How’s your ‘Bring Your Own Device’ policy?

It is often said that the smartphones most of us carry around in our pockets has more computational power than was available to the Apollo Astronauts during the moon landings. However much truth there may be in that, we are now used to our ‘pocket computers’ dealing with so many different tasks for us that they have become integral to daily working life. One result of this is that ‘Bring Your Own Device’ or BYOD, is something that more business owners are having to take onboard these days. So, what is your business policy on this?

Make things simple

Staff using their own devices to aid them in their work sounds like a bonus for any business. Not only does it offer the chance for a seamless transition in and out of the office, but it could also provide a saving in costs as dedicated ‘work’ phones, laptops, or tablets might not be needed. However, having a well-thought-out bring your own device policy is essential because there also can be downsides to the concept. Done correctly, staff using their own tech will know exactly where they stand in terms of what they can use, what they can access and what level of support they have should they encounter problems while also keeping their devices tightly secure for the sake of the business.

Data storage

If more employees bring their own devices to work, it stands to reason that more data will be shared on devices that are not necessarily secured to the levels you might want them to be. This can be a concern when it comes to the issue of where information is stored, especially as directives such as GDPR can levy heavy fines on companies that breach the rules.

If a device is not under centralised control in your business, such as being looked after by systems administration staff or IT professionals, it can be difficult to keep tabs on the ways in which information is accessed, and by whom.

BYOD policy

A BYOD business policy need not be too prohibitive or mean that your staff are reluctant to use their own devices. By ensuring encryption processes are in place, multi-level authentication is being used, and backups are being made, could be all that is needed. By using remote off-site cloud storage, access can be controlled and data management can be subjected to rigorous administration.

Of course, there is more to it than that. If personal devices are being used, they can easily be lost or stolen, so procedures need to be in place to deal with these circumstances quickly and easily.

Pros and cons

As the familiarity of someone using their own device could increase productivity, training costs can be reduced and, of course, the capital expense of providing company-owned tech can be avoided. While the downsides are easy to see, they are also simple to prepare for and reduce with foresight and planning. If you would like more information on how to produce and manage your own BYOD policy, we can help. Get in touch today to find out how.

Asset Registration

Please register to access assets on How’s your ‘Bring Your Own Device’ policy?