Bring your own device, Learn Developing BYOD Policy

Page 1

Bring-Your-Own-Device Presentation by Ravi Namboori Visit us @ http://ravinamboori.in


Bring-Your-Own-Device A technology trend that evolved to empower the workforce to use their own device to access enterprise data and systems. 

Employee-owned devices such as Smart phones, tablets and personal laptops are allowed to use at work place.

Mobile devices are seamlessly integrated with enterprise corporate systems and networks.

Firms can leverage best from the BYOD programs by enabling IT teams to have proper usability to the systems anytime and anywhere remote accessing.

BYOD brings enhanced mobility in business critical processes.


Enterprise Policy…….. BYOD is an enterprise policy that enables: 

Unlimited usage of personal devices in workplace

Employees access only non-sensitive data and systems from their personal devices

Enterprises have IT control on personal devices, data stored and applications as part of BYOD policy

BYOD policy objects local data storage on employees personal devices


Value addition areas……… 

Increased employee mobility

Better integration of employee personal and work lives

Brings quick turn around times and seamless interaction

Win-win scenario for both workforce and management


Developing BYOD Policy…….. While developing BYOD policy, enterprises need to consider the following: 

Segmentation of users and decide on what depth of access should be given to each specific segment

What type of devices need to be permitted to access corporate data

Device specific security policies

Need of well-defined service policies

Defining use polices


BYOD - Business Benefits……….. 

Driving innovation in to workplace with handy smart devices

Improved employee job satisfaction

Enhanced efficiency and flexibility

Significant cost savings to enterprises as employees use their own devices to perform corporate tasks


Risks….. Though BYOD brings significant business benefits, enterprises need to consider full implications involved in allowing personal devices to access corporate data and systems 

Data gets in to nefarious hands when the device with limited password protection is lost or stolen

Companies need to have thorough risk assessment and mitigation mechanism in place

BYOD could bring security vulnerabilities in to current secured environment


Security Policies….. 

Enterprises need to develop stringent security policies to defend security threats from viruses and hackers.

Companies need to ensure all data protection commitments are fulfilled

Employees should be allowed to install specific applications in their devices

Data encryption techniques should be used while transferring data to and fro between corporate servers and personal devices


Things should be in place…. 

A dedicated team that includes personnel from IT, legal and human resource teams should monitor and ensure all the data protection and security standards are followed

Efficient monitoring mechanism is needed to monitor internet traffic on employee smart devices

Action plan to respond quickly to data breaches


Thank you Presentation by Ravi Namboori Visit us @ http://ravinamboori.in


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.