-
Bring Your Own Device (BYOD)
- An organization's employees both own and use personal computing devices external to (not provided by) the workplace.
-
Organizations must have clear guidelines about BYOD that specify:
- who may bring devices to the workplace
- what types of devices they may bring
- how the security configurations of those devices are managed
- how data whose origin was internal to the organization, but was received on those devices, may be shared
- The use of BYOD often requires significant adjustments to an organization's acceptable use policy. Unless policy is clearly defined, IT staff may find themselves in a situation where they don't know the scope of their support services.
-
The core issues around BYOD relate to device and data ownership:
- Traditionally, the company owned both the data and the device, and was responsible for both.
- In a BYOD environment, the user may own the device and both the user and the company may own the data.
-
These ownership issues also bring legal and privacy concerns to the forefront:
-
Users should understand what monitoring will take place on their personal mobile devices.
- Users (employees) must consent to any monitoring software installed on their personally-owed devices.
-
BYOD privacy concerns have a legal basis.
- An organization implementing BYOD policies should consult with their attorneys to determine what requirements may exist in their industry and jurisdiction.
-
When an organization decides to adopt a BYOD policy, it should develop clear guidelines for the onboarding and offboarding of devices, specifying what data may be stored on personal devices and how it may be used:
- During onboarding, IT staff should ensure that the device meets organizational security requirements and is safely configured.
- When a user leaves the organization or is preparing to dispose of a device, IT staff should then conduct an offboarding process that ensures all sensitive corporate information is removed from the device. This may be a time-consuming process, but it is vitally important to ensure that corporate information doesn't fall into the wrong hands.
-
IT staff developing BYOD policies should consider the technical implications on their architecture and infrastructure:
- When the organization purchases devices, it's easy to standardize on hardware, operating systems, and applications. When users bring their own devices, however, this standardization is often impossible.
-
BYOD organizations must be prepared to support a wide variety of hardware, operating systems, and applications. Some of the specific technical issues for BYOD devices include:
- whether the organization will use mobile device management to control the configuration of BYOD devices
- how the organization will ensure that BYOD devices are regularly patched and contain appropriate antivirus controls
- whether the cameras on BYOD devices will be permitted to take photos and/or video in company facilities
- what procedures the organization will follow in the event of a BYOD device compromise
-
Choose Your Own Device (CYOD)
- Employees select the equipment that they would prefer to use and then the company purchases it and manages it for them.
- Some organizations following the CYOD strategy may simply provide employees with an allowance to purchase a device and then they let the employee select whatever device best suits their work style.
- However, it's more common to find companies that have a menu of standard devices that are supported by the IT department and then they allow employees to select their preferred devices from that menu.
-
Corporate-Owned, Personally Enabled (COPE)
- The company owned, personally enabled, or COPE model, recognizes that BYOD approaches arose, in part, because employees don't want to carry separate devices for business and personal use.
- The COPE model allows generous personal use of corporate owned devices.
- Employees may install apps, configure personal cloud accounts and personalize their corporate owned devices.
-
VDI
-
Virtual Desktop Infrastructure (VDI):
- Virtual desktops are deployed and run on servers located in a data center or the cloud.
- VDIs must be carefully configured to meet organizational security requirements. Employees then use their personal devices to connect. Data never leaves the virtualized environment.