1
BYOD–A Productivity Catalyst?
Bring Your Own Device (BYOD) is a consumer-led movement that is
transforming enterprise workspaces by extending the notion that 21st
century employees need to work from anywhere, at anytime and on
their devices of choice, both within and outside of the traditional
corporate structure.
Current Trends
The days of a static, one-size-fits-all policy applied to company-owned
assets are nearing its end. Today, IT departments are expected to
comprehend what devices are trying to connect to their networks, so
they can provide convenient, secure access to those that are authorized,
including personal iPads and smartphones. This approach is bound to
improve network security andmanageability, save IT staff time, enhance
employee productivity and gain strategic business advantage.
With the proliferation of mobile devices and the consumerization of IT,
corporate networks are becoming more demanding to manage and
control risks every day. Traditional network control methods are not
likely to succeed in the long run. This may endanger security and also
risk putting organizationsat a strategic disadvantage.BYOD is not only
2
disrupting the traditional way technology is provisioned, paid for and
used. It also promises the dual benefits of simultaneously driving down
IT costs while improving employee productivity and
satisfaction.ThoughtWorks and Cisco are some of the established
organizations that have reaped the benefits of BYOD.
Business Case
I have the following reasons to consider BYOD in our organization
IS Strategy
Cloud services can help bridge the gap by providing the needed level of
visibility, compliance and even security. Employees generally want to do
the right thing, and it is just a matter of providing them with the
appropriate tools and training. Cloud services offer an automated
system that enables employees to properly perform tasks, ensuring
accuracy and reducing the potential for fraud, unintentional or not.
Policies and workflow reside in the cloud, which enforces the same rules
and security protections for all access points whether they are
computers or mobile devices.Despite problems, BYOD and the cloud can
co-exist. As HTML5 support matures; it's likely the feature overlap
among various mobile browsers will increase, solving one of the major
problems with BYOD in the workplace. By developing effective processes
in the present and planning for the future, a company can build a cloud
strategy that supports BYOD.
3
Flexibility at Work
We have a majority of our workforce between the 25 to 35 years. There
are many interns and young candidates who will join us in the coming
years.As a forward thinking organization we can use BYOD as a way of
attracting andretaining talent. Students leaving school and university
where they have been able toplug in their own devices – smartphone,
tablet, laptop etc.; are not going to besatisfied when told by us that they
have to use equipmentprovided by the employer and are not allowed to
connect their own devices. This willbe seen as archaic, restrictive and
unsatisfactory. The likelihood is that the equipmentbeing provided by
the employer is inferior to the leading edge technology owned bythe
employee.
BYOD Implementation Criteria
1. Trust model
“Ownership” is a key success factor for BYOD.As a result, personal
and corporate devices will each have different sets of policies for
security, privacy, and app distribution.
2. Sustainability
BYOD will be new to our organization. Hence, best practices for
implementation will evolve as we take the next steps.
3. Device Choice
4
A BYOD program that doesn’t support current and intended
purchases will have limited appeal. Hence is it important to analyze
employee preference and understanding which devices they have
already bought.
4. Liability
 Defining the elements of baseline protection for enterprise data
on BYOD devices
 Assessing liability for personal web and app usage
 Assessing liability for usage onsite vs. offsite, and inside work
hours vs. outside
 Evaluating whether the nature of BYOD reimbursement affects
liability (partial stipend vs. full payment of service costs)
 Assessing the risk and resulting liability of accessing and damaging
personal data
5. User Experience and Privacy
The core tenet of successful BYOD deployments is preservation of
user experience. A social contract must be established between the
company and the employee.
6. Economics
The ROI of BYOD programs is a combination of the above variables
weighed against the value of employee satisfaction and productivity.
The hidden economics of BYOD centre on increasing productivity,
5
managing the cost of complexity, and realizing the value of more
responsible employee usage.
7. Internal Marketing
BYOD puts the burden on IT to provide a positive end-to-end
experience to users, who need to easily understand the program,
choose and provision the device, troubleshoot problems, and
potentially migrate to new devices each year. The reality of the BYOD
program needs to match its marketing.
Challenges
It is important to ensure that no matter who owns the device;
employees must abide by corporate information security protocols if
they are using the device for business. A BYOD policy should cover the
basics like requiring an auto-locking capability and a personal
identification number (PIN) as well as support encryption and remote
wipe in case of theft. The policy should also cover what types of data can
and can't be stored on the device, what to do if it's stolen, and
acceptable and unacceptable backup processes. Most importantly,
having a written user agreement policy and communicating regularly the
importance of following security procedures when using their devices is
critical.
Conclusion
There are tangible gains by utilizing the BYOD approach. BYOD provides
theflexibility that employees seek to respond instantly to work requests
6
outside ofwork hours, thus reducing process times and improving
operational efficiency.In addition, employees report higher satisfaction
levels with such flexible workarrangements and the freedom to use their
devices of choice.Many new entrants openly seek environmentsthat
allow them the freedom to use tools and technologies native to
theirupbringing and customized to their work and life preferences. This
can help us attract, retain and support new talent in our organization.
We should take a measured approach to transitionto BYOD and chart a
middle path to reap its benefits to avoid falling behindproactive
competitors.The BYOD movement is an exciting opportunity that will
strikethe right balance between employee freedom and corporate
control overtechnology.
References
 http://www.2x.com/what-is-byod/
 http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_
own_device_.html
 https://www.capgemini-consulting.com/resource-file-
access/resource/pdf/bringyourowndevice_29_1.pdf
 http://www.arubanetworks.com/pdf/technology/whitepapers/WP_BYOD.pdf
 http://searchsecurity.techtarget.com/feature/Developing-a-BYOD-Strategy-
Weigh-the-Risks-Challenges-and-Benefits

BYOD- A Productivity Catalyst

  • 1.
    1 BYOD–A Productivity Catalyst? BringYour Own Device (BYOD) is a consumer-led movement that is transforming enterprise workspaces by extending the notion that 21st century employees need to work from anywhere, at anytime and on their devices of choice, both within and outside of the traditional corporate structure. Current Trends The days of a static, one-size-fits-all policy applied to company-owned assets are nearing its end. Today, IT departments are expected to comprehend what devices are trying to connect to their networks, so they can provide convenient, secure access to those that are authorized, including personal iPads and smartphones. This approach is bound to improve network security andmanageability, save IT staff time, enhance employee productivity and gain strategic business advantage. With the proliferation of mobile devices and the consumerization of IT, corporate networks are becoming more demanding to manage and control risks every day. Traditional network control methods are not likely to succeed in the long run. This may endanger security and also risk putting organizationsat a strategic disadvantage.BYOD is not only
  • 2.
    2 disrupting the traditionalway technology is provisioned, paid for and used. It also promises the dual benefits of simultaneously driving down IT costs while improving employee productivity and satisfaction.ThoughtWorks and Cisco are some of the established organizations that have reaped the benefits of BYOD. Business Case I have the following reasons to consider BYOD in our organization IS Strategy Cloud services can help bridge the gap by providing the needed level of visibility, compliance and even security. Employees generally want to do the right thing, and it is just a matter of providing them with the appropriate tools and training. Cloud services offer an automated system that enables employees to properly perform tasks, ensuring accuracy and reducing the potential for fraud, unintentional or not. Policies and workflow reside in the cloud, which enforces the same rules and security protections for all access points whether they are computers or mobile devices.Despite problems, BYOD and the cloud can co-exist. As HTML5 support matures; it's likely the feature overlap among various mobile browsers will increase, solving one of the major problems with BYOD in the workplace. By developing effective processes in the present and planning for the future, a company can build a cloud strategy that supports BYOD.
  • 3.
    3 Flexibility at Work Wehave a majority of our workforce between the 25 to 35 years. There are many interns and young candidates who will join us in the coming years.As a forward thinking organization we can use BYOD as a way of attracting andretaining talent. Students leaving school and university where they have been able toplug in their own devices – smartphone, tablet, laptop etc.; are not going to besatisfied when told by us that they have to use equipmentprovided by the employer and are not allowed to connect their own devices. This willbe seen as archaic, restrictive and unsatisfactory. The likelihood is that the equipmentbeing provided by the employer is inferior to the leading edge technology owned bythe employee. BYOD Implementation Criteria 1. Trust model “Ownership” is a key success factor for BYOD.As a result, personal and corporate devices will each have different sets of policies for security, privacy, and app distribution. 2. Sustainability BYOD will be new to our organization. Hence, best practices for implementation will evolve as we take the next steps. 3. Device Choice
  • 4.
    4 A BYOD programthat doesn’t support current and intended purchases will have limited appeal. Hence is it important to analyze employee preference and understanding which devices they have already bought. 4. Liability  Defining the elements of baseline protection for enterprise data on BYOD devices  Assessing liability for personal web and app usage  Assessing liability for usage onsite vs. offsite, and inside work hours vs. outside  Evaluating whether the nature of BYOD reimbursement affects liability (partial stipend vs. full payment of service costs)  Assessing the risk and resulting liability of accessing and damaging personal data 5. User Experience and Privacy The core tenet of successful BYOD deployments is preservation of user experience. A social contract must be established between the company and the employee. 6. Economics The ROI of BYOD programs is a combination of the above variables weighed against the value of employee satisfaction and productivity. The hidden economics of BYOD centre on increasing productivity,
  • 5.
    5 managing the costof complexity, and realizing the value of more responsible employee usage. 7. Internal Marketing BYOD puts the burden on IT to provide a positive end-to-end experience to users, who need to easily understand the program, choose and provision the device, troubleshoot problems, and potentially migrate to new devices each year. The reality of the BYOD program needs to match its marketing. Challenges It is important to ensure that no matter who owns the device; employees must abide by corporate information security protocols if they are using the device for business. A BYOD policy should cover the basics like requiring an auto-locking capability and a personal identification number (PIN) as well as support encryption and remote wipe in case of theft. The policy should also cover what types of data can and can't be stored on the device, what to do if it's stolen, and acceptable and unacceptable backup processes. Most importantly, having a written user agreement policy and communicating regularly the importance of following security procedures when using their devices is critical. Conclusion There are tangible gains by utilizing the BYOD approach. BYOD provides theflexibility that employees seek to respond instantly to work requests
  • 6.
    6 outside ofwork hours,thus reducing process times and improving operational efficiency.In addition, employees report higher satisfaction levels with such flexible workarrangements and the freedom to use their devices of choice.Many new entrants openly seek environmentsthat allow them the freedom to use tools and technologies native to theirupbringing and customized to their work and life preferences. This can help us attract, retain and support new talent in our organization. We should take a measured approach to transitionto BYOD and chart a middle path to reap its benefits to avoid falling behindproactive competitors.The BYOD movement is an exciting opportunity that will strikethe right balance between employee freedom and corporate control overtechnology. References  http://www.2x.com/what-is-byod/  http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_ own_device_.html  https://www.capgemini-consulting.com/resource-file- access/resource/pdf/bringyourowndevice_29_1.pdf  http://www.arubanetworks.com/pdf/technology/whitepapers/WP_BYOD.pdf  http://searchsecurity.techtarget.com/feature/Developing-a-BYOD-Strategy- Weigh-the-Risks-Challenges-and-Benefits