Telling employees how, when, and where they are permitted to use their own personal devices is a recipe for disaster with bring your own device (BYOD)
For BYOD programs to work for everyone, there needs to be mutual benefit
for both employees and the IT organization. Here are five recommendations for achieving unity between both camps:
- Follow the Golden Rule.
Instead of treating employees like children, IT departments should act toward employees as they would want to be treated if the roles were reversed (yes, the Golden Rule we all learned in elementary school). Do right by employees and more often than not, they’ll do right by IT and follow BYOD policies and procedures.
- Embrace employee choice.
Employees will gravitate to certain enterprise mobile apps and tools that they find are helping them do their jobs more effectively. It’s counterproductive for IT to take a command-and-control approach to app usage -- employees will resist, and the applications IT rolls out will gather dust. Instead, it’s better for IT to promote the availability of different mobile apps and tools, including a description of their intended benefits.
- Provide mobile apps and access that employees need most.
Employees aren't always seated at their desks in front of a stationary computer. They’re often on the go -- whether at a client site, a child’s soccer match, or working in flight on a business trip. Mobile application management (MAM) solutions can provide IT with the security and ability to provide employees with the enterprise apps they need, when they need them.
- Separating employee and workplace data.
When employees bring their personal devices into the workplace, they expect to keep personal information housed in their mobile devices separate from work data and apps. Mobile application management software can help achieve this separation, providing secure support and updates to corporate apps and data while leaving personal data intact.
- A secure approach for all.
As employees use their mobile devices in a variety of public and private settings, the enterprise must ensure that corporate apps and data are kept secure and protected. A security-focused BYOD strategy which incorporates data encryption, application security inspection, and automated security updates, effectively protects the interests of both employees and the enterprise.