Introduction
According to Davis (2012), “Nine out of 10 technology pros think smartphones and tablets will become more important to business productivity in the next couple of years. Seventy-two percent expect to offer more bring-your-own-device options so that employees can access company data with their personal gadgets.” The use of personal electronic device usage is on the rise in the corporate workplace. Although there are opportunities associated with this; there are also risks involved. Companies and government IT divisions need to evaluate these risks, and put specific mitigation plans in place to establish policies to assure that business information is secure.
This paper will walk through the difference between Company Issued Devices and Bring Your Own devices (BYOD) in the workplace, the top identified risks that companies need to be aware of and what should be a part of the companies mitigation plan before allowing employees to bring their own devices to work and use it to access the companies information.
Difference between Company Issued Devices and Personal Devices
Company issued devices
Bring Your Own Device also known for short BYOD, is a new corporate that allows employees to use their own devices to do their work.
I am totally fine with using company devices separate from my own personal device. They have so much restriction on their devices, and they would just have the same restrictions on my personal device. For example on my business laptop, they have removed the wireless network card, microphone, and webcam and restricted me from accessing specific websites or downloading software. I can see it being convenient to use a personal device for work, but you would get frustrated during your personal time at ho...
... middle of paper ...
...ld.com/article/246760/pros_and_cons_of_byod_bring_your_own_device_.html
Davis, M. A. (2012). BYOD. InformationWeek, (1352), 21-25. Retrieved from http://search.proquest.com.library.capella.edu/docview/1237629501?accountid=27965
Hassell, J. (2012, May 17). 7 Tips for Establishing a Successful BYOD Policy. CIO. Retrieved March 25, 2014, from http://www.cio.com/article/706560/7_Tips_for_Establishing_a_Successful_BYOD_Policy
Smith, K. J. and Forman, S. (2014), Bring Your Own Device—Challenges and Solutions for the Mobile Workplace. Empl. Rel. Today, 40: 67–73. doi: 10.1002/ert.21436
Raza, S., & Perlin, M. (2012, August 8). 10 Fascinating Insights From the Experts on BYOD. IT Operations Analytics Configuration Management and Change Management Software. Retrieved March 16, 2014, from http://www.evolven.com/blog/10-fascinating-insights-from-the-experts-on-byod.html
Nowadays, technology is speeding our way of communication and the way in which we handle our personal lives. Zdziarski (2008) described, “How the iPhone has quickly become a market leader in technology and has been a big success around the world” (preface.iX). The iPhone has become a very useful tool in many aspects of people lives. However, people should be aware that this device can store a great amount of data in its memory and that if you ever lost or had it stolen all off your personal and professional information can be available to whoever has it in their hand.
An employer also should restrict an employee’s access to the internet or access to certain web sites, or prohibit the use of personal work computers. As a result, there is no right to claim privacy against your employer for monitoring or restricting your use of the internet. Having an internal regulation could avoid the personal use of a computer in the workplace, the employers are the owners of the computers, and they are also the owners of the data transmitted to and from the computers, regardless of the source. Another reason that justifies the employer's ability to control the use of the computer in the workplace is the security of their internal systems. Computer systems can be vulnerable to viruses and other types of technological problems if employees are downloading information and Internet programs, or other potentially harmful materials. Security can also be a problem in that employees can violate the company's confidentiality rules. By monitoring the use of the personal Internet, employers can prevent employees from being the means of disseminating confidential information about the company to the
...n work in an environment is free of alcohol, illegal drugs, firearms, discriminating and/or offensive material or data, etc. Company provided technology such as email, voice mail, and computer systems remain company property as well as all data that is transmitted, received, or stored. Employees are expected to use these resources business related purposes only
In my personal opinion about this very datable topic, “Does Increased Dependence on Laptops, Cell Phones, and PDAs Hurt Employee Productivity?” is that I believe it does hurt the employee productivity. I feel that if the usage of our cell phones, laptops, and other PDAs at work are to be reduced, it will make the employees focus more on their work. Most employees argue that they are taking notes during meetings and are recording the conversations; however, I question if that is what they are really doing. In the last few years, many of us have witnessed the rise in technologies. From cell phones being big, bulky blocks to cell phones being touch screen, and fit nicely in our pockets. I am no one to say that technology does not produce efficiency.
“BYOD [Bring Your Own Device]…potentially allows school districts to cut [there] IT budgets, possibly helping the movement make inroads there, but BYOD…represents a particularly dangerous trend for multiple reasons” (Geller, 2013).
...rk. This can prevent copyright infringement lawsuits, which have been targeting businesses recently because of their deep wallets. In some court cases e-mail or internet activity records of employees may be required, and the business can be punished if they’re unable to present the court with the requested records. In that scenario not having CMS can have serious consequences. Since the employer owns and provides the internet and e-mail services to the employee, they have the right to install whatever monitoring software they want to. In the case Smyth v. Pillsbury Co., it was decided that employees have no reasonable expectation to privacy at work (Eivazi, 2011)
It has stated that though BYOD (Bring Your Own Devices) improves organizations productivity, effectiveness, and decrease of disbursements, but the misuse of it is what concerns them. While the article listed many disadvantages of BYOD usage, it also mentioned helpful advices and policies to prevent any future security breaches. According to Lannon and Schreiber (2016), “A good policy will take into account the concerns of both the company and its employees. There is no one-size-fits-all approach. What works best for a particular employer will depend on the employer’s business” (para. 9-10). The article concluded that using BYOD could be a beneficial if employers implemented limitation that could be adaptable for the
Send unauthorized advertisements or solicitation emails. Sign up for a competitor’s services unless authorized. Our company has the right to monitor corporate emails. We also have the right to monitor websites employees visit on our computers.Disciplinary ActionEmployees who don’t conform to this employee internet usage policy will face disciplinary action. Serious violations will be cause for termination of employment, or legal action when appropriate. Examples of serious violations are: Using our internet connection to steal or engage in other illegal activities. Causing our computers to be infected by viruses, worms or other malicious software. Sending offensive or inappropriate emails to our customers, colleagues or partners.We advise our employees to: Use company-issued phones for business purposes only and preserve them in perfect condition. Surf the internet, text and talk on the phone only for a few minutes per day. Turn off or silence their phones when asked.We won’t allow employees to: Play games on the cell phone during working hours.Use their phones for any reason while driving a company vehicle. Use their cell phone’s camera or microphone to record confidential
The nature of our business requires us to have a flexible sales force. Because of that detail we need to be receptive to the needs of our mobile workforce. The most critical tool involved in their success is the ability to reliably connect and access our company networks. These connections can be from employees using company issued laptops or personal computers used from home or on the road.
Even as I sit here typing this paper, my own shiny, rectangular piece of molded plastic and metal lies inches away from my fingertips, beckoning me to use it. Looking out the window, one of the first sights I see are people walking with one hand up to their ear, evidence this technology is in use. I can count on one hand the number of adults I know who do not own one these mobile devices. People are now able to be virtually accessible almost anywhere at any time.
Employers in the workforce have the right to surveil their employees to motivate their workers, to hold their workers accountable, and to help with safety issues. Whether the employee is using a company laptop/phone or not, it is what exactly they are doing on that technology while at work that matters. It is important to have employee surveillance, as workers can use their time in office, to surf the web, do online shopping, check the news headlines, or go on social media all while being paid. Technology has incredible power for organizations, but only if used responsibly and effectively.
With the increasingly ubiquitous nature of mobile devices and online availability, including smartphones and tablets, there is also an understandable concern about the level of security that is afforded to such devices. This can be considered as increasingly important given the proliferation of policies such as BYOD (Bring Your Own Device) which is being used by diverse organizations as a way of lowering the cost of ownership for such devices while also leveraging the flexibility advantages that their utilization can bring. It is therefore an area of immense interest due to the changing and emerging nature of both the technology itself as well as the security concerns.
Since their initiation mobile phones have enjoyed an especially uptake among teenagers and young adults (Baron, 2010). Though Information Communication Technology (ICT), internet and outsourcing have changed the way every business is managed by providing capabilities and have helped small or large organizations to ever changing conditions, mobile technology is going to change the ways business is directed. The biggest challenge is for an enterprise to adopt mobile phone technology to create competitive advantage, improves productivity and profitability of the c...
The integration of a variety of information systems into business operations is necessary for growth in the dynamic business environment. These information systems can be minimized and fixed into mobile devices such as smartphones. The use of smartphones can play an important role in supporting business processes and operations, developing strategies for competitive advantage and decision making. These smartphones allow employees to be linked to the office, its data and resources, without being in the office. The use of smartphones for business processes can make the business more efficient and effective. They make it easier for co-workers to communicate among themselves and facilitates better communication between the business and its employees, customers, suppliers and even other businesses, and makes it possible in real-time. For CPS Energy and Lloyd’s Construction, although they were doing well, they realised that they could do much better. They needed to find new ways to further cut costs and maximize profitability. They both decided that the best way to do that was through the introduction of smartphones in their business operation.
fixture in everyday life then ever before, from housewives planning meals, to checking bank balances and paying bills, to looking up recipes. Children have the ability to do their homework, playing games and chatting to a friend on the internet. Business executives carrying PDA's, [personal digital assistants] with the ability to do their everyday business duties, from anywhere in the world that they may be at any time of the day or night.