Table of Contents ABSTRACT 2 INTRODUCTION 3 METHODOLOGY 3 FINDINGS 4 Risk Associated and Condition for risk to occur and consequence of risk With BYOD 4 Strategies and technical solution to prevent risk 5 Organizational policies 5 DISCUSSION 6 CONCLUSION 6 REFRENCES 7 Appendix A 8 ABSTRACT: Now days, the technology has advanced and the use of personal tablet, iphone, smartphone and laptop by employees in their work-place had increased rapidly. Many organization have used this concept which is also known as BYOD (Bring Your Own Device) in order to reduce the operational cost, increase the efficiency and is simple to use. It has also increased employees job satisfaction and morale since the devices can easily be transported …show more content…
The devices may be Laptop, Ipad, Notebook, Iphone. The employees/staffs are authorized to use their electronics devices to access to the organization’s Intranet and they can access and store the organizations information and their personal data also. BYOD is gaining popularity now days since personal devices like smart phones and tablet comes with almost features and capabilities and also easy interface. An Organization of course has a full control over the devices which are corporately owned devices and can protect the information it has collected for certain purpose from unintended use. But with BYOD it has less control. Organization needs a proper protection for BYOD since a single device is used for personal and work purpose and there is possibility of certain risk. Finding out the risk associated with BYOD and some procedures to minimize the risk is the main aim of this research. BYOD makes the workplace more smart and active and the network more secure when it is planned carefully and outcome can be productive and powerful. BYOD helps the organizations to transform into the cloud. Doing work in cloud reduces the physical IT infrastructure and networking. Organization can put all the data in cloud and can be accessed from any personal device easily and at any time. The employee can do their work even if they are
The inappropriate disclosure or misuse of sensitive information by an employee may result in financial considerations and legal consequences for an organization. “Mobile devices provide all kinds of new scenarios for business data to go missing, be shared with others, or be stolen. You need to go into BYOD thinking this way, not just for everyday activity, but also when employees move on from your organization” (Arnold, n.d.).
Bring Your Own Device (BYOD) is when an employee uses one or more personal computing devices for business purposes. It can include personal computers, laptops, tablets, USB or flash drives, mobile phones and even online computing services such as Dropbox or Google Drive. The history of BYOD stems from the technological advances of the past 25 years, starting with employees accessing corporate networks from their home computers via dial-up modems in the late 1980’s and virtual private networks starting in the early 1990’s, continuing through the massive increase in mobile phones and access to corporate email via Blackberry type devices and culminating in the current state of being connected all the time via tablets
If WickID Candles implements the BYOD plan, each employee would be able to use their personal cell phones for work purposes. They will be used to keep up with the workplace environment at home or whenever they are out of the office. This will allow to them have access to personal work data whether via their work email or access to the company 's personal sites. With BYOD, employees would be able to use their mobile devices to interact with customers, manage accounts, and even create new aspects of our online store. This plan would potentially give workers the flexibility to work at the leisure of their homes and to continue to work without being tied to the office. Our goal is that this will increase engagement with customers and increase work productivity.
BYOD lets employees use their personal devices for work, connecting to a corporate network. Generally you will cover a portion of the service plan's cost per employee. This policy is great for productivity because your employees don't
Many issues have surfaced, including what legal access an employer has to information on a personally owned device. In a recent study, 60% of employers indicated that they currently allow employees to use their personal phones, tablets, or laptops to access company information, or conduct business from the device. In addition, 14% of the respondents indicated that they don’t currently allow such use, but plan to implement a plan to do so within the next year. This new trend, referred to as “Bring Your Own Device” (BYOD) blurs the distinction of what is acceptable monitoring by an employer. Upon review of the website PrivacyRights.org, an employer can do the following on an employee owned device: “Locking, disabling and data wiping, access to the device, access to phone records or contacts, access to social media or other account username and passwords, monitor GPS and location information, view web browsing history, view pictures, video, or other media, view personal emails, view chat and messaging histories, and limit the use of cloud services.” (Clearinghouse, 2014) To protect both the employee and the employer, it is vital that an employer develop a BYOD policy, which clearly outlines the ramifications of what the employer does and does not have access to. In doing so, if a dispute were to arise
Best defined, a bring-your-own device (BYOD) system is a network that is specifically designed for individuals to connect their own devices for use within the system (source). For example, X-Rocket may allow certain employees the luxury of using their own laptop or tablet computer for work-related purposes, rather than using a company device. While there are many advantages to utilizing a BYOD system, such as low-costs and flexibility, advanced security methods are required to ensure safe networking and data access. Current BYOD security issues include unknown third-party access, data tracking challenges, data leakage, and non-compliance with networking safety procedures (source). Notably, the Cobb County school district of Marietta, Georgia,
Human factors influence polices in the BYOD practice in the workplace because for the most part employees are comfortable and prefer using their own devices compared to company issued devices as they can often multitask between personal and business access. The use of mobile devices comes with the consequences of the device being stolen, lost and exposed to threats. The possibility of these devices falling in the wrong hands or stranger not authorized access to data could result to harmful software application being uploaded or downloaded which could infect the device and compromise the network.
Many people, be it at home or work, feel the need to constantly check their electronic devices for new messages. The same goes for students while they are in school. Many scientific studies, including the one conducted by the University of Nebraska-Lincoln, have shown that more than 90% of students use their devices for non-academic purposes while in school . With the implementation of BYOD and free connection to the internet, students can now send multimedia messages such as pictures and videos to anyone around the world in an instant. Electronic devices are very enticing and are the biggest source of distraction in an environment where the least amount of
Other types of risks could be the using of personal device at work. This principle is known as BYOD. BYOD is an IT policy where employees are allowed or encouraged to use their personal mobile device such as phones, tablets, and laptops to access enterprise data and systems. BYOD can expose a company network, and easily attract more attackers. Not only this kind of principle help the company, but it also can cause a serious security breach. Data theft is at high vulnerability when employees are using mobile devices, and particularly their own to share data, access company information, or neglect to change mobile passwords. It is important that a company that allows its employees to use their own devices to list BYOD in their risks list. To
Additionally, IBM equips mobile devices with programs that encrypt information as it travels across corporate networks causing some trust issues to arise with employees. Intel approached BYOD in a positive manner, trying to find ways to make it work rather than defeat it. Intel structured a BYOD strategy and service agreement that clarified that end users were voluntary using BYOD rather than being for to by management. In conclusion BYOD worked so well at Intel for the following reasons: Goal of Intel is make employees more happy and productive to work efficiency but not to save money, employees like being able to use their own devices and apps alongside specialized Intel apps, and Intel’s company developed different policies, rules and access limits for each type of devices such as smart phones, tablets, or laptop with multiple levels of control in
From a business perspective the adoption of BYOD programs may seem like the right decision as a result of the increasing reliance and use of technology. Research and pilots performed by various companies have offered up the idea that implementing BYOD programs in the workplace environment will result in numerous benefits, to include increasing employee satisfaction by enabling flexible work schedules and cost-effectiveness by reducing the number of government devices. However, from a security perspective, there are many potential challenges and risks that can result from prematurely adopting such as program. Before considering the risks of integrating BYOD programs, there needs to be a general consensus that risks will always be of concern
Eli Lilly is a global company of comparable size to Cummins. Like Cummins, Eli Lilly also has a collaborative culture. Eli Lilly’s mobile device approach strictly involves company-provided devices. Smartphones are provided to employees based on position level and travel needs. Eli Lilly opted to not establish a Bring Your Own Device (BYOD) due to the legal and security risks that BYOD creates. After careful review and analysis, Eli Lilly did
Mission Health's Bring Your Own Device (BYOD) movement is well underway with a recent survey conducted at the hospital revealing that 90% of more than 10,000 of our employees use their mobile devices for both personal and work purposes. While permitting employees to use personal mobile devices to access corporate resources increases employee satisfaction, employee productivity, reduces capital costs, and ultimately improves the quality of care and increase operational efficiencies it introduces significant security risks.
Bring Your Own device is a business policy of employees bringing personally owned mobile devices to work and using those devices to access privileged company resources like email, file servers and databases as well as personal applications and data. The types of devices that employees may use are smart cell phones and laptops.
Employee interaction on all devices are relatively the same and have similar impact on all systems. Some companies are allowing you to bring your own device (BYOD) to work for an enhanced work experience and increased productivity. Some of the benefits from this are no tracking of daily productivity, the comfortability of having your own device, and lower costs to maintain company property. Depending on the size of your company BYOD could be extremely beneficial and allow the employees to take on much of the burden of debt to work at the company. The average mobile device cost approximately three hundred dollars and if you have anywhere from 10 to 20 employees that could raise the cost to about 500 dollars. Apple and windows users tend to be more familiar with their devices so it is easier to manipulate their business requirements as they need. Lastly, having the flexibility to utilize one device vice several saves a lot of discomfort whether on business or official travel. The ability to have your own dedicated