Widespread access to mobile technologies is encouraging more employers to adopt a Bring Your Own Device (BYOD) policy in the workplace. In some cases, the transition is happening without a specific mandate from the employer. When employees bring their personal smartphones, tablets and computers and connect them to the corporate IT network it is inevitable that some advantages as well as challenges come with the practice. This makes it necessary to put a plan in place to mitigate the risks.
Let us first look at the advantages:
Now, the challenges and risks:
BYOD policies will need to keep all the above risks in mind and mitigate them by deciding how much data would be accessible on a worker’s personal device. A role-based access management system becomes imperative. Employers need to obtain and document the worker’s permission to access and manage the device, including the ability to wipe out all information stored on the device. This action could also erase the worker’s own files, music, pictures etc.
Can we allow Temporary Workers to bring their own devices?
A huge (and growing) segment of the workforce today consists of temporary workers and independent contractors. What protects a company from a temporary worker who accesses its corporate network remotely or uses a personal device for work?
According to a Gartner CIO survey, 38 percent of employees will be using their own equipment in the workplace by 2016, while the number will go to 50% in 2017. So it is necessary for every employer to have a strong policy. All employees – whether temporary or permanent – must be subjected to the same controls, enabling them to use these important tools to increase productivity while protecting the interests of the company.
Mail (will not be published) (required)
+ 9 = twelve
Thanks for Subscribing to DCR Blog.