Just as it is important for IT to know how and where users are taking corporate data, it is equally important for users to know how IT is accessing their devices. Having been on both sides of the equation, Adam Ely, co-founder and COO of Bluebox, recommends users ask six questions of IT before enrolling in a BYOD program.
Click through for six questions users should ask IT before signing up for a work-related BYOD program, as identified by Adam Ely, co-founder and COO of Bluebox.
What permissions am I giving you when I use my device at work? Am I giving up my privacy?
In many cases, employers are overreaching by requiring employees to give permission for IT to reconfigure their device, or remote wipe the device – including personal data – and not providing any guarantee of privacy.
Can you access/see my personal data, apps and actions?
Personal emails, apps installed and websites visited could all be monitored by employers, in many cases due to the legacy approach of locking down the entire device and ignoring the user’s needs and rights.
Is my personal data safe from accidental delete or wipe when I leave the company?
Many companies require users to agree to allow the company to wipe devices when they leave the company, thus allowing them to wipe personal data and photos. Backing up all personal data regularly is key to protecting yourself.
Why can’t I use X app or X device?
Companies are afraid of the potential risks and often don’t have solutions allowing them to protect the enterprise apps and data, so they take overreaching measures and ban apps, devices, OS versions and jailbreaking.
Why do you need to manage my entire device? Why can’t you just manage the corporate-related apps and data?
Companies should focus on the apps and data that are important to them. Managing the device infringes on the employee’s privacy, personal preferences and settings, and doesn’t necessarily protect the corporate data. Ask your IT administrator to focus on corporate application and data controls.
Can you see my photos in SnapChat?
First, no one should trust that photos sent or received can’t be retrieved. Second, when a device is being managed, or a specific app is being managed, the company has the ability to see applications used and in some cases the data in those applications through network (Web) inspection, backups or application controls. Ensure personal apps are not managed by IT.
The last question is for the user to ask him or herself:
Will these IT policies limit my productivity?
At the end of the day, mobile devices make us productive. If getting more access results in less productivity, you may want to tell IT no thanks.