facebook linkedin twitter

Computerware Blog

Trust is Key to BYOD Success

b2ap3_thumbnail_byodchik400.jpgOne of the hottest trends in business technology is having employees bring in their personal devices to the office for work purposes. This trend is commonly referred to as BYOD (Bring Your Own Device), and before you blindly follow the trend and allow BYOD for your business, you should first weigh the benefits against the risks.

There are several benefits to BYOD. Employees get to use personal devices that they're attached to, which increases satisfaction while theoretically improving productivity. Additionally, your staff will gain mobile capabilities by being able to use their personal devices to work from anywhere. All of these benefits sound great, but many businesses are learning that, in light of BYOD privacy issues, the benefits of BYOD may not be enough to offset the liability attached with privacy concerns.

BYOD Blurs the Lines of Privacy
The YO in BYOD can be a little misleading, because as soon as an employee connects their personal device to the corporate network and downloads company applications, their device is subject to the same controls that an employer has over any company-owned equipment like workstations. These corporate controls have the potential to be more involved than just blocking dangerous websites. Thanks to mobile device management software, employers can keep a very close eye on their workers through their own devices.

How close of an eye can an employer keep on their workers with BYOD? In extreme cases, an employer can watch their employee's every move through the device's camera. Other less-extreme-yet-still-intrusive privacy concerns include the ability for an employer to know an employee's location using GPS and triangulation, monitor device usage (including browsing habits), collect personally identifiable information, and even wipe personal data like files, pictures, and music.

BYOD Privacy Must be Taken Seriously
Not that you would abuse your BYOD power and overstep privacy boundaries, but the fact that you could is enough make your employees and your legal department uncomfortable with BYOD. In light of privacy concerns, the central issue of BYOD boils down to trust, and studies show that employees trust their employers about as far as they can throw them. Don't take this revelation about lack of trust personally, trust is a two-way street. There is a reason why you give employees security codes and have a lock on your office door.

In a recent BYOD survey by Harris, three out of five employee respondents wouldn't let their employer install an app on their smartphone or even allow their employer to view what personal apps are already installed on their device. The same survey shows that 82% of respondents are concerned about employers tracking website browsing on their personal devices, and 86% are concerned about the unauthorized deletion of personal data.

Is BYOD Worth It?
With such a high level of mistrust, an employer allowing a skeptical workforce to use their personal devices in the workplace will be opening their company up to liability and lawsuits if the blurry privacy line is crossed. This includes personal information being accidentally deleted or viewed. The best way to deal with these BYOD risks is to either have an airtight BYOD policy in place that covers your butt and has been given the stamp of approval by an attorney specializing in business technology, or to disallow BYOD altogether.

Ultimately, it's your call to allow BYOD or not. Before you make such an important decision, it's good to consider all of the BYOD risks. Computerware can help you with our IT consulting service. Give us a call at (703) 821-8200 and talk to us about the unique needs of your business so we can find you privacy solutions that allow you to get the most out of BYOD and all of your technology!

Nomophobia: A Horrible Terror
Microsoft Steps Up Their Game with Windows 8.1
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, May 27, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Business Productivity Email Productivity Malware IT Services Saving Money Efficiency Computer Google User Tips Small Business Innovation IT Support Data Backup IT Support Smartphones VoIP Collaboration Quick Tips Mobile Devices Network Business Continuity communications Microsoft Office Gadgets Android Data Recovery Social Media Cybersecurity Upgrade Disaster Recovery Mobile Office Server Communication Smartphone Virtualization Miscellaneous Phishing Mobile Device Management Vendor Management Holiday Ransomware Outsourced IT Windows Windows 10 Passwords Operating System Tech Term Internet of Things Remote Monitoring Mobile Device Apps Facebook Managed IT Services Users Unified Threat Management BDR Automation Mobile Computing Analytics Data Management Managed IT services BYOD Remote Computing Apple Windows 10 WiFi The Internet of Things Marketing History Cloud Computing Artificial Intelligence Save Money Training Firewall Browser Big data Help Desk Encryption App Alert IT Consultant Bandwidth Spam Office 365 Two-factor Authentication Business Technology Health Office Information Technology Cybercrime Going Green Managed IT Bring Your Own Device Antivirus Hard Drives Access Control Budget Maintenance Printer Gmail Windows 7 Content Filtering Government Employer-Employee Relationship Retail Managed Service Cost Management Windows 8 Outlook Wireless Technology Hiring/Firing Search Information Tech Support Saving Time Virus Computers VPN Healthcare Recovery Best Practice Lithium-ion Battery Update Phone System IBM Augmented Reality Project Management Hacking Money Document Management Humor Networking Customer Service It Management Travel iPhone Education Blockchain Computing Data Loss Applications Current Events Risk Management Data Breach Law Enforcement Customer Relationship Management Password Conferencing Value Save Time Solid State Drive PowerPoint Compliance Hacker File Sharing Data storage Downtime Flexibility Hard Drive Administration Mobility Proactive IT Computer Repair Running Cable Legal Avoiding Downtime Regulations Data Security Wireless Covid-19 Intranet Twitter Patch Management Storage Website SaaS End of Support Scam Hosted Solution Excel Machine Learning Telephone Systems Word Robot Net Neutrality Securty Cortana Business Intelligence Cooperation Digital Payment Digital Vendor Router Websites Fax Server Black Market Monitoring Cryptocurrency Comparison Tablet Google Maps Software as a Service Laptop Company Culture User Social Engineering Business Growth Management Social Networking Virtual Desktop Social Vulnerabilities Remote Work Meetings Voice over Internet Protocol DDoS Paperless Office Private Cloud Wi-Fi Sports Telephony Disaster Microchip Taxes Redundancy Distributed Denial of Service Distribution Managed Services IT service User Error Employee/Employer Relationship eWaste Co-managed IT Chrome Smart Devices Evernote Managed IT Service Public Cloud Licensing Gaming Console Virtual Assistant Identity Theft Bluetooth Computer Accessories Start Menu Lifestyle Text Messaging Tech Terms Processors Webcam Processor Mobile Technology USB Virtual Reality Presentation Memory Trending Politics Google Docs Multi-factor Authentication Mouse Uninterrupted Power Supply Emails Experience Automobile Monitors Vulnerability Chromebook Professional Services Specifications Safety Cleaning Telephone Bitcoin Computing Infrastructure Hack Statistics Inbound Marketing Office Tips Programming Data Protection Integration Documents Network Congestion How To YouTube Download Entertainment Teamwork Heating/Cooling Pain Points Unified Communications Settings Downloads Streaming Media Managed Services Provider Gamification Remote Workers Recording Optimization Screen Reader Customer Resource management IT Product Reviews Assessment SharePoint Directions Display Worker Best Available Keyboard Virtual Private Network Read Upselling Tip of the week SSID How To Domains Permissions Smart Tech Language Google Calendar Dark Web Reading Free Resource Samsung Piracy Upload Processing G Suite Public Speaking HTML VoIP Video Surveillance Health IT Employer Employee Relationship Fiber-Optic Database Development Touchscreen News Shortcut switches Mobile Security Writing Device Management Knowledge Hacks Logistics Physical Security Virtual Machines Music Telephone System Saving ZTime Consultation Webinar Wasting Time Trends Procurement Content Management Banking Botnet Cyber security Troubleshooting Multi-Factor Security Cost Business Managemenet Technology Tips Bookmark Relocation Tablets Entrepreneur Software License Upgrades Fake News Google Play Sync Telephone Service HIPAA LiFi Devices Debate Audit Employer/Employee Relationships Environment Fraud Tactics Video Conferencing Harddrive Competition UTM Content online Currency GPS Notifications Microsoft 365 CCTV Electronic Payment Communitications Data Warehousing Managing Costs IT Plan Deep Learning Enterprise Resource Planning Supply Chain Management Emergency Hard Drive Disposal Business Metrics Medical IT Computer Malfunction Trend Micro Business Owner Legislation Work/Life Balance Error External Harddrive Access Browsers Reliable Computing Microsoft Excel Security Cameras In Internet of Things Threats IP Address Visible Light Communication Accountants A.I. LinkedIn Best Practives Computer Care User Tip Proactive Maintenance email scam Addiction Internet Service Provider Application IT consulting 3D Ebay Solutions Human Resources IT Assessment Thin CLient Google Drive Windows Server 2008 Navigation Virtual Machine Migration Connected Devices Remote Working Archive Microserver Motion Sickness eCommerce Wireless Headphones Skype Smart Phones Spyware Mobile Payment Data Analysis Scalability Employees GDPR Managing Risk Advertising Equifax Flash Fleet Tracking Electricity Printing Messenger SQL Server Tracking CIO Network Management Digital Signature Windows XP Device security MSP Adminstration Get More Done Pirating Information Rental Service Staffing Google Wallet Electronic Health Records Point of Contact Leadership Tech Hypervisor Desktop Displays Finance Turn Key Web Server Holidays Society Nanotechnology Social Network Memes cache Printer Server Television Fileless Malware Hybrid Cloud Cabling Modem Administrator Strategy Startup Asset Tracking WannaCry Trojan Proxy Server Books Azure Workers Business Cards Micrsooft Service Level Agreement Managing IT Services Username Recycling Corporate Profile Electronic Medical Records Transportation Supercomputer PDF Unified Threat Management Drones Backup and Disaster Recovery Surveillance Analytic Time Management Organize Freedom of Information Term CrashOverride Managing Stress Personal Information Regulation Capital Financial Productuvuty 3D Printing Printers

toner1