As an employer the concept of BYOD, “Bring Your Own Device” may seem like an automatic plus. Your team can accomplish work away from your desk and have everything you need on the same mobile device they use at home. BYOD is becoming increasingly popular because employers do not have to purchase hardware and employees have a strong allegiance to devices that they are already comfortable with.
But what can you as a business owner do to please your employees, lower costs, and also protect your business? First you need to consider a comprehensive BYOB policy for your company. Yes, it may be significantly cheaper to have your employees using their own devices, but that also means you will spend time developing appropriate security measures. Business owners should carefully weigh the lowered expense of having employees use their own phones versus the time necessary for new security guidelines. Since the rise of BYOB policies is relatively new establishing a policy will take the expertise of an IT specialist who understands not only which bases need to covered, but how you can efficiently cover them. Capitol Technology Solutions can assist with the development of certain components that should be in place before your company adopts a BYOB policy. It might seem easier to develop these new policies internally, but effective implementation will require an in depth understanding of your company’s technology infrastructure.
You may also want to set up devices so that they can be remotely wiped quickly. If an employee leaves their tablet on the Metro chances are you will not be able to relocate that device and you will want it to be stripped of all company data. However wiping a phone clean can come with particular legal concerns. Mobile phones are company property and can be subjected to things such as subpoenas and other legal measures. An additional question to consider is what applications and software will you allow on phones for employees. Perhaps you do not believe Netflix is a suitable/necessary application for a company phone and want users to be blocked from downloading Netflix, and a slew of other applications. CTS can create a process where there are particular apps or software that require an administrative password or are simply unavailable through a company sanctioned device. Another important aspect to consider is what, if any devices will you consider authorized devices. Jail broken iPhones should not be on your list of authorized devices. All of these factors listed above should be carefully parsed out if your company is thinking of implementing a BYOD policy. Once you figure out your process an IT company can put the finishing touches on it by updating employee mobile phones to reflect your new policy.