Skip to main content
Apr 17, 2013

Five BYOD Policies to Help Keep Employees and IT Happy

Telling employees how, when, and where they are permitted to use their own personal devices is a recipe for disaster with bring your own device (BYOD) programs. For BYOD programs to work for everyone, there needs to be mutual benefit for both employees and the IT organization. Here are five recommendations for achieving unity between both camps:
  1. Follow the Golden Rule. Instead of treating employees like children, IT departments should act toward employees as they would want to be treated if the roles were reversed (yes, the Golden Rule we all learned in elementary school). Do right by employees and more often than not, they’ll do right by IT and follow BYOD policies and procedures.
  2. Embrace employee choice. Employees will gravitate to certain enterprise mobile apps and tools that they find are helping them do their jobs more effectively. It’s counterproductive for IT to take a command-and-control approach to app usage -- employees will resist, and the applications IT rolls out will gather dust. Instead, it’s better for IT to promote the availability of different mobile apps and tools, including a description of their intended benefits.
  3. Provide mobile apps and access that employees need most. Employees aren't always seated at their desks in front of a stationary computer. They’re often on the go -- whether at a client site, a child’s soccer match, or working in flight on a business trip. Mobile application management (MAM) solutions can provide IT with the security and ability to provide employees with the enterprise apps they need, when they need them.
  4. Separating employee and workplace data. When employees bring their personal devices into the workplace, they expect to keep personal information housed in their mobile devices separate from work data and apps. Mobile application management software can help achieve this separation, providing secure support and updates to corporate apps and data while leaving personal data intact.
  5. A secure approach for all. As employees use their mobile devices in a variety of public and private settings, the enterprise must ensure that corporate apps and data are kept secure and protected. A security-focused BYOD strategy which incorporates data encryption, application security inspection, and automated security updates, effectively protects the interests of both employees and the enterprise.


More from the Blog
May 27, 2020

Application Security: Testing is NOT Enough

In the software development world, developers are faced with a breakneck release schedule and tasked to produce applications ...
Read more
Apr 30, 2020

Mobile Application Management: A Forward View

IT Is Adapting in the Midst of the COVID-19 Pandemic The Coronavirus pandemic is a human tragedy, affecting hundreds of thou ...
Read more
Apr 16, 2020

The Next Step in the Arxan Journey

As many of you may have seen, we just announced that w
Read more