cimplBlog_banner.png

Cimpl Blog

Your Weekly Insights on How to Manage your Enterprise Digital Footprint.

Designing A BYOD Policy to Take Back Control

Posted by Caroline Le Brun | May 10, 2012 9:18 AM

BYOD devices

With employees bringing their own devices to work more-and-more, it is becoming difficult for HR and IT to understand the complex relationships between devices, services, providers, and their users; It's often confusing as to where to cross the line between personal and corporate usage.

In addition, more serious concerns are being raised that could potentially threaten the overall health of an organization, such as:

  • Security
  • Control over company data
  • Visibility
  • Costs

Luckily there are a few steps HR and IT management can take that move towards gaining control over the BYOD environment..

1.       Control Access to Company Information

  • Password Protect applications and devices
  • Restrict access based on role, division and geography
  • Embed manager approval mechanisms
  • Clearly communicate device support limitations for BYOD devices
  • Specify supported applications appropriate for corporate use

2.       Take Control Over Costs

  • Clearly Define reimbursement policy
    • Who is entitled to be reimbursed?
    • Type of services to be reimbursed (voice, data, voip, wifi)
    • How services are reimbursed ( Amount?  Frequency? Method ?)
    • Maximum limits ($$, usage)
    • Have users verify their cost and usage information

3.       Contain Security Risks

  • Set a timeframe for reporting lost or stolen devices
  • Prohibit jailbroken devices
  • Set conditions for datawipes (and to what extent)
  • Require users to use corporate approved anti-malware applications
  • Recommend approved apps for business use

4.       Manage Acceptable Use

  • Set guidelines for acceptable use
    • Can employees share devices (and apps) to their friends or family?
    • Guidelines for VPN connectivity

5.       Enforce Policy

  • Define procedures for policy breaches and unauthorized use.

As more companies begin to embrace (or rather accept the inevitable fate) the BYOD environment, we see increasing demand for software and services to manage cost and policy. Cimpl’s SaaS technology makes it easy to manage policy and enhance cost visibility throughout the company.

Request a live demo and features overview to see how to improve policy enforcement and cost control.

 Checklist

 

Topics: BYOD, Security, Tips, IT cost management, Cost control

Written by Caroline Le Brun

As a 16-year marketing veteran, Caroline’s experience extends across multiple industries. Since she joined Cimpl, her successful marketing campaigns have increased the company’s online and community presence, in addition to Cimpl’s footprint and appearances in new or traditional media (such as the Globe and Mail). Caroline is a specialist in communication and social media. She works closely with analysts to keep track of and adapt to the trends and changes in the industry of IT: Technology Expense management, IT cost optimization, Technology trends. Her leadership conducts Cimpl’s marketing team toward ever greater achievements. Caroline is also an exemplary citizen. Outside of work, she is involved in TEMIA, the Dorval Day Camp, and other community organizations. She has a Bachelor’s degree in Commerce from Concordia University and a Master Certificate in Integrated online Strategies from the University of San Francisco Intensive Development program.

Follow Us!

MonthlyExecutiveReportWebinar2
Self-Assessement_Checklist
Customer Stories: Access now!

Subscribe to our Blog