Posted by: Renodis
BYOD, Consumerization, Mobile, Telecom
Employees are more mobile than ever – they can work from just about anywhere they choose, and need less and less equipment in order to be productive. In addition to mobility, the convenience of using fewer devices to manage personal and professional tasks is fast becoming the norm for many employees, preferring one mobile device suited for all needs. Organizations are more challenged than ever to control, track and manage the amalgamation of mobile devices, service plans, and the ever expanding ocean of apps. Because of this, wireless expense management has become far more complicated than in decades past, when there were far fewer devices and plans to manage and where it was fairly common for the enterprise to adopt a top-down approach to wireless expense management.
BYOD, or ‘bring your own device’ is a program whereby employees utilize their own mobile devices to perform their day to day duties, while granting them access to necessary corporate information. Email, calendars, and required apps are made available to employees via their mobile devices, eliminating the need to be tied to their office or requiring them to use company-issued equipment.
Because of the recent consumerization of IT, the need for an effective BYOD policy is more evident than ever, as many employees use their own devices and laptops for work regardless of whether or not they receive support from their IT departments. An effective and strictly enforced BYOD policy will help mitigate the security risks this type of usage evokes. While BYOD programs have certainly enhanced mobility’s value to an organization, it has without question complicated the issue of productivity.
The arguments behind the BYOD trend suggest that employees are more productive by using their own device, cost is reduced because companies do not pay for the devices, and corporate IT departments do not have to devote resources toward the management of these devices.
However, when faced with the fact that more than 60% of companies do not even track the personal usage for their employees’ devices, productivity becomes objectionable. Thus, employees could be claiming any number of calls or minutes as reimbursable expenses and management wouldn’t be the wiser. If left unchecked, this lack of verification could have a cumulative, detrimental economic affect to the corporation.
In addition to the expense management issues, BYOD policies can expose a plethora of security liabilities often overlooked by management. In the unlikely event of a lawsuit where phone records need to be subpoenaed, the possibility of acquiring them is slim if an employee is using his or her own device. Since most companies reimburse employees for their business-related mobile usage, the likelihood of possible record falsification exists. In addition, the process of reimbursing an employee is a soft cost that needs to be added onto the actual cost of the reimbursable expense. According to a recent Aberdeen Group study, cellular telephone monthly reimbursement averages $70 per month, which is only $10 less than what average companies pay for wireless expenses. In addition, most reimbursements occur monthly through expense report processing, which costs an organization on average $29 to process, causing the expenditure to climb over the industry average.
To ensure productivity amongst employees who adhere to BYOD, corporations require strict and specific policies. A well thought out BYOD policy must address the issue of security. Whether they like it or not, employees should be required to create screen-lock passwords on any personal device that will be used to access corporate data. With just a swipe of the screen, an employee could unknowingly be exposing sensitive, confidential corporate information.
The issue of IT support for employee-owned devices can be complicated. This is where productivity can be stalled completely if an employee has an issue that he or she cannot resolve on his or her own. If it is a network or connectivity issue, will there be corporate IT support? What happens in the case of damaged hardware or broken equipment issues, or if the device is lost or stolen? Will IT support those types of problems, or is the employee required to resolve it on his own? Can the employee count on management to provide a ‘loaner’ device while their own is being repaired, or is the employee essentially out of commission until the original device is fixed? While these questions are debated, productivity will universally suffer. Not only is the employee affected, the IT department and management will need to devote time to fixing the issue so the employee can get back to work as quickly as possible.
To what degree will the corporation support the device in a BYOD environment? Since the combination of personal and professional programs and apps will exist on the device, what happens if a personal app creates a problem that interferes with the ability to access email and other company information? An effective BYOD policy should outline what apps will be allowed and which will be banned due to any potential security or legal risks whatsoever. What if a poorly written instant messaging client steals your organization’s address book? These are serious questions to address in a BYOD policy. Who owns the apps, programs, information and the device? Ownership becomes cumbersome in a situation where the device is lost or stolen and corporate IT needs to wipe the device clean of all information – including the employee’s personally stored information. Additionally, if an employee leaves or is terminated, who owns the data? If a BYOD policy is adopted, it must be clearly defined that the employee agrees to the consequences if data security is jeopardized in any way.
The question of whether or not productivity is enhanced with a BYOD policy is not easily answered. In an environment that has a strict policy surrounding the usage of personal devices is much better poised for increased productivity than those corporations with loosely enforced guidelines. An effective BYOD policy will address security, clearly define allowable apps, and outline support processes to keep an employee as productive as possible.
To get started on crafting an effective BYOD policy, contact Renodis.