Bring Your Own Device (BYOD) is a term used to describe the practice of allowing employees to connect to corporate networks and information systems with personal digital devices. Devices aren’t officially provisioned by the IT department. Personal devices may be used for official business or for personal use (e.g. connecting to corporate WiFi). Such personal devices can include smartphones, tablets, laptop computers, and smart watches. These personal devices may connect to corporate email accounts, customer databases, customer account management dashboards, or other company information systems.
BYOD has grown in popularity as more organizations move to allow flexible working arrangements that include working from home, working during travel, or working during the commute to the office. Flexible working arrangements that allow BYOD can result in productivity gains for employees. Employees have the freedom to choose the devices they use for work-related tasks. Device familiarity can also enable employees to work more efficiently, without the need for additional training. Employees have the opportunity to design their workflow on their own devices.
Organizations that allow BYOD may also offer technical support for employees connecting to corporate data resources. Employee selected devices will differ across the workforce. Supporting a multitude of devices and operating systems can be a challenge for IT departments. Individual employees tend to view BYOD as it relates to personal privacy and productivity. Organizations contend with data privacy and device security concerns.
BYOD presents many security risks since personal devices aren’t company owned or controlled. Personal device security becomes the responsibility of the employee. Not all employees will possess the same level of security awareness. To manage some of this risk, organizations may choose to develop and enforce a mobile device management policy that restricts access to certain systems from personal devices. Organizations that have not implemented a formal BYOD policy may consider personal device usage a form of unsanctioned technology use, commonly referred to as shadow IT. While BYOD can be challenging, it also offers multiple business benefits.
What are the business benefits of Bring Your Own Device (BYOD)?