It is well past the time for your IT Organization to either create or participate in the creation of a companywide BYOD policies. Many of the most common issues can be avoided, or at least mitigated, with the implementation of a complete BYOD policy.
If you follow this blog, then you will know that we have posted many BYOD and Consumerization of IT blogs over the past year or so. We are always trying to find ways to help the IT Organization better utilize their processes to benefit the entire enterprise and BYOD policy is a great place for IT to add value.
If you are planning to implement a new BYOD policy, then you should consider integrating the policies into your change and release processes, your Service Desk and of course your CMDB mapping. A great place to start is by checking out the offer below.
In a recent blog post, Top 10 BYOD pitfalls to avoid if you allow personal devices, Lisa Phifer focuses on many of the topics that we have been discussing. Here are 5 key takeaways:
Don't try to ban BYOD. This horse has not only left the barn, but will trample any IT department that intends to stand in its way.
Don't skimp on policy. Surveys repeatedly show that many employers, despite widespread BYOD experimentation, don't have a detailed BYOD policy in place.
Don't treat personal devices like corporate ones. An iPhone procured by IT for business use and an iPhone owned by an employee for mixed personal and business uses are fundamentally different.
Don't become over-focused on devices. While some mobile device management (MDM) is the cornerstone of many successful BYOD initiatives, an employer's goal is not really to manage the devices - rather, it is to enable safe device use.
Don't invade employee privacy. Just because an employee's personal device can be GPS-tracked doesn't mean you should record its location 24/7. Retrieve only the information required to satisfy business needs, document what you intend to access or store in policy...
This is one point that is particularly pertinent considering the current NSA spying controversy, Prism the clandestine national security electronic surveillance program. Following the leak, a survey finds that the majority of the public is OK with this level of privacy intrusion by the government. But you don't want to intrude on your employees' privacy. Even if you have a great policy in place, I suggest that you reevaluate the employee privacy sections.
Flickr Image by Mads Boedker