(Cons)
Bring Your Own device is a business policy of employees bringing personally owned mobile devices to work and using those devices to access privileged company resources like email, file servers and databases as well as personal applications and data. The types of devices that employees may use are smart cell phones and laptops.
The reality is that there is no simple solution when it comes to regulating BYOD. Every organization is different and there are number of different factors that have to be taken into consideration. First a company will have to decide which employees will be allowed access, as well as the types of devices they are going to support. “Forrester Research reported in July of 2011 that nearly 60 percent of companies allow employees to use personal devices for work. “Bring Your Own Device (BYOD)” policies allow employees maximum choice and flexibility but raise new challenges in maintaining the personal privacy of the user, managing and securing valuable corporate information assets, and providing IT with an unpredictable and inconsistent mobile environment. There are also mobile technology considerations, while mobile devices are surpassing PCs and laptops as a user’s primary computing platform, they do have limited access to power, network and hardware resources. Devising a BYOD solution that will support both personal and business roles requires attention to all of these challenges”. The paper will be to identify most of the risks associated with companies allowing personal devices in the work place to access company information. I will also demonstrate the downside of the BYOD policy and the affects to the company and the employee. There are numerous risks associated with the BYOD policy many of them are security related the loss or theft of a mobile phone could lead to confidential data being stolen and
Cited: The BYOD Conundrum." Web log post. SecurityInfoWatch.com. N.p., n.d. Web. 09 Dec. 2012. Benigno, Richard. "10 Tips for Implementing BYOD Securely." N.p., 08 Sept. 2012. Web. 09 Dec. 2012. Berkowitz, Philip. "Corporate Counsel." Corporate Counsel. N.p., 26 July 2012. Web. 09 Dec. 2012. Messmer, Ellen. "BYOD-resistance Loosening but Security Practices Lacking."Consumerization of IT, BYOD. N.p., 25 Oct. 2012. Web. 09 Dec. 2012. Savitz, Eric. "Developing A BYOD Strategy: The 5 Mistakes To Avoid." Forbes. Forbes Magazine, 27 Mar. 2012. Web. 07 Dec. 2012. Courbanou, Dave. "Dell, Intel: BYOD Is Productivity Powerhouse | Channelnomics."Channelnomics RSS. N.p., n.d. Web. 07 Dec. 2012.