Skip to main content
Apr 17, 2013

Five BYOD Policies to Help Keep Employees and IT Happy

Telling employees how, when, and where they are permitted to use their own personal devices is a recipe for disaster with bring your own device (BYOD) programs. For BYOD programs to work for everyone, there needs to be mutual benefit for both employees and the IT organization. Here are five recommendations for achieving unity between both camps:
  1. Follow the Golden Rule. Instead of treating employees like children, IT departments should act toward employees as they would want to be treated if the roles were reversed (yes, the Golden Rule we all learned in elementary school). Do right by employees and more often than not, they’ll do right by IT and follow BYOD policies and procedures.
  2. Embrace employee choice. Employees will gravitate to certain enterprise mobile apps and tools that they find are helping them do their jobs more effectively. It’s counterproductive for IT to take a command-and-control approach to app usage -- employees will resist, and the applications IT rolls out will gather dust. Instead, it’s better for IT to promote the availability of different mobile apps and tools, including a description of their intended benefits.
  3. Provide mobile apps and access that employees need most. Employees aren't always seated at their desks in front of a stationary computer. They’re often on the go -- whether at a client site, a child’s soccer match, or working in flight on a business trip. Mobile application management (MAM) solutions can provide IT with the security and ability to provide employees with the enterprise apps they need, when they need them.
  4. Separating employee and workplace data. When employees bring their personal devices into the workplace, they expect to keep personal information housed in their mobile devices separate from work data and apps. Mobile application management software can help achieve this separation, providing secure support and updates to corporate apps and data while leaving personal data intact.
  5. A secure approach for all. As employees use their mobile devices in a variety of public and private settings, the enterprise must ensure that corporate apps and data are kept secure and protected. A security-focused BYOD strategy which incorporates data encryption, application security inspection, and automated security updates, effectively protects the interests of both employees and the enterprise.


More from the Blog
Feb 24, 2020

Android Cracks and App Hacks – What Is StrandHogg?

StrandHogg is a critical v
Read more
Feb 19, 2020

Four application security themes for 2020

The United States was astonished recently when the Iowa Democratic caucuses vote count failed due to a bad app.
Read more
Feb 05, 2020

Financial Mobile App Vulnerability FAQs

Last year research by Aite Group examined mobile application security vulnerabilities across eight financial services sectors ...
Read more