BYOD: User Policy Considerations - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next BYOD: User Policy Considerations-6 Next

Questions to Ask

  • Will you provide any end-user support for individual-liable users?
  • If so, for what applications, services or scenarios (e.g., lost or stolen device)?

Policy Considerations

  • Policy should be clear on what support, if any, will be provided and: (i) explicitly for which applications, services and scenarios; (ii) any “self-service” actions that must first be taken before requesting support; and (iii) process and/or tools for requesting support (e.g., submitting trouble ticket vs. calling).
  • Many companies will opt for individual-liable support policy that is expressly limited to the access client and applications and require that users first attempt to resolve routine issues via “self-service”mechanisms (e.g., always contacting carrier for billing issues, contacting carrier first if not able to connect, resetting own password via self-service portal). 

As more companies embrace the broad usage of individually-owned mobile devices for access to corporate applications and data, Good Technology is often asked for guidance on the establishment of an associated device usage policy. This slideshow, as outlined by Good Technology, is intended to provide guidance on questions that companies should ask themselves when establishing their own policies and related considerations.

Only your combined information technology (IT), human resource (HR), finance and legal teams — working closely with your executive team and business unit managers — can determine the exact corporate liable and/or individual liable policy that best fits your company, meets its financial goals and objectives, and takes into account security, legal, regulatory, tax or other requirements and considerations that may uniquely apply to your company and its operations.

More Slideshows:


Twelve Virtualization Myths Debunked Global Knowledge takes on some of the most common myths about virtualization.

Ten IT Infrastructure and Security Trends for 2012 Symantec provides 10 predictions for the new year.

Fifteen Hot Android Apps for On-the-Go Business Execs Popular business and productivity apps for busy executives.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

Five9RemoteEmployees0x 5 Best Practices to Enable Remote Workers

Recent years have seen a significant increase in the remote workforce as developments in technology have given employees the freedom to work anywhere, anytime. ...  More >>

DataM62-190x128 10 Steps for a Proper Data Governance Plan

Establishing a digital governance plan can be a challenge, but with the right education and tools, the job can be made a lot simpler. ...  More >>

PlexxiITRoles0x IT Roles: The New Faces of Network Infrastructure

The newfound emphasis on tools and service integration is shaping a new crop of industry professionals — the actual faces behind the IT infrastructure. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.