Considerations and best practices for BYOD

Published on the 11/06/2013 | Written by iStart


While not every organisation has a formal bring-your-own device program, every organisation should develop policies and processes regarding the use of personal devices for work. Citrix offers some best practices to consider when defining and implementing BYOD…

Define your BYOD policy

Define eligibility – Identify who can use personal devices for work and scenarios where it is inappropriate due to data security, worker type or other factors. In enterprises that allow a BYOD device to replace a corporate endpoint, this decision is typically optional for the worker and subject to managerial discretion.

Determine allowed devices – BYOD policies should allow people to use whatever type of device that best meets their needs.

Set service availability – Think about the services and apps you want to make available on BYOD devices and whether they differ by work groups, user types, device types and networks used as you define your policy.

Clarify cost sharing – Some organisations provide a subsidy for BYOD devices and other services, especially in cases where a corporate device is no longer provided. If considering a stipend, tax consequences and potential IT cost savings should be taken into account. Implement BYOD in your organisation

Plan rollout – Provide guidance to help people decide whether to participate, choose the right device and understand the responsibilities that come with bringing their own device, including how data can be accessed, used and stored.

Implement security – Confidential business information should reside on the endpoint only in isolated, encrypted form, and only when absolutely necessary. Multi-layered security should include granular policy-based user authentication with tracking and monitoring for compliance; control over print capabilities and client-side storage; and mandated antivirus/ anti-malware software. IT should consider remote wipe mechanisms if business information is allowed on the device.

Establish support and maintenance levels – Spell out the type of incidents IT will support and the extent of this support. A loaner pool of devices allows uninterrupted productivity during service, especially when a BYOD device is used in place of a corporate device. Consider providing key personnel with additional, concierge-style support.

FURTHER READING

Export success_NZTE_Hayley Horan

RtR Series: Exporting (tech) success

September 9, 2020 | Heather Wright

The digital gauntlet has been thrown down. How should exporters respond?…

Chorus_CIO summit_ Anywhere Workplace_Kurt Rodgers

Home workplace changes scope of office

August 20, 2020 | Heather Wright

Productivity benefits driving new look at what employees need…

Countdown reaps rewards from digital

August 18, 2020 | Heather Wright

Internal capability and agile teamwork pay dividends…

Remote working_Tips for businesses

Floods, fires, pandemics: Remote working hits the limelight

March 5, 2020 | Jonathan Cotton

With large scale havoc impacting business, do you have a contingency plan in place?…

Ardern_ScoMo_e-invoicing_PEPPOL

Readying up for PEPPOL

October 9, 2019 | Donovan Jackson

With government support, new EDI standard promises big rewards…

Post a comment or question...

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

 

Follow iStart to keep up to date with the latest news and views…