“According to Forrester Research, 78% of the enterprises are instituting BYOD programs, with 60% including smartphones, while 47% include tablets and laptops. 70% said that improved worker productivity is the key reason for BYOD”. Motorola, Secure Access Partner Brief. With the growing number of BYOD participants questions related to the corporation’s access of personal information continue to be asked. Questions like:
- Is my employer tracking my movements during work hours or after?
- If my employer “wipes” my device what happens to my personal information (pictures, music, address book, etc.)?
- Can my employer view my browsing history?
- Can my employer seize my device to discover or preserve evidence related to a legal action?
The key to answering many of these questions is directly related to the capabilities of your MDM tool and the policies that are created to support your company’s BYOD program. In order to gain the greatest benefits from a BYOD program it is advised to thoroughly examine the purpose of the program and define a set of policies that ensure the business objectives while preserving each participant’s personal information. This discussion is too broad to cover in a blog posting; however, the good news is that MDM (mobile device management) tools are rapidly releasing new features to address these types of concerns. As a final thought, once you have defined your BYOD policies it is recommended that you publish a Mobility Users Policy Guide and make this available to all program participants. Think of this guide in the same manner as your Human Resource (HR) Manual in that it is the first document that an employee will reference for information related to the company’s implementation and support of mobile devices.