Considerations and best practices for BYOD

Published on the 11/06/2013 | Written by iStart


How not tot bring your own disaster

While not every organisation has a formal bring-your-own device program, every organisation should develop policies and processes regarding the use of personal devices for work. Citrix offers some best practices to consider when defining and implementing BYOD…

Define your BYOD policy

Define eligibility – Identify who can use personal devices for work and scenarios where it is inappropriate due to data security, worker type or other factors. In enterprises that allow a BYOD device to replace a corporate endpoint, this decision is typically optional for the worker and subject to managerial discretion.

Determine allowed devices – BYOD policies should allow people to use whatever type of device that best meets their needs.

Set service availability – Think about the services and apps you want to make available on BYOD devices and whether they differ by work groups, user types, device types and networks used as you define your policy.

Clarify cost sharing – Some organisations provide a subsidy for BYOD devices and other services, especially in cases where a corporate device is no longer provided. If considering a stipend, tax consequences and potential IT cost savings should be taken into account. Implement BYOD in your organisation

Plan rollout – Provide guidance to help people decide whether to participate, choose the right device and understand the responsibilities that come with bringing their own device, including how data can be accessed, used and stored.

Implement security – Confidential business information should reside on the endpoint only in isolated, encrypted form, and only when absolutely necessary. Multi-layered security should include granular policy-based user authentication with tracking and monitoring for compliance; control over print capabilities and client-side storage; and mandated antivirus/ anti-malware software. IT should consider remote wipe mechanisms if business information is allowed on the device.

Establish support and maintenance levels – Spell out the type of incidents IT will support and the extent of this support. A loaner pool of devices allows uninterrupted productivity during service, especially when a BYOD device is used in place of a corporate device. Consider providing key personnel with additional, concierge-style support.

FURTHER READING

Stuff taking AI mainstream_Andrew McPherson 2023

Stuff taking AI mainstream

February 27, 2023 | Heather Wright

It’s time for AI to go from low impact to big bang…

Broaden your view to succeed at digital first

February 16, 2023 | Heather Wright

It’s time to think horizontally, says Mitchell Pham..

Cybersecurity_H&S_Tangiora_Tainui

Cybersecurity needs health and safety mindset

December 10, 2021 | Heather Wright

It’s all about leadership…

REINZ transformation_Kirti Desai

REINZ’s journey to tech transformation

August 5, 2021 | Heather Wright

Leading genuine technology transformation…

Belinda Dimovski_Australian Red Cross

Cincom presents: Belinda Dimovski, Red Cross

July 14, 2021 | Cincom partners

Leadership in 2021 at Australian Red Cross…

Post a comment or question...

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Processing...
Thank you! Your subscription has been confirmed. You'll hear from us soon.
Follow iStart to keep up to date with the latest news and views...
ErrorHere