Verified Document

Bring Your Own Device Research Paper

Issues Identification Incompatible devices – There is a distinct possibility that employees may choose to utilize devices which are incompatible with an organization’s network and security infrastructure.

Personal Usage – If employees are allowed to use their personal devices in work settings, there is the potential to use them for personal use during allotted work time. They may have specific programs on these devices conducive to doing so.

Maintenance – There can become pecuniary disputes between management and employees regarding the maintenance of personal devices used for work. Employees may want to subsidize battery replacements and other maintenance.

Outside of Firewall – The primary security issue is that these devices are unprotected once they leave the physical confines of an organization and its firewall, rendering organizational data vulnerable.

Theft – Theft is a principal concern with BYOD policies, since if personal devices are stolen users may be able to access sensitive workplace data, compromising an organization’s security.

Loss – Loss of a device is a similar concern. If employees were to lose mobile devices with workplace data, their business may lose valuable information for operations or analytics purposes.

Additional Overhead – There can be an number of expenses associated with BYOD, including “more security and tool management costs” and “more licenses” (Karnacus).

Regulatory Compliance – Depending on the vertical...

Extra workplace use may violate these.
Loss of Privacy – Strict measures for securing and managing personal devices used in the workplace may make employees feel as though their privacy and personal lives are becoming compromised (Phifer).

Distractions – The incorporation of personal devices for work use may prove distracting to users.

Bring Your Own Device (BYOD) Policy

Introduction

The purpose of this policy is to create a harmonious environment in which employees can optimize both convenience and productivity by utilizing their own mobile devices for work purposes. This policy, then, will identify the parameters to which employees must adhere in terms of managing those devices. The policy will encompass aspects of the usage of these devices within and outside of the workplace. Necessarily, it will address certain facets of the personal lives of employees in relation to their devices.

Effective Date

The effective date of this policy is the first of the year—which will give adherents plenty of time to make the necessary adjustments for compliance.

Audience

The audience for this policy is broad. It will include employees as well as individuals who are part of upper level management. Essentially, it is applicable to all those with computing needs at this organization.

Background 

It is necessary to establish a BYOD policy because of the risks that are inherent…

Sources used in this document:

Works Cited

Kanaracus, Chris. Half of companies will require BYOD by 2013, Gartner says. www.pcworld.com 2013. Web. https://www.pcworld.com/article/2036980/half-of-companies-will-require-byod-by-2017-gartner-says.html

Phifer, Lisa. BYOD Security Strategies: Balancing BYOD Risks and Rewards. www.techtarget.com 2013. Web. http://searchsecurity.techtarget.com/feature/BYOD-security-strategies-Balancing-BYOD-risks-and-rewards

Whittaker, Zach. BYOD: From Optional to Mandatory by 2017, says Gartner. www.zdnet.com 2013. Web. http://www.zdnet.com/article/byod-from-optional-to-mandatory-by-2017-says-gartner/











2) As you know that your boss is going to do whatever he wants, regardless of your concerns, prepare a BYOD policy for the organization that identifies at least 10 controls to the concerns that you raise in the paper (be certain to use "strong" policy language) to which you expect users to adhere. Use the template provided to you in the Course Content section and be certain that you address all of the sections in the template (remove the yellow highlights). Additional sample policy template can be found on the SANS website here: https://www.sans.org/security-resources/policies/

Cite this Document:
Copy Bibliography Citation

Related Documents

Bringing Amazon.com to Chile Sizing
Words: 1663 Length: 4 Document Type: Research Paper

Amazon may have to also stock books and literature that pertains to the country and the education-based books both in Spanish and English. There may also be some online payment hassles with banks and these problems have to be solved and can be solved by Amazon. The delivery of books to the place may also create logistics problems though it is not a great issue as far as Chile

Devices and Childhood Obesity Interventions
Words: 1504 Length: 4 Document Type: Thesis

This approach can take the focus off of the child, and instead treats the child's environment as a way of holistically treating his or her condition. Also, if time and the nurse's relationship allows for the use of such an open-ended tool, a great deal of information can be yielded about the family system that cannot by other models. Works Cited Chen, J.L, C.H. Yeh, & C. Kennedy. (2007, Jun 22).

Bringing Life to Art
Words: 998 Length: 3 Document Type: Essay

The exhibition of Valentin de Boulogne at the Metropolitan Museum of Art is impressive for a number of reasons. Firstly, it has a significant number of paintings of this artist whose work is decidedly difficult to find. Secondly, it displays these works in a manner in which there are a number of thematic devices within them that become manifest to the viewer. Finally, the Met is displaying these works for

Mobile Devices on Cyber Security: The Modern
Words: 1243 Length: 4 Document Type: Essay

Mobile Devices on Cyber security: The modern society including corporate environments has been characterized by the proliferation of mobile devices. The increased use of these devices is attributed to the significant opportunities they bring and their contribution towards enhanced communication. However, the increased use of mobile devices has been accompanied by considerable concerns regarding the privacy of personal information and sensitive corporate data that are stored on them. In essence,

Mobile Device Security Factors and Implementation of
Words: 1765 Length: 6 Document Type: Essay

Mobile Device Security Factors and Implementation of Mobile Device Security Mobile devices have become ubiquitous and its usage is only going up from here. With such an extensive usage of mobile devices for personal and business use, its security becomes an important question. Most devices ado not have the security mechanism in place in the case of a theft, loss or intentional breach of the network and this makes the data present

Hand Held Devices and PDA's in American Health Care
Words: 1901 Length: 6 Document Type: Research Paper

Healthcare Hand-held devices and portable digital assistants (PDAs) are being integrated into the health care setting in the United States. It is important to understand which devices are being used, how they are being used, what they are being used for, and why. Understanding the role that hand-held devices and other portable electronics play in health care can help to inform organizational policy, and help health care administrators better implement electronic

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now