It’s a Holiday Miracle: Real Tips for a Highly Effective BYO Program

Yes, Virginia – there is such a thing as a successful enterprise BYO program and it doesn’t take a Christmas miracle to get it implemented! While virtually everyone in IT believes that a well-implemented BYO program can boost productivity and reduce costs, overcoming the twin obstacles of employee trust and data privacy have effectively slowed the overall implementation of these programs to the detriment of both parties—call it the coal in the Christmas stocking effect.

In fact, according to a study published in CIO magazine, over 70% of employees do not trust their corporate IT group to keep personal information private, even as 80% of employees use their personal devices for work related tasks. Talk about a holiday bummer!

A column written by Software Advice’s Taylor Short—who researches and writes buyer’s guides for help desk and IT professionals—provides keen insight into how Intel overcame significant trust and privacy issues to implement what, by all accounts, is a highly effective BYO program. According to Short’s interview with Intel’s IT Senior Principal Engineer, Alan Ross, the following three guiding principles have enabled them to overcome the trust gap and deliver a BYO program that employees love, and IT can live with.

  1. Establish trust by clarifying what the IT team can see on an employee’s device. Being very precise and clear about those areas that are strictly off-limits to IT eliminates ambiguity and helps to clarify boundaries, thereby preventing unpleasant surprises down the line.
  2. Create security tiers that allow employees to adhere to their preferred level of security monitoring and measures. Everyone has different comfort levels with surveillance, and those levels should correspond directly to the types of tasks and information access they can perform with their device of choice. Setting reasonable limits based on consistently applied policies helps create clarity and ensures that employees use the right device for the right task, without sacrificing their sense of privacy or corporate security.
  3. Establish data containers that separate work and personal data to reassure employees their private information will stay private. As the inventor of the centrally managed localized container, we at Moka5 believe this is absolutely central to a successful BYO implementation. Using containerized data and applications that are isolated from each other allows what belongs to IT to be managed by IT, and what belongs to the employee to managed by the employee.

 

Since we know that many of you will soon be unwrapping a fancy new tablet or smartphone, we want to make sure you can maximize its use at your workplace; and, that your IT department doesn’t have to play Scrooge again for another year!

A very happy holiday to all from your friends at Moka5.