Twoja przeglądarka nie obsługuje JavaScript.
Nie uzyskasz więc dostępu do niektórych jej funkcjonalności.
Aby w pełni cieszyć się używaniem strony Intratel
włącz obsługę JavaScript w swojej przeglądarce.
 
 
 
 

Developing corporate BYOD policy

There has been written a bit about the ‘bring your own device’ (BYOD) trend already. But today following the searchconsumerization.techtarget.com portal, I would like to very briefly write about the principles that should be provided to employees who take their mobile devices home - or vice versa - bring their own devices to work and connect to corporate network.  

 

Every organization or a company should create their specific BYOD policy detailed to suit their internal needs. There are three general rules in defining the policy: how users should protect their devices, what data and applications will they be able to access and what happens when an employee loses his device or leaves the company?               

 

As BYOD means the use of different types of devices, multiple use cases and different users to create a unified BYOD policy, decision makers from both IT and other departments should carefully consider the following issues.           

 

The key issue in the BYOD policy is to determine which functions user can access and what behaviors are acceptable by the organization. This is primarily to eliminate probability that users keep illegal materials or another company’s data on their devices.           

 

The range of devices from among which users may choose should be limited due to support costs and the risk of admitting random smartphones or tablets to the corporate network. The relatively wide and therefore sufficient range of platforms that support these devices today are  Android, iPhone and BlackBerry.           

 

The BYOD procedures should specify the manner and extent of reimbursement of costs that users generate – what part will be reimbursed by the company, and which will not. It should be clearly stated that the cost allocation will be based on a user’s detailed bill return will be specified portion of each bill or a specific fixed amount.  

 

Another issue is to specify a list of prohibited and preferably also a closed list of allowed applications from which users can use. It cannot be absolutely certain, of course, but it will certainly help in protecting the security and integrity of corporate IT resources. The overall configuration of the device software is the key to proper operation of mobile IT, so BYOD policy should also govern the use of anti-virus and other security software firewall settings.              

 

Software for mobile device management enables IT staff to configure, secure and monitor mobile devices and should be included in the policy on use of mobile devices.  Having described BYOD policy must seek to sign agreements with all mobile users. Agreement, increase the level of user awareness as to how critical IT operations are on a mobile system and give us protection against breach of BYOD policy.          

 

The process of creating policies for the use of corporate resources on mobile devices by employees poses challenges, like defining the use of the device for personal and business. For this reason, the mere creation of procedures should be done in consultation with a lawyer. BYOD policy formation especially in large companies may be complex and requires the involvement of various resources. Topic Experts say, however, that its practical value is there and it can also contribute to improved cost-efficiency of IT processes.      

 

http://searchconsumerization.techtarget.com/tip/How-to-create-a-BYOD-policy?asrc=EM_NLN_16962478&track=NL-544&ad=868121&