Stay informed with these resources.

Points to Consider Before Implementing a "Bring Your Own Device" Policy

A "Bring Your Own Device" (BYOD) policy allows the employees of an organization to use their own wireless devices as their workplace devices. If your organization is considering a BYOD policy or is in the process of implementing such a policy, then the questions and points below should be taken into consideration.

Many of the questions and points mentioned below can be addressed through the use of MethodiCall Call Accounting by Smart Thought Technologies.

Questions to Consider

  • How do you determine that an employee is delinquent on his wireless account if you do not have access to the account invoice. Furthermore, if you can determine payment issues, how do you handle them?
  • How do you ensure that the usage and costs associated with a wireless device are within acceptable limits?
  • How do you manage malicious calls from or to an employee when you do not have access to the call record data?
  • How do you manage the enforcement of certain device features such as browsing or application installations?

Points to Consider

  • Providing support for all of the platforms such as iOS, Windows, Android, RIM, Symbian
  • Cannot capitalize on carrier volume discounts.
  • Not all devices support a secure remote access delivery.
  • Lawsuits if employee owned device has personal data wiped or if devices subpoenaed.
  • Who owns corporate contact list if info is on employee Twitter, Facebook accounts.
  • Reimbursement considerations for roaming, voice and data.
  • Security issues with “Jail Break” or ”Rooting” of devices
  • Security issues with use of device by family members.
  • Potential risk of carrier throttling for BYOD.
  • No logging/audit trail of business calls i.e. Sarbanes Oxley compliance. Therefore no analytics.
  • Not all devices will support a corporate UC initiative.
  • Cost of management systems and licensing for Mobile Device Management and Mobile File Management.
  • Not all devices will be supported by MDM vendors.
  • Hidden cost of BYOD will increase IT expenses.
  • Exposes business to unmanaged risks and liabilities. An example of an unmanaged risk is, Man-in-the-browser (MITB), in which a malicious third party gains access to a device's web browser and can perform dangerous actions such as edit or insert browser content or spy on an employee's browser activities.