BYOD a reality – over 90% support them

BYOD policies are a must

With the advent of Bring-Your-Own-DeviceBYOD and the ever increasing mandated requirements for record retention and security CIOs are challenged to manage in a complex and changing environment.

BYOD Policy94% of companies are planning to allow employees to bring their own mobile devices to work by 2013. By following five best practices – and avoiding five others – companies can significantly reduce their risks and protect their sensitive company information.

Bring Your Own Device Sample

Bring-your-own-device (BYOD) is a phenomenon many companies are wrestling with. It’s easy to see why. By 2015, 70% of the Internet-capable your employees will buy will be made by consumer behemoths such as Apple and Samsung, and not by traditional IT favorites such as RIM, HP, and Microsoft. Meanwhile, many companies have realized that they can save significantly on their telecom expenses if their employees are footing part (or all) of the monthly bill. For a company with 500 employees, that could add up to $300,000 or more annually.

But BYOD isn’t complicated. The trick with managing successful BYOD programs is to set clear ground rules, create sensible security policies, and to devise a strategy for navigating the privacy minefield.

Author: Victor Janulaitis

M. Victor Janulaitis is the CEO of Janco Associates. He has taught at the USC Graduate School of Business, been a guest lecturer at the UCLA's Anderson School of Business, a Graduate School at Harvard University, and several other universities in various programs.