Skip to main content
Apr 17, 2013

Five BYOD Policies to Help Keep Employees and IT Happy

Telling employees how, when, and where they are permitted to use their own personal devices is a recipe for disaster with bring your own device (BYOD) programs. For BYOD programs to work for everyone, there needs to be mutual benefit for both employees and the IT organization. Here are five recommendations for achieving unity between both camps:
  1. Follow the Golden Rule. Instead of treating employees like children, IT departments should act toward employees as they would want to be treated if the roles were reversed (yes, the Golden Rule we all learned in elementary school). Do right by employees and more often than not, they’ll do right by IT and follow BYOD policies and procedures.
  2. Embrace employee choice. Employees will gravitate to certain enterprise mobile apps and tools that they find are helping them do their jobs more effectively. It’s counterproductive for IT to take a command-and-control approach to app usage -- employees will resist, and the applications IT rolls out will gather dust. Instead, it’s better for IT to promote the availability of different mobile apps and tools, including a description of their intended benefits.
  3. Provide mobile apps and access that employees need most. Employees aren't always seated at their desks in front of a stationary computer. They’re often on the go -- whether at a client site, a child’s soccer match, or working in flight on a business trip. Mobile application management (MAM) solutions can provide IT with the security and ability to provide employees with the enterprise apps they need, when they need them.
  4. Separating employee and workplace data. When employees bring their personal devices into the workplace, they expect to keep personal information housed in their mobile devices separate from work data and apps. Mobile application management software can help achieve this separation, providing secure support and updates to corporate apps and data while leaving personal data intact.
  5. A secure approach for all. As employees use their mobile devices in a variety of public and private settings, the enterprise must ensure that corporate apps and data are kept secure and protected. A security-focused BYOD strategy which incorporates data encryption, application security inspection, and automated security updates, effectively protects the interests of both employees and the enterprise.
 

Apperian

More from the Blog
Feb 20, 2019

Part 4: App Security Should Be An Integral Part Of Your DevSecOps Process — Not An Afterthought

How Arxan can help streamline and optimize your DevSecOps process One of the most important factors to keep in mind when dep ...
Read more
Feb 13, 2019

Part 3: App Security Should Be An Integral Part Of Your DevSecOps Process — Not An Afterthought

Situations When DevSecOps Won’t Work Though DevSecOps is getting more popular by the day, and has many benefits to an organi ...
Read more
Feb 06, 2019

Part 2: App Security Should Be An Integral Part Of Your DevSecOps Process — Not an Afterthought

How to start implementing a DevSecOps process As you may have read in our
Read more