Byod

In: Computers and Technology

Submitted By gomesjolerie
Words 305
Pages 2
Bring your own device

Let’s take a moment to understand the opportunity and the downside of people utilizing their own personal device in the work force.

As IT departments struggle to keep up with yearly technology changes, company employees increasingly want to utilize their own electronic equipment to access corporation data. People utilize, bring you own device (BYOD),bring your own tablet (BYOT), Bring Your Own Phone (BYOP) and Bring Your Own PC (BYOPC) All of these have evolved to empower workforces through the so-called 'computerization of IT.
As these services are growing fast, these can be serious risks to company’s data.

Richard Absalom, an analyst at Ovum, believes that BYOD will happen whether a company plans for it or not. He says: "Trying to stand in the path of computerized mobility is likely to be a damaging and futile exercise." The best thing that a company or enterprise can do, is to be aware of the benefits and understand the risks.

Despite the serious risks involved, there are serious benefits and advantages businesses can benefit from them, it can potentially increasing employee satisfaction, employees can work more flexible, cost savings, it reduces hardware spend, software licensing, device maintenance and productivity gains, employees are happier when they use their own personal device.

As I have mentioned, there are risks involved when employees uses their own contrivance in the work force.
The questions arise who owns the device? Who manages the device? Who secures the device?
Accountability is not something that goes away for a user just because they personally own the device. After all, the data carried on it is company owned.

Properly implementing a BYOD program, can reduce cost and increasing productivity and revenue. As BYOD goes to main stream in IT world, security should be the main focus for IT…...

Similar Documents

Byod (Bring Your Own Device): Hot or Not?

...BYOD (Bring Your Own Device): Hot or Not? Andrea Ferguson CGS1016-39433 BYOD is the hottest acronym in IT since ITIL. Professionals want to know what’s going on with BYOD, regardless of whether they’re on a team supporting such a program, considering adding such a program, already a part of a BYOD program or simply just interested out of personal curiosity. This paper will explore a few of the pros and cons of a BYOD program. Cisco sponsored a survey of 600 IT and business leaders. The results of this survey showed that 95% of their businesses permit corporate network access by employee-owned devices. Out of the 600 surveyed, 48% support a select list of devices, while 36% allow all devices. Additionally, 11% of those businesses allow employee-owned devices access to enterprise networks but do not offer any type of IT support. It’s clear that businesses have a drive to implement BYOD programs. It’s also clear that these programs are highly popular with both company and employee. Mobile devices, powerful yet inexpensive and easy-to-use tools, help employees to be productive regardless of their location. Collaborative efforts and information exchange can increase, allowing a business to step up their reaction to market changes and/or customer needs. Another plus is that virtually every employee owns some sort of personal mobile device. While mobile technologies use does have the potential to transform business, it can also disrupt IT. Today’s employee......

Words: 1194 - Pages: 5

Byod

...encuesta Cisco IBSG Horizons BYOD: una perspectiva global Cómo aprovechar la innovación liderada por los empleados Joseph Bradley Jeff Loucks James Macaulay Richard Medcalf Lauren Buckalew Resumen ejecutivo Para determinar si BYOD es simplemente un fenómeno de los Estados Unidos (o de las empresas de los Estados Unidos), el Grupo de soluciones empresariales para Internet (IBSG, Internet Business Solutions Group) de Cisco® expandió su estudio original sobre “BYOD y virtualización” para incluir a las personas que toman decisiones de TI en empresas de 1000 o más empleados y en empresas medianas (entre 500 y 999 empleados) en ocho países en tres regiones. Nuestros resultados demuestran que el crecimiento de BYOD no se limita a los Estados Unidos ni a las grandes empresas. BYOD tiene una impronta regional: los países asiáticos y latinoamericanos observan y estimulan ampliamente BYOD, mientras que Europa es más cauta y restrictiva. Hallazgos y conclusiones globales clave • BYOD es un fenómeno global: existen sólidas evidencias de empleados en todas partes del mundo que usan sus propios dispositivos para trabajar; el 89% de los departamentos de TI permiten el uso de BYOD de una u otra forma • Los principales beneficios de BYOD para las empresas son una mayor productividad, satisfacción de los empleados y menores costos; el 69% de los líderes de TI son “positivos” acerca de BYOD • Los empleados desean tener acceso a BYOD para poder elegir dispositivos y......

Words: 9083 - Pages: 37

Byod

...3/10/13 2013 Predictions: BYOD; death of the desk phone; over-the-top services; and moreMobile Technology | Wireless Broadband | Wireless Carriers | RCR… Trends » Careers Webinars Reports RCR TV Global Spectrum Map Home U.S. Americas Carriers Devices Enterprise Policy Analyst Angle Opinion Backhaul LTE Subscribe Categories: Wireless 2013 Predictions: BYOD; death of the desk phone; over-the-top services; and more Posted on 09 January 2013 by by Andy Ory, CEO, Acme Packet. Tags: BYOD, Enterprise Mobile and Wireless, LTE, small cells, Wi-Fi Share 13 0 Tw eet 43 Like 4 Send Editor’s Note: With 2013 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year. It’s always fun this time of year for our team at Acme Packet to gaze into the crystal ball and come up with our best bets for what we think will happen in 2013 (and beyond). It’s no surprise that the telecom industry has undergone a dramatic transformation over the last few years, and we don’t see this slowing down in 2013. The two biggest things that have happened in our lives, from any type of communications perspective, are the Internet and the mobile phone, and these two items are now converging – the way we communicate is being revolutionized by advanced devices, activation of LTE wireless services and the expansion of Wi-Fi access areas. As such, telecom providers must evolve business models and...

Words: 2367 - Pages: 10

Intel Byod

...Case : Intel BYOD Assignment Questions 1. Does BYOD increase productivity in workplaces? 2. Should it be encouraged or discouraged? 3. How might other firms benefit from Intel’s approach to security (as shown in case Exhibit 2)? 4. How can Intel turn BYOD into a new source of competitive advantage? 5. What decisions can Intel make to ensure security of the corporate data on an employee-owned device that is used in the workplace? 6. How should Intel manage BYOD in the face of its e-Discovery obligations? Pasted from Role: Malcom Harkins, chief information security officer was facing dilemnas in taking forward the Bring your own device initiative. - By 2014 at least 70% of employees would be using their own device for at least part of their job. Issue - The difference between personal data and corporate data… was no longer limited to office hours, just as peronal data was no longer off-0 limits during office hours - Employees would be distracted by applications embedded into their devices, which could potentially lead to a negatice impact on productivity - Greater risk in data security - Intel neded control over to access and control company info.. But doing so on employee devices would violate privacy Benefits - Reduced intel's hardware cost because employees bought their own hardware but increased cost in supporting , configuring those devices - Lower cost in data because telecom charged 33% less for personal vs corp data.. Approaches - Do nithng.. And hope that bringing in......

Words: 527 - Pages: 3

Bring Your Own Device (Byod)

...Bring Your Own Device (BYOD) Bring Your Own Device (BYOD) There are pros and cons to a BYOD policy. Each company must carefully weigh both sides of the situation before making a decision. As the business world moves forward, there may be more companies using BYOD. There are some benefits to a BYOD policy. Having employees use their own devices can save the company money. Instead of buying devices for everyone, they can just buy them for the ones that need them, and the ones that work on projects that need more security. BYOD could also lower maintenance and IT costs, as users would be responsible for their own devices. Since storage would be accomplished via cloud storage, there would not be much risk to the company concerning lost files or shared files. Many users would probably welcome the chance to work on their own devices instead of company devices. Users may feel more comfortable using their own device which might lead to a more productive employee. There are still many risks involved with BYOD. The biggest risk is the possibility of lost files or someone loaning their own device to someone else. It is not uncommon for someone to pass their device around to different people. Another risk is that with BYOD, the company has to support several different brands of devices and also different platforms. The company may have to structure their company to accommodate this. The company also doesn’t have control over what items the employee puts on their......

Words: 360 - Pages: 2

Byod

...BYOD (Bring You Own Device) YT Strayer University Abstract BYOD (Bring You Own Device) promises many benefits such as greater innovation, better work-life balance and improved productivity, but it also increases pressure on IT to manage and secure devices and data. How to do BYOD successfully is a challenge. This paper discusses some of the pros and the cons of BYOD as well as an example of an organization that uses it. Bring Your Own Device BYOD is famous because it brings freedom, to employees and to employers. It means that workers can bring their own computers, tablet PCs, smartphones and other productivity and communication devices in their places of work for professional activities. While it is much appreciated by most, it comes with many drawbacks and has to be dealt with with particular caution. In this article, we look at how people in businesses are welcoming the idea, its pros and its cons. The Pros of BYOD Workplaces Organizations who implemented BYOD have several benefits such as: Enhanced Productivity. Mobile devices offer the benefits of convenience and speed. Sales executives can do their jobs while traveling, management can keep up with emails or review important documents on their tablets, and anyone can stay connected with their Smart phone. Smart phones have become a primary player in how workers communicate and share both work-related and personal data throughout the course of a day. Cost Savings. Within Bring Your Own Device environments...

Words: 755 - Pages: 4

Intel Byod

...CASE STUDY IV-8 Mary Morrison’s Ethical Issue (Revised) Mary Morrison, a second-semester sophomore business major at Big State University, was unpacking the new PC that her family had given her for Christmas when she discovered that, except for the Windows operating system, no software was included with the machine. Although the new PC was an adequate computer, it was an inexpensive machine, and one way that the store kept the price low was to not include software. Mary was concerned because she knew that she would need a good word processor, a spreadsheet program, and some presentation software, and she thought that this software would be included with the computer. According to her friends, Microsoft Office Professional was the recommended suite of software for business students. Mary quickly checked around the university and found that she could buy Microsoft Office Professional at the special price of $199. However, a friend, Frank Taylor, offered to let her copy his Microsoft Office Professional onto the new machine. Mary was uneasy about accepting Frank’s offer because she had learned in her computer literacy class that copying copyrighted software was illegal and was tantamount to stealing it. She told Frank that she needed to think about it. Frank could not understand her hesitation. “Everybody does it,” he explained. Mary’s Background Mary’s family was reasonably well-to-do. Her mother and father had met at Big State University and had gotten married when they......

Words: 775 - Pages: 4

The Bring Your Own Device (Byod) Policy:

...CSEC610 Individual Assignment The Bring Your Own Device (BYOD) Policy: Implications on Corporate Security Abstract: The paper discusses: 1) potential vulnerabilities in the Bring Your Own Device (BYOD) Policy when adopted by a company; 2) threats to a network from untrusted and unmanaged devices; and 3) best practices for implementing the BYOD policy in a workplace. The paper also proposes one of many solutions that can be implemented to make the policy robust. Bring Your Own Device or BYOD is the policy, whereby employees are allowed to utilize their own personal computing devices to access corporate resources to perform their day-to-day job duties. These devices can include laptops, smart phones, and tablets and the corporate resources include sensitive, private and privileged information. When not implemented correctly, the BYOD policy is a vulnerability for businesses and enterprises, since sensitive data is accessed through unmanaged and potentially compromised devices. This accessed data has the potential to end up in the wrong hands in an ever-increasing number of ways. This puts pressure on IT managers to manage and secure these devices and protect proprietary company data. BYOD offers potential cost-saving measures, since it allows employees to bring their personal computing devices to the workplace, thereby eliminating the need for businesses to provide them with these devices. When individuals can work from and use a......

Words: 2386 - Pages: 10

Byod Pr Cope?

...BYOD (Bring Your Own Device) is attractive for two main reasons. It increases employees’ satisfaction, by allowing them to purchase (and use) whichever device they prefer, and it reduces company’s expenditure on purchasing equipment, and on carrier costs. However, BYOD may incur further costs on the company and leave it exposed to security threats . On the costs front, employees bear the costs of the devices without benefiting from their company’s buyer power (to secure discounts, for example). Furthermore, in BYOD, companies usually pay for data packages for devices that are completely owned by the employees, and since devices are used for personal use, unexpected payments might occur. Thus those data packages may not always completely cover business usage. On the administration side, BYOD may require MDM (Mobile Device Management) services, which are usually provided by a third party, to ensure compliance with organization policy, handle mobile security, and separate between ‘business’ and ‘personal’ usage of the device. MDM services are also required in COPE. Furthermore, IT helpdesk may be inefficient under BYOD policy ; with a wide range of devices used and no standard device policy, help desks may either be less productive due to inability to support devices, or take longer time to complete services due to inexperience with particular apps and/or devices. BYOD approach bears significant security concerns. The primary risk is that personal devices might infect the......

Words: 699 - Pages: 3

Byod

...Mobile Devices in the Workplace Strayer University CIS333 Professor Roden January 22, 2015 Mobile Devices in the Workplace Introduction Mobile devices in the workplace can offer many advantages; however, there are a few major concerns when allowing mobile devices in the workplace. Security being the largest concern, followed by physical concerns and the cost of Information Technology (IT) professionals. Security Security is one of the most important aspects to many businesses. Allowing employees to have mobile devices in work areas may compromise the security of networks. If an employee was to plug their phone into a compute to charge and the phone had a virus on it that virus could be inherited by the work station. Take Bradly Manning for instance, he was privileged to access classified information not to insert a CD-R and steal classified documents. If a user means harm, allowing mobile devices in the workplace only acts as an aide to them. Had Manning not been permitted mobile media in a classified area it would have been significantly more difficult to steal the documents. Physical Concerns The physical concerns with allowing mobile devices in the workplace include distractions from work and possible health hazards. A distracted worker is not only less productive but also careless. Imagine a fork lift driver trying to read a text message and driving through a warehouse where there are other workers; the driver would obviously not be devoted to safety. It...

Words: 894 - Pages: 4

Bring Your Own Device

...Case Study 1 Bring your own device (BYOD) Cynthia Lopez Networking Security Fundamental OCT. 26, 2015 Good news now your company has bring your own device program so you can finally use your phone that has more capability than the boring company’s phone. Now you can you can use your new shiny iPhone for work. You can now even check your corporate email from home and stream YouTube videos too all while your company splits the bill. Will now that it all seem great and you are happy to join the company’s bring your own device you wake up reach for your phone to check your emails but it doesn’t turn on its become a brick! You do some family investigation you realize that the little one tried to guess your password and entered it wrong several times your company’s security policy shut down your phone to keep sensitive material from unauthorized access. Your phone is brought back to life and restored but realize now that all your pictures are lost and any notes you might have saved on your phone. It is gone forever. (The Dark Side of BYOD) pg1. Many employees are shocked to know that their personal devices can be asked to be surrendered. In bring your own device companies can track you using GPS on your device to track your whereabouts. Selectively disable camera and microphone when the device enters restricted company areas to prevent sensitive data loss. Online activity can also be monitored to protect the company from any liability arising from an improper...

Words: 663 - Pages: 3

Intel Byod

...CASE STUDY IV-8 Mary Morrison’s Ethical Issue (Revised) Mary Morrison, a second-semester sophomore business major at Big State University, was unpacking the new PC that her family had given her for Christmas when she discovered that, except for the Windows operating system, no software was included with the machine. Although the new PC was an adequate computer, it was an inexpensive machine, and one way that the store kept the price low was to not include software. Mary was concerned because she knew that she would need a good word processor, a spreadsheet program, and some presentation software, and she thought that this software would be included with the computer. According to her friends, Microsoft Office Professional was the recommended suite of software for business students. Mary quickly checked around the university and found that she could buy Microsoft Office Professional at the special price of $199. However, a friend, Frank Taylor, offered to let her copy his Microsoft Office Professional onto the new machine. Mary was uneasy about accepting Frank’s offer because she had learned in her computer literacy class that copying copyrighted software was illegal and was tantamount to stealing it. She told Frank that she needed to think about it. Frank could not understand her hesitation. “Everybody does it,” he explained. Mary’s Background Mary’s family was reasonably well-to-do. Her mother and father had met at Big State University and had gotten married when they both...

Words: 775 - Pages: 4

Byod

...The following paragraph describes the feasbility of BYOD, specifically on technical, economic, and behavioural feasbility. Technical feasbility determines the ability of a company in developing and/or acquiring the system. In this case, BYOD is easy to be developed and/or acquired. The pharmaceutical company could set a policy to forcefully requires all the employees to bring their own devices. However, issues on the compatibility of these devices and softwares with the exiting information system (IS) infrastructure should be closely monitor. Secondly, the economic feasibility determines whether the positive economic benefits from proposed system, are worth the financial risk. Although implementing BYOD reduces company's operating costs, this includes hardware costs, support costs, telecom costs, and so on. But there are certain implied financial risk in BYOD, for example, as companies are required to protect both the company's and client's confidentiality of proprietary information, companies might need to develop new systems to monitor the use of employee's device (Jeff, Medcalf, Buckalew & Faria 2013). This is because these devices are used by employees for both personal and business purposes. Ultimately, the new monitoring systems will increase the operating costs. Besides than that, there are also costs on ensuring the devices and softwares are compatible with existing information systen (IS) infrastructure (Jeff, Medcalf, Buckalew & Faria 2013). However, according...

Words: 483 - Pages: 2

Byod

...N6A 3K7; tel (519) 661-3208; fax (519) 661-3882; e-mail cases@ivey.uwo.ca. Copyright © 2013, Richard Ivey School of Business Foundation Versão: 15/02/2013 Em janeiro de 2010, Malcolm Harkins, diretor executivo de segurança da informação, Intel Corp., estava enfrentando dilemas em levar para frente a iniciativa Bring Your Own Device (BYOD) (Traga Seu Próprio 1 Dispositivo) A divisão de tecnologia da informação (TI) da empresa estava dirigindo esta iniciativa por quase um ano. Agora que a alta gestão tomou a decisão estratégica em favor da implementação do BYOD, Harkins precisava tomar a liderança na abertura da iniciativa amplamente pela empresa. Mais de 10.000 dos quase 80.000 funcionários da Intel ao redor do mundo já estavam trazendo seus próprios dispositivos para o trabalho. Harkins previu que o número de dispositivos móveis de funcionários no trabalho na Intel triplicaria em um ano e que, em 2014, cerca de 70 por cento dos funcionários estariam usando seus próprios dispositivos para pelo menos parte de seu trabalho. Harkins disse: Eu tenho dilemas triplos. Como exatamente extraímos valor da iniciativa e tornamos o BYOD uma nova fonte de vantagem competitiva na Intel? Como garantimos segurança dos dados corporativos em um dispositivo que um funcionário traz para o local de trabalho? Como respondemos para o e-Discovery solicitações de informações armazenadas em um dispositivo que não pertence à Intel? CONTEXTO No início em 2009, Harkins observou......

Words: 7807 - Pages: 32

Byod

...In this case study we explored a business strategy referred to as BYOD or Bring Your  Own Device. This networking model allows a company’s employees to use personal devices of  their choice when accessing and interpreting company data. This approach has mutual benefits  with both the organization as well as the employee. These personal devices give the users  increased mobility when accessing platforms within the organization from multiple locations.  This proves useful  when considering that some work can be taken home or to other  places  to  be completed. In addition to Mobility, this method allows employees to use the programs they  are most familiar with to complete tasks. This helps increase speed and accuracy of the  employee’s efforts, thus increasing the company’s efficiency and productivity. One intangible  benefit, in implementing the bring­your­own­device style, is that you have a much higher  satisfaction rate with the employees, which helps boost morale.  Another benefit is that the  company  incurs lower overhead costs associated with IT expenses such as hardware  procurement and the maintenance associated with the hardware.  The Bring Your Own Device to work model has many benefits, but it also has serious  risks associated with those benefits. By using this model the organization is left vulnerable to  outside influences. From my research on this topic I found that the organization is put at risk on  several levels. When one considers how intricate and massiv......

Words: 831 - Pages: 4