BYOD policies  in companies     traffic news duiih

Use of personal devices in Work

BYOD (Bring Your Own Device) offers great opportunities for companies and workers, provided that they are aware of the associated risks.

More than 80 percent of it managers think that companies that have a BYOD policy have a competitive advantage over other organizations, according to a recent research commissioned by BT.

The research, which examined the attitude of employees regarding the use of their own laptops, tablets and smartphones for labor issues, included responses from 2,000 users and it managers in 11 countries and different sectors.

In the present four of every five companies claim that already allow use of personal mobile devices or will do so in the next 24 months, and 60 percent of employees declared already them permitted to connect their own devices to the corporate network.

The study reveals that both employees and those responsible for decision-making of TI positively valued the opportunities presented by the growing use of personal devices in the corporate networks. 64 Percent of those responsible for it considers that count on a BYOD policy will allow the employees be more productive.

(BYOD) describes recent developments in employees bring the mobile devices of personal property to his place of work, and the use of these devices to access privileged resources of the company as e-mail, server files and databases. [1] Some prefer the term bring its own technology (BYOT), because it is a broader description encompassing not only the device hardware (s), but also the software used on your device (for example, web browser, Media Player, antivirus, word processor).

BYOD policies 

A common form is when employees bring their own devices to work. They can do so for personal reasons, such as check personal email and social media, or for reasons of work, such as access to email from work, calendar and contacts. 

Companies that fall under the rules of compatibility such as PCI and HIPAA still must comply with when using the BYOD concept. However, the definition and implementation of a policy of acceptable use can be difficult on devices that are not property of and (completely), managed by employers.

Despite these benefits, it managers are uneasy. Only one in ten believes that all BYOD users are aware of the risks, and fewer than one in five believe that all users understand the access and permissions related to their mobile devices. And it seems that the concern of those responsible for it is justified. Interviewed employees, one in three does not see "no risk" to use your own device in a work context, and only a quarter recognizes the significant risk posed to the security of the company.

BYOD policies

Business: A company that adopts a BYOD policy allows saving money on these expensive devices that would normally be required to buy for their employees. Employees can care better for a device which they see as their property. Companies can benefit from the new technology more quickly.

Employees: are able to decide on the technology that you want to use for the job, not just assigned a device of the company. Exclusive control of functions given to the employee.


Business: Company information has the ability to not be as safe as it would on a device that has the exclusive control. "The 'experts' of security have called ' bring your own risk"and"Bring Your own disaster". You might have to pay for phone service employees is able to be used outside working hours. BYOD is an extreme case of the problem of final node.

Employee: Due to security problems that the employee does not have a true total control on your device and the company for which they work should ensure that confidential and private information is secure at all times. It's an expense out of his own pocket for the employee. They would be responsible for the repairs when the appliance is damaged or breaks, while doing the work required by the job.

By these aspects should be a policy clearly defined for BYOD that describes the rules of engagement and declares from the beginning are the expectations. You must also establish the minimum requirements of security, or even the mandate of the company sanctioned by the tools of security as a condition to allow that the personal devices to connect to the company's data and network resources.

There is also a question of compliance and the property when it comes to data. Companies that fall under the mandates such as PCI DSS, HIPAA, GLBA compliance, or have certain requirements related to information security and the protection of specific data. These rules still must be followed, even if the data are in a laptop owned by an employee.

BYOD policies in companies
The security you has always been a combination of people, policies, processes, and technology, and the right mix is even more critical in the new working environments.

39 Per cent of the companies has experienced a security breach due to the use of devices not authorized by employees, especially in the pharmaceutical sector and the consumer goods industry. More than four in five (83 percent) of responsible for TI believes that put a 24 x 7 access to corporate systems in the hands of an increasingly mobile workforce is now the main threat to the corporate IT security.