MEMORANDUM
Research and analysis show that the use of owned electronic devices has increased rampantly in the previous period in the workplace environment. The use of high tech devices like smartphones is estimated to exponentially increase with time in the coming years. The problem statement at hand is the issue regarding the permissible activities allowable via the use of these devices. It is soon becoming an inevitable fact to restrict the use of these various devices on company premises. The legal issues surrounding this problem pose a proposal for the introduction of policies that encourage but actively govern the access granted to employee-owned devices to corporate network.
Importance of Implementing the Policies
- The importance of introducing these devices to the network will integrate employees to better communicate with access the corporate network.
- Implementing these policies will support & advise the company on how best the handheld devices are supposed to be used by the workers to prevent phishing (hacking).
- The ultimate objective is to increase the security while at the same time allowing access to certain devices while identifying security weaknesses in the network system.
Policies to be considered for Establishment
The measures to be taken to ensure a successful execution of these policies should include:
- Specifying which devices are permitted – this will aid helping tech security personnel in narrowing down to appropriate security measures in the terms of mobility of fully trusted employees who have access to company network from remote locations.
- Defining a clear service policy for devices under the BYOD criteria - Training is essential in this matter. Openly outlining the threats and users’ duties in shielding themselves and the company against security breaches is vital. It's significant for personnel to recognize the limitations when queries or difficulties creep up with personally owned palm end devices.
- Making a clear set of abstraction on who has access to particular data and apps on mobile devices - This applies to any device that will connect to the corporate environment network. The major attentions or concerns should typically include applications for VPNs or other remote-access software, social media browsing, and replacement email applications.
- The ownership of data and apps is also an important issue when it comes to BYOD since the security of company and personal information stored on smartphones or other high end palm devices is subject to restoration in the event of data loss the network plan should enable data backup remotely, its restoration, and maybe wipeout incase a device is stolen.
- Developing stringent rules that positively integrate the BYOD Plan with the company User Policy – this would comprise of the insurance cover implemented on corporate-issued phones and other end devices. This introduces the enactment of acceptable use policy of these various devices since all that connect to the network are subject to monitoring and scrutiny by network security analyst.
- The company should also develop an employee exit strategy – this forms another important part that should be looked at since when employees leave the company premises it is highly questionable if they should be still granted access to the network. It's not as modest as having the workers return the corporate-issued mobile handset. In this case, the corporation should select to rely on restricting synchronization or email access as part of their exit interview and HR checklists. Additionally, they can choose to execute a wipe off of the BYOD-enabled device as a compulsory exit strategy
Decisively, while setting guidelines to administrate the use of mobile devices is an indispensable part of any BYOD initiative, ordering its practice can be a difficult to balance. Tablets and smartphones have become so very personal that one in every four individuals would prefer to share their toothbrush over their phone. That is how important it is.
References
BCS, The Chartered Institute for IT. (2013). Bring your own device: The mobile computing challenge. Swindon, U.K: BCS Learning & Development Ltd.