BYOD: User Policy Considerations - Slide 7

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next BYOD: User Policy Considerations-7 Next

Questions to Ask

  • What should happen if user violates policy?
  • Should different violations be treated differently (e.g., eligibility vs. security vs. acceptable use)?

Policy Considerations

  • Policy should be clear on consequences of policy violation and any differences from one policy or policy type to the next.

Unauthorized Access or Use of Cellular Telephone Service

On receipt of a monthly bill, enterprise users should immediately check the call detail record section of the bill for any indication of unauthorized calls. Discovery of any such calls should be immediately reported to:

  • The carrier providing the service
  • The security department

As more companies embrace the broad usage of individually-owned mobile devices for access to corporate applications and data, Good Technology is often asked for guidance on the establishment of an associated device usage policy. This slideshow, as outlined by Good Technology, is intended to provide guidance on questions that companies should ask themselves when establishing their own policies and related considerations.

Only your combined information technology (IT), human resource (HR), finance and legal teams — working closely with your executive team and business unit managers — can determine the exact corporate liable and/or individual liable policy that best fits your company, meets its financial goals and objectives, and takes into account security, legal, regulatory, tax or other requirements and considerations that may uniquely apply to your company and its operations.

More Slideshows:

Twelve Virtualization Myths Debunked Global Knowledge takes on some of the most common myths about virtualization.

Ten IT Infrastructure and Security Trends for 2012 Symantec provides 10 predictions for the new year.

Fifteen Hot Android Apps for On-the-Go Business Execs Popular business and productivity apps for busy executives.


Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

More Slideshows

IT_Man89-290x195 9 Tips for Running a 'Tween' Company

Advice and tips for entrepreneurs and companies that are no longer startups but not quite ready for an IPO, also known as "tweens." ...  More >>

IT_Man88-190x128 Top 5 Trends Affecting Women-Owned Micro Businesses

Learn more about the challenges and opportunities presented to women leaders, especially micro-business owners. ...  More >>

Analytics21-190x128 5 Ways to Avoid Becoming 'Digital Prey'

Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.