BYOD: User Policy Considerations - Slide 5

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next BYOD: User Policy Considerations-5 Next

Questions to Ask

  • What is your policy regarding use of device by users other than corporate end-user?
  • Will you provide intranet access to individual-liable users?
  • Will you require individually-liable device users to conform to acceptable use guidelines on all Internet usage, even if not enabled through corporate infrastructure and/or for personal reasons (e.g., as a condition of receiving stipend, reimbursement or access to company apps or data)?

Policy Considerations

  • Policy should be clear on whether device enabled for corporate apps and data access may be used or loaned to other users (e.g., if a Good client has a separate password and the whole device password is not used, it may be acceptable for company end-user to allow someone else to temporarily use the device, as use of device does not require company end-user to first “unlock” the Good for Enterprise client that enables access to corporate data or apps).
  • If you provide intranet access (e.g., through Good Mobile Access or mobile VPN client), policy should be clear that company’s acceptable use guidelines for desktop/laptop browser usage will apply to any usage of intranet and/or Internet access that is enabled through the use of any mobile VPN infrastructure.
  • Most companies will not apply acceptable use policies to usage not enabled through corporate infrastructure — if your company chooses to do so (e.g. as condition of receiving stipend or reimbursement), then policy should be clear on this.

As more companies embrace the broad usage of individually-owned mobile devices for access to corporate applications and data, Good Technology is often asked for guidance on the establishment of an associated device usage policy. This slideshow, as outlined by Good Technology, is intended to provide guidance on questions that companies should ask themselves when establishing their own policies and related considerations.

Only your combined information technology (IT), human resource (HR), finance and legal teams — working closely with your executive team and business unit managers — can determine the exact corporate liable and/or individual liable policy that best fits your company, meets its financial goals and objectives, and takes into account security, legal, regulatory, tax or other requirements and considerations that may uniquely apply to your company and its operations.

More Slideshows:

Twelve Virtualization Myths Debunked Global Knowledge takes on some of the most common myths about virtualization.

Ten IT Infrastructure and Security Trends for 2012 Symantec provides 10 predictions for the new year.

Fifteen Hot Android Apps for On-the-Go Business Execs Popular business and productivity apps for busy executives.


Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

More Slideshows

gig economy How the Gig Economy Is Changing the Tech Industry

The gig economy is clearly disrupting the tech industry, both in positive and negative ways. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.