3. A case STUDY ABOUT..........
The
Pleasures
and Pitfalls
of BYOD
4. The term BYOD first entered common use in 2009, BYODÂ is
short for bring your own device. also called  (BYOT),  (BYOP),
and  (BYOPC).
In the conzumiraization of it, BYOD, is a phrase that has
become widely adopted to refer to employees who bring their
own computing devices â such as smartphones, laptops and
Tablets âto the workplace for use and connectivity on the
5. Today, employees expect to use personal smartphones and mobile devices at
work, making BYOD security a concern for IT teams.
Many corporations that allow employees to use their own mobile devices at work
implement a BYOD security policy that clearly outlines the company's position
and governance policy to help IT better manage these devices and
ensure network security.
6. Difficulties of BYOD
there are number of difficult issues related to this concept, especially when dealing with companyâs
information security leading to a vulnerable ground if not properly dealt with..
Difficulties of BYOD concept:
device
support
managing
cost,
data and
network
protection.
variety of device types and operation systems,
this requires a reasonable amount of IT resources
together with human resource involvement in order
to tackle information security in non-proprietary
software and numerous networking platforms.
7. Implementation of BYOD
⢠the implementation of BYOD in two companies,
IBM and Intel.
IBM did not successfully deploy BYOD is practice due to an
unorganized controlling measures.
Intel, with emphasis on its people, managed it by developing multiple
access and control levels for its registered devices, alongside with
several software and security tools to enhance the user satisfaction
9. Advantages
§All companies will receive benefits of a mobile workforce, even
though they not spend their money for it.
§ Avoid companies from wasting money for unnecessary devices
and mobile initiatives.
§Every employees will be feel comfortable because they using their
own device.
§Employees will feel easier because they donât have burden to carry
and manage multiple devices.
â˘
Q. 1: What are the advantages and disadvantages of allowing
employees to use their personal smartphones for work?
10. §The data of a company which is private and confidential will be leak out to public. This is legal and
liability risk for that company.
§Companies lose their consistency and efficiency when they have their own hardware, and control
their data and scale their own It infrastructure.
§Employees have to spend their own pocket money for buy the devices needed by their company
§In a company every employees using different kind of devices. So the operating systems available,
providing adequate technical support for every employees will be difficult.
â˘
Disadvantages
11. Management
⢠Many companies are integrating these âmobility expertsâ into core IT
functions and software development. Mobility experts can help a
company leverage mobility more effectively.
⢠Identify or analyze that employees have ability to own their devices.
⢠Make sure that employees agree to safe the companyâs confidential
information
â˘
2. What management, organization, and technology factors should be addressed when
deciding whether to allow employees to use their personal smart phones for work?
12. ⢠Limit business smartphone use to a single platform.
This made it easier to keep track to each mobile device and to roll out software
upgrades or fixes, because all employees were using the same devices, or at the
very least, the same operating system. For example, BlackBerry mobile devices
access corporate e-mail and data using a proprietary software and networking
platform that is companyâcontrolled and protected from outsiders.
⢠More than one type of mobile device and operating system
Firm need an efficient inventory management system that keeps track of which
devices employees are using, where the device is located, whether it is being used,
and what software it is equipped with.
Organization
13. ⢠A number of software products such as Sybase Afaria, Trellia,
Microsoft System Center Device Manager and Odyssey Software
Athena have emerged to help companies manage diverse mobile
platforms.
⢠Virtualization is an approach to mobile device management.
Companies can install software such as Citrix Systems XenDesktop
that runs Windows desktops and individual applications on any
device, regardless of operating system.
â˘
Technology
14. I agree. Because:
§it lower cost for the company
§ increase resource or information for the task given
§ easy to communicate among worker
§ develop bureaucratic
§paperless/ green technology
§ develop workers knowledge and practice
§ save money in communicate with client through video conference.
Q. 3: Allowing employees to use their own smartphone for work will
save the company money. Do you agree? Why or Why not?
15. LEARNING OF THE CASE
BYOD = BRING YOUR OWN DEVICE(S) means employees can bring their own smartphones, tablets
,laptops in the workplace use and connectivity on corporate networking
NEW TREND COMPANIES ARE FOLLOWING IN THEIR WORK PLACE FOR BETTER
PRODUCTIVITY AND MINIMIZING THEIR INVESTMENT IN PERCHESING DIVICES FOR
EMPLOYEES.ITS A BIG ADVANTAGE FOR SMALL COMPANIES IN THIS WAY THEY CAN SAVE
SOME MONEY .BIG COMPANIESS (like imp ,intel)ARE ALSO USING THIS BYOD. As it is
anywhere/anytime access to computing tools increase workplace productivity and raised effective employee
work time by 45-60 minutes.
BYOD is customization of IT use that can help in increasing employee job satisfaction and productivity
Like all other IT systems BYOD also have some drawbacks which is found when companies are using this
.BYOD need a significant level of IT recourses dedicated to manage and maintain large number of devices
within the corporation.it is again adding some It cost in corporation. Different smart devices use different kinds
of operating system which does not have any well developed administration and security tools. Which is a big
risk for firms to keep their internal confidential information safe because BYOD gives data flexibility and
mobility
â˘
16.
17. Risk in using BYOD
Theft or loss
of personal
devices)
Discloser of
corporate
sensitive data
in public
media
Loss of
control on
devices, data
and
employees
Use of less
reliable or
public or free
wife network
Uncontrolled
or
unauthorized
BYOD use
Malware
introduced in
corporate
data system
18. If any companyâs only moto is saving money and increasing productivity through
BYOD system than its going to be a massive deserter for this companies internal
privacy. Without a well developed corporate data monitoring policy using BYOD is not
a good idea at all. So make BYOD corporations need to keep this points in their mind
ĂTheir should be some it policy that will discourse employees to lick confidential data
ĂHave to restrict confidential data availability to all level of employees
ĂHave to keep tack of devices and monitor employees activity
ĂCorporation Should have control on employees device data saving system
ĂUnrecognized devices band for information safety etc.
â˘
19. THE PLEASURES AND PITFALLS OF BYOD
Application of learning in Bangladesh
20. Application of learning in Bangladesh
⢠BYOD ânew normalâ program is applicable in Bangladesh.
⢠As Blackberry is protected from outsiders. so we can use it.
⢠Some body use Apple IOS operating system also in limited areas.
⢠Companies need to handle all types of technical support.
⢠Information Security Management System (ISMS) is required to
implement in Bangladeshi companies.
â˘
21. Application of learning in Bangladesh
* Using personal drop box is a security problem.
* Access to IT data is important.
* BYOD program and Intel corporation are successful.
⢠Intel is popular in Bangladesh & offers more than 40 applications.
⢠Intel- BYOD makes employees happy
⢠Bangladeshi Companies will be benefited by using mobile devices.
22. RecommendationâŚâŚâŚ
ď Make clear and understandable policy for BYOD & defining minimum
security controls.
ď Make a plan to deal with lost and stolen devices.
ď Clearly announce what types of devices are being allowed for BYOD.
ď Keep personal information separate from corporate data and personal
information in private.
ď Always monitor inappropriate content on a personal device in the
workplace.
ď Use GFI LanGuard security for vulnerability assessment capabilities for
BYOD devices.
ď Set Up an Employee Exit Strategy.
â˘
23. ConclusionâŚâŚâŚ.
BYOD new term for organization & organization become confused
because organization do not sure it is good or bad for their working
environment. Though IBM fail but Intel successfully integrate BYOD
in business sector & Intel prove that it improves employees
productivity & reduce cost in business. In a USA base research 60+%
people says they are using their own device at work.
BYOD create some problem but there are many factors boosting the
BYOD and enterprise mobility. Most importantly, enterprises realized
that this change in the work culture increases productivity and
employee satisfaction. Further, BYOD helped enterprises to reduce
hardware cost also.