In this new age of interconnectivity, mobile devices and their capabilities are becoming increasingly valuable. And their advantages have far surpassed just simple personal use for social media, games and bank applications — it’s in the workplace, too.
In fact, it’s predicted that by the year 2017, 50% of employers will require their staff to bring their own device when they step into their job’s premises. That’s one out of every two employers!
It should not come as a surprise, however. Since the rise of the cell phone and the tablet, there have been multiple applications created to serve work purposes and to simplify the modern workplace.
From building stronger relationships with customers to being able to address problems more promptly to having the ease of a smaller device while on the go, the use of mobile devices has revolutionised the modern workplace — and it’s certainly showing no sign of stopping.
The challenge for employers, however, is that when several devices are brought into one location, this can be a difficult task for their internet server. It can be easily overloaded, but more importantly, the security of the job’s wireless network can be compromised due to a defective device.
It’s for this reason that companies create Bring Your Own Device (BYOD) policies. This procedure is written to protect the company, ensure proper practices are performed using the devices and to mitigate other risks. In this post, we’ll outline the basics of creating your own BYOD policy.
Definition of Business v. Personal
The first thing that should be determined is where the line is drawn between what’s workplace appropriate and what’s for personal use only. While some businesses provide their staff with devices, many others allow their employees to bring their personal devices. While convenient, it’s also challenging to differentiate what’s for business and what’s for personal use when it’s on one single device.
Should a company search from law enforcement or a government agency be necessary, these personal devices are fair game to be taken and analysed.
How You’ll Modify Network Access
Take a look at your current security policies for your web applications. Consult with your IT specialist to make sure these policies are also applied to mobile devices. This would include web monitoring, website access, remote access and more.
Determine Which Apps are Permitted
For the sake of security, make a list of which applications, websites and software that’s not permitted to be accessed. To avoid issues of malware being unknowingly downloaded on your server — or worse — important company/customer data being leaked to the public, it’s crucial to make it known what’s allowed to be accessed.
Establish What You’ll Support
Since you’ll be creating your own policy, it’s entirely up to you as to what you’ll support. This includes particular brands, types of devices and operating systems. When you outline the security measure of your BYOD policy, make sure to write it in common language so your employees can have a full grasp on what’s protected.
Should law enforcement have to get involved in your company and an investigation must happen, yourBYOD policy should outline what’s able to be analysed or confiscated. Data such asGPS locations, stored company information and overtime work performed are possible to be analysed.
How Do I Get Started?
Writing a policy may be a daunting task for any employer, but it doesn’t have to be. Fortunately, you don’t have to write the policy entirely from scratch. There are samples online that can push you in the right direction as far as formatting, language and general ideas that you can implement.