CyberTalk

What is BYOD?

Phone, connection to the internet and security concept

 

Bring Your Own Device (BYOD) refers to the phenomena of employees bringing personal devices to work for work purposes. Employees may use these devices to access organizational networks and to potentially share sensitive or confidential business data.

Personal devices include laptops, tablets, smartwatches, USBs or other electronics. The policies are not generally limited to phones. When such policies are limited to phones, organizations may chose to refer to the program as a bring your own phone policy or as a mobile device security policy.

Organizations differ in their approaches to BYOD. Some organizations embrace the concept, while others are wary of corresponding security and productivity concerns. Some CISOs view personal devices as part of “shadow IT”, or hardware that the organization is not responsible for. ​

How has BYOD evolved?

Twenty years ago, C-levels began using Blackberries or similar early-stage phones, for work purposes, both at work and elsewhere. As the convenience of checking email on a personal phone became clear and smartphones grew more ubiquitous, other employees began to follow suit. These days, it’s nearly impossible to stand in the way of the working-from-a-phone trend, so many employers accommodate or embrace it.

What are the stats around BYOD? 

What are the benefits of BYOD for employers?

   What are the drawbacks of BYOD for employers?

What are the benefits of BYOD for employees?

What are the drawbacks of BYOD for employees?

The legal implications of BYOD? 

If an employee’s device is lost or stolen and contains organizational data, the organization is responsible for any data loss or data leakage. Employees often retain company credit card numbers within ride-sharing apps, or otherwise have company information on-hand for assorted legitimate reasons. Mobile Device Management (MDM) solutions can be integrated into devices in order to minimize risk and to preserve the integrity of an organization’s assets.

Further legal implications of BYOD?

Potential violations of the Fair Labor Standards Act (FLSA) may occur. According to the FLSA, non-exempt employees must be correctly compensated for all work activities completed outside of scheduled work hours.

State laws dictate whether or not organizations must compensate employees for use of personal devices on behalf of work. For example, California Labor Code Section 2802 places the onus of at least partial cost-coverage on employers.

Something to be aware of in this situation: If an employer covers an employee’s phone bill or other device-related costs, but then factors these costs into the wage-rate, bringing pay below minimum wage, employees are liable to file a class-action lawsuit over inadequate pay.

Should my organization establish a formal BYOD policy?

Organizations should consider their unique business needs and determine whether or not a BYOD policy makes sense. Review these strategic business considerations:

Be sure to offer employees formal, written information about exactly how your policy operates. If people have questions or concerns, ensure that you can direct them to a knowledgeable individual who can investigate unique situations, and make decisions that align with company priorities.

BYOD raises many questions, such as:

How can organizations address BYOD security? 

Organizations should ensure that they have policies and best practices in-place around BYOD. Employees need to clearly understand whether or not they can use personal devices for work purposes, and if so, how to do so in a secure way. Managing the BYOD risk is a foundational aspect of workplace security.

All BYOD security measures should be integrated within the overarching IT security program. It’s critical for information technology leaders to determine how much support they can provide for employees’ devices. In providing security, they must also ensure that the organization does not overstep or intrude on personal privacy.

For more on BYOD security, be sure to visit Cyber Talk.

Exit mobile version