Thursday, September 6th, 2012
With the popularity of Bring-Your-Own-Devices (BYOD) in the workplace, there is an increasing need for organisations to implement a mobile device policy. Security should never be taken lightly. Simple measures can be taken to prevent a large scale security disaster.

If you already have a BYOD initiative occurring in your organisation or are thinking of implementing one, you will need to ensure that you have a mobile device policy in place and an employee agreement that covers BYOD. It is extremely important that potential issues are identified beforehand and agreements are formalised in writing.

“When developing policies for the implementation of BYOD, organisations need to be mindful of potential issues and establish guidelines that need to be agreed upon. These items then need to be documented in a formal written agreement,” commented Kareem Tawansi, CEO of software development provider, Solentive Software.

So what are some of the issues that your policy and employee agreements should cover?

“All mobile device policies should cover concerns such as operating system versions, software that is installed and run on the mobile device, who is responsible for backing up the device (the employee or the IT department) and what happens if the device is lost or stolen,” advised Kareem.

There are tools on the market to help organisations ensure that policies are being adhered to by their employees. These mobile device management (MDM) tools enable the IT department to stipulate access and usage. For example, you can specify a requirement for user authentication and rules regarding storing company data on the devices and when that information should be removed. The tool can also display which employees are abiding by the policy, those that have tried to jailbreak the device and what actions it has taken against those that have not followed policy to protect company data. Such actions may include removing access to company email or the company’s virtual private network (VPN).

When it comes to BYOD, it is important that your organisation is proactive in order to prevent a major security and public relations disaster. There are tools available that can help enforce your policies. An ad-hoc approach to security puts your business at risk.

Contact Profile

Solentive Software

Solentive Software specialises in custom software development and systems integration. You'll benefit from our real-world expertise in software built in .NET and Java that is task-matched for affordability and designed to grow with your business.
Kareem Tawansi
P: 1300 55 30 50


BYOD policy, Solentive Software CEO, Kareem Tawansi, Bring-Your-Own-Devices, IT department, mobile device policy, BYOD



More Formats

View QR Code