The Ten Commandments of BYOD

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next The Ten Commandments of BYOD-7 Next

Of course, BYOD policy isn’t just about protecting corporate data; a well-crafted BYOD program holds employee data sacred and secure. Personally Identifiable Information (PII) can be used to identify, contact, or locate a person. Some privacy laws prevent corporations from even viewing this data. Communicate the privacy policy to employees and make it clear what data you cannot collect from their mobile devices. For instance, an MDM solution should be able to parse what information it can access and what it cannot, such as:

  • Personal emails, contacts, and calendars
  • Application data and text messages
  • Call history and voicemails

On the other hand, let users know what you collect, how it will be used, and why it benefits them.

An advanced MDM solution can turn privacy policy into a privacy setting to hide the location and software information on a device. This helps companies meet PII regulations and provides added comfort for employees by preventing the viewing of personal information on smartphones and tablets. For example:

  • Disabling app inventory reporting to restrict administrators from seeing personal applications
  • Deactivating location services to prevent access to location indicators such as physical address, geographical coordinates, IP address, and Wi-Fi SSID

Transparency and clarity are important watchwords. There’s much less resistance to BYOD policies when everyone knows the rules.

The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services en masse. Bring Your Own Device (BYOD) was born and employees followed with fervor.

There’s no sense pretending it isn’t happening or saying, “We don’t let our employees do that.” The truth is, they’re doing it already and will continue to burrow noncompliant devices into your network with or without your permission. Forrester’s study of U.S. information workers revealed that 37 percent are doing something with technology before formal permissions or policies are instituted.  Further, a Gartner CIO survey determined that 80 percent of employees will be eligible to use their own equipment with employee data on board by 2016.

This raises the inevitable question: How will you support work force desire to use personal apps and devices while allowing them to be productive in a secure environment that protects corporate data? The Ten Commandments of BYOD, developed by MaaS360, show you how to create a peaceful, secure and productive mobile environment.

 

Related Topics : HTC, Broadcom, Nortel, Data Loss Prevention, Mobile Search

 
More Slideshows

ClickSoftwareEnterpriseAR0x 5 Ways Pokémon GO Is Driving Augmented Reality in the Enterprise

With the consumerization of AR, it appears the technology is finally within arm's reach for those savvy enterprises willing to reach out and grab it. ...  More >>

AppleiPhone7-290x195 Apple Debuts iPhone 7 and Watch Series 2

Apple has announced the next generation of its popular smart devices, including the iPhone 7, iPhone 7 Plus and Watch Series 2. ...  More >>

mobile91-190x128 5 Best Practices for iOS Enterprise MDM

Adopting MDM best practices can result in less hassle in supporting employees, increased overall productivity and assurance that valuable company assets are secure. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.