their devices of choice.Many new entrants openly seek environmentsthat allow them the freedom to use tools and technologies native to theirupbringing and customized to their work and life preferences. This can help us attract, retain and support new talent in our organization. We should take a measured approach to transitionto BYOD and chart a middle path to reap its benefits to avoid falling behindproactive competitors.The BYOD movement is an exciting opportunity that will strikethe right balance between employee freedom and corporate control overtechnology. References  http://www.2x.com/what-is-byod/  http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_ own_device_.html  https://www.capgemini-consulting.com/resource-file- access/resource/pdf/bringyourowndevice_29_1.pdf  http://www.arubanetworks.com/pdf/technology/whitepapers/WP_BYOD.pdf  http://searchsecurity.techtarget.com/feature/Developing-a-BYOD-Strategy- Weigh-the-Risks-Challenges-and-Benefits