BYOD Management

BYOD Management and Ownership Issues

BYOD Management
BYOD Management

The era of the company-owned and company-provisioned mobile device seems to be closed, however, there is still a permissions issue. This issue applies to more than just mobile devices, though it’s a rare company that seems to think them through for employees’ home PCs and other devices. This also extends to the telephone number used on a SmartPhone.Order BYOD PolicyDownload Selected Pages

Organizations in government, health care, and defense especially face the legal question of who actually needs to own the device. Some more conservative organizations often decide they need legal ownership of the device.

There are three different approaches to handling ownership, in order of popularity:

  • Shared management. The organization’s policies boil down to “if you access business resources from a personal device, you give us the right to manage, lock, and even wipe that device, even if you end up losing personal data and apps as a result.
  • Corporate ownership and provisioning. The organization buys and owns the device, even if it allows nonbusiness use on it. Employees who don’t like the phone service on such devices (they may not get free minutes when calling family members and friends) are free to carry a personal device as well that has no corporate access.
  • Legal transfer. The organization buys the device from the user. In some cases, that ownership is permanent. In other cases, the organization buys the device for a token amount (say, a dollar) and gives the user the right to use it for personal purposes, then commits to selling it back for the same price when the employee leaves the organization. That’s more likely to gain user acceptance than a one-way purchase.

The real questions that arise are when an employee leaves either voluntarily or involuntarily.  Janco’s BYOD Policy template addresses this directly

10 step BYOD

10 step BYOD

10 step BYOD10 step BYOD  or how to implement BYOD successfully. We have created a policy that can be used to successfully implement BYOD.  The 10 step BYOD includes the following tasks:

  1. Define Your BYOD Objectives and Get Executive Buy-in
  2. Define Your Mobile App Strategy
  3. Identify a Pilot
  4. Decide Which Devices You Want to Allow
  5. Negotiate Mobile Service Rates With Carriers
  6. Define Your End-user Help Desk Model
  7. Identify Eligible BYOD Users
  8. Implement an Acceptable Use Policy
  9. Distribute and Train Users in Policy
  10. Monitor Program Usage

BYOD Policy Template Includes two (2) electronic forms 1) BYOD Access and Use Agreement and 2) Mobile Device Security and Compliance Checklist

BYOD include consumer SmartPhones and tablets which are making their way into your organization. Going mobile makes employees happier and more productive, but it’s also risky. How can you say ‘yes’ to a BYOD choice and still safeguard your corporate data, shield your network from mobile threats, and maintain policy compliance?

With the advent of Bring-Your-Own-Device – BYOD and the ever increasing mandated requirements for record retention and security, CIOs are challenged to manage in a complex and changing environment.

Read on…

Download Selected Pages

Lack of BYOD policy at State Department causes havoc in presidential campaign

Lack of BYOD policy at State Department causes havoc in presidential campaign

Lack of BYOD PolicyLack of BYOD policy and enforcement at the State Department have caused havoc in the presidential campaign. The secretary of state used her own personal Blackberry which was not secure. In addition it is not clear which versions of software were on her device and wither it was backed-up in accordance to mandated federal requirements for sensitive, confidential, and top secret information.

Bring Your Own Device Policy updated to to meet Disaster Recovery, Business Continuity and Corporate Intellectual Property Requirements

Download Selected Pages

With the advent of Bring-Your-Own-Device – BYOD and the ever increasing mandated requirements for record retention and security, CIOs are challenged to manage in a complex and changing environment.

IT Infrastructure Policies and Procedures

One of the best ways to communicate and understand a company and its operating culture is through its policies. Designing and writing policy and communicating it effectively is an essential skill for professionals to have. By having policy carefully developed and communicated, employees will clearly know what the organization expects from them, the degree of control and independence they will have, and what the benefits and consequences are in regard to adhering to policy.

Order Infrastructure PoliciesDownload Selected Pages

60% of all organizations have BYOD policy in place

BYOD Policy – 60% of all organizations have a BYOD policy in place

BYOD PolicyMost organizations are already making the move to BYOD. According to a survey of IT professionals, more than 60 percent of organizations have a BYOD policy in place. Others, however, are still in the phase of implementing their policies.

Bring Your Own Device Sample

For those organizations – and even for those that have embarked whole-heatedly on BYOD – questions remain regarding which mobility management approach they should take: one that addresses device management, one that addresses application management, or one that encompasses both.

IT professionals expect three benefits from a BYOD management solution:

  • Enhanced productivity
  • Increased flexibility
  • Improved compliance