HOME

TheInfoList



OR:

Bring your own device (BYOD )—also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own personal computer (BYOPC)—refers to being allowed to use one's personally owned device, rather than being required to use an officially provided device. There are two major contexts in which this term is used. One is in the mobile phone industry, where it refers to carriers allowing customers to activate their existing phone (or other cellular device) on the network, rather than being forced to buy a new device from the carrier. The other, and the main focus of this article, is in the workplace, where it refers to a policy of permitting employees to bring personally owned devices (laptops, tablets, smartphones, etc.) to work, and to use those devices to access privileged company information and applications. This phenomenon is commonly referred to as IT consumerization. BYOD is making significant inroads in the business world, with about 75% of employees in high-growth markets such as Brazil and Russia and 44% in developed markets already using their own technology at work. Surveys have indicated that businesses are unable to stop employees from bringing personal devices into the workplace. Research is divided on benefits. One survey shows around 95% of employees stating they use at least one personal device for work.


History

The term was initially used by a VoIP service provider BroadVoice in 2004 (initially for AstriCon, but then continued as a core part of the business model) with a service allowing businesses to bring their own device for a more open service provider model. The phrase and the "BYOD" acronym is a take-off on "
BYOB BYOB or BYO is an initialism and acronym concerning alcohol that means "bring your own bottle" or "bring your own booze" or "bring your own beer". BYOB is stated on an invitation to indicate that the host will not be providing alcohol and that gu ...
", a party invitation term first recorded in the 1970s, standing for "bring your own beer/booze/bottle". The term BYOD then entered common use in 2009, courtesy of Intel, when it recognized an increasing tendency among its employees to bring their own smartphones, tablets and laptop computers to work and connect them to the corporate network. However, it took until early 2011 before the term achieved prominence, when IT services provider Unisys and software vendor
Citrix Systems Citrix Systems, Inc. is an American multinational cloud computing and virtualization technology company that provides server, application and desktop virtualization, networking, software as a service (SaaS), and cloud computing technologies. ...
started to share their perceptions of this emergent trend. BYOD has been characterized as a feature of the "consumer enterprise" in which enterprises blend with consumers. This is a role reversal in that businesses used to be the driving force behind consumer technology innovations and trends. In 2012, the U.S.
Equal Employment Opportunity Commission The U.S. Equal Employment Opportunity Commission (EEOC) is a federal agency that was established via the Civil Rights Act of 1964 to administer and enforce civil rights laws against workplace discrimination. The EEOC investigates discrimination ...
adopted a BYOD policy, but many employees continued to use their government-issued BlackBerrys because of concerns about billing, and the lack of alternative devices.


New trends

The proliferation of devices such as tablets and smartphones, now used by many people in their daily lives, has led to a number of companies, such as IBM, to allow employees to bring their own devices to work, due to perceived productivity gains and cost savings. The idea was initially rejected because of security concerns but more and more companies are now looking to incorporate BYOD policies. According to a 2018 study, only 17 percent of enterprises provide mobile phones to all employees, while 31 percent provide to none and instead rely entirely on BYOD. The remaining 52 percent have some kind of hybrid approach where some employees receive corporate mobile phones and others are expected to bring their own.


Prevalence

The Middle East has one of the highest adoption rates (about 80%) of the practice worldwide in 2012. According to research by
Logicalis Logicalis is a United Kingdom-based information and communications technology (ICT) infrastructure and service provider. The company is owned by Johannesburg Johannesburg ( , , ; Zulu and xh, eGoli ), colloquially known as Jozi, Joburg, ...
, high-growth markets (including Brazil,
Russia Russia (, , ), or the Russian Federation, is a transcontinental country spanning Eastern Europe and Northern Asia. It is the largest country in the world, with its internationally recognised territory covering , and encompassing one-eight ...
, India,
UAE The United Arab Emirates (UAE; ar, اَلْإِمَارَات الْعَرَبِيَة الْمُتَحِدَة ), or simply the Emirates ( ar, الِْإمَارَات ), is a country in Western Asia (The Middle East). It is located at th ...
, and Malaysia) demonstrate a much higher propensity to use their own device at work. Almost 75% of users in these countries did so, compared to 44% in the more mature developed markets. In the UK, the
CIPD The Chartered Institute of Personnel and Development (CIPD) is an association for human resource management professionals. Its headquarters are in Wimbledon, London, England. The organisation was founded in 1913 - it is the world's oldest associa ...
Employee Outlook Survey 2013 revealed substantial variations by industry in the prevalence of BYOD.


Advantages

While some reports have indicated productivity gains by employees, the results have drawn skepticism. Companies such as Workspot believe that BYOD may help employees be more productive. Others say that using their own devices increases employee morale and convenience and makes the company look like a flexible and attractive employer. Many feel that BYOD can even be a means to attract new hires, pointing to a survey that indicating that 44% of job seekers view an organization more positively if it supports their device. Some industries are adopting BYOD more quickly than others. A recent study by
Cisco Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, ...
partners of BYOD practices found that the education industry has the highest percentage of people using BYOD for work, at 95.25%. A study by IBM says that 82% of employees think that
smartphones A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, which ...
play a critical role in business. The study also suggests that the benefits of BYOD include increased productivity, employee satisfaction, and cost savings for the company. Increased productivity comes from a user being more comfortable with their personal device; being an expert user makes navigating the device easier, increasing productivity. Additionally, personal devices are often more up-to-date, as the devices may be renewed more frequently. BYOD increases employee satisfaction and job satisfaction, as the user can use the device they have selected as their own rather than one selected by the IT team. It also allows them to carry one device rather than one for work and one for personal use. The company can save money as they are not responsible for furnishing the employee with a device, though this is not guaranteed.


Disadvantages

Although the ability of staff to work at any time from anywhere and on any device provides real business benefits, it also brings significant risks. Companies must deploy security measures to prevent information ending up in the wrong hands. According to an IDG survey, more than half of 1,600 senior IT security and technology purchase decision-makers reported serious violations of personal mobile device use. Various risks arise from BYOD, and agencies such as the UK
Fraud Advisory Panel The Fraud Advisory Panel is a UK charitable organisation. Incorporated in 2001, the Panel focuses on offering advice and education to the general public on how to mitigate and avoid fraud. Panel members have provided evidence to the House of Comm ...
encourage organisations to consider these and adopt a BYOD policy. BYOD security relates strongly to the
end node problem The end node problem arises when individual computers are used for sensitive work and/or temporarily become part of a trusted, well-managed network/cloud and then are used for more risky activities and/or join untrusted networks. (Individual comp ...
, whereby a device is used to access both sensitive and risky networks and services; risk-averse organizations issue devices specifically for Internet use (termed Inverse-BYOD). BYOD has resulted in data breaches. For example, if an employee uses a smartphone to access the company network and then loses that phone, untrusted parties could retrieve any unsecured data on the phone. Another type of security breach occurs when an employee leaves the company; they do not have to give back the device, so company applications and other data may still be present on their device. Furthermore, people may sell their devices and forget to wipe sensitive information before the handover. Family members may share devices such as tablets; a child could play games on a parent's tablet and accidentally share sensitive content via email or other means such as Dropbox. IT security departments wishing to monitor usage of personal devices must ensure that they monitor only activities that are work-related or access company data or information. Organizations adopting a BYOD policy must also consider how they will ensure that the devices which connect to the organisation's network infrastructure to access sensitive information will be protected from malware. Traditionally if the device was owned by the organisation, the organisation can dictate for what purposes the device may be used or what public sites may be accessed from the device. An organisation can typically expect users to use their own devices to connect to the Internet from private or public locations. The users could be susceptible from attacks originating from untethered browsing or could potentially access less secure or compromised sites that may contain harmful material and compromise the security of the device. Software developers and device manufacturers constantly release security patches to counteract threats from malware. IT departments that support organisations with a BYOD policy must have systems and processes to apply patches protecting systems against known vulnerabilities of the devices that users may use. Ideally, such departments should have agile systems that can quickly adopt the support necessary for new devices. Supporting a broad range of devices obviously carries a large administrative overhead. Organisations without a BYOD policy have the benefit of selecting a small number of devices to support, while organisations with a BYOD policy could also limit the number of supported devices, though this could defeat the objective of allowing users the freedom to choose their preferred device freely. Several market and policies have emerged to address BYOD security concerns, including mobile device management (MDM), containerization and app virtualization. While MDM allows organizations to control applications and content on the device, research has revealed controversy related to employee privacy and usability issues that lead to resistance in some organizations. Corporate liability issues have also emerged when businesses wipe devices after employees leave the organization. A key issue of BYOD which is often overlooked is BYOD's phone number problem, which raises the question of the ownership of the phone number. The issue becomes apparent when employees in sales or other customer-facing roles leave the company and take their phone number with them. Customers calling the number will then potentially be calling competitors, which can lead to loss of business for BYOD enterprises. International research reveals that only 20% of employees have signed a BYOD policy. It is more difficult for the firm to manage and control the consumer technologies and make sure they serve the needs of the business.Kenneth C. Laudon, Jane P. Laudon, "Management of Information Systems" Firms need an efficient inventory management system that keeps track of the devices employees are using, where the device is located, whether it is being used, and what software it is equipped with. If sensitive, classified, or criminal data lands on a U.S. government employee's device, the device is subject to confiscation. Another important issue with BYOD is of scalability and capability. Many organisations lack proper network infrastructure to handle the large traffic generated when employees use different devices at the same time. Nowadays, employees use mobile devices as their primary devices and they demand performance which they are accustomed to. Earlier smartphones used modest amounts of data that were easily handled by wireless LANs, but modern smartphones can access webpages as quickly as most PCs do and may use radio and voice at high bandwidths, increasing demand on WLAN infrastructure. Finally, there is confusion regarding the reimbursement for the use of a personal device. A recent court ruling in California indicates the need of reimbursement if an employee is required to use their personal device for work. In other cases, companies can have trouble navigating the tax implications of reimbursement and the best practices surrounding reimbursement for personal device use. A 2018 study found that 89 percent of organizations with a BYOD policy provide a full or partial stipend to compensate employees for their mobile phone expenses. On average, these organizations paid employees $36 per month as a BYOD stipend.


Personally owned, company enabled (POCE)

A personally owned device is any technology device that was purchased by an individual and was not issued by the agency. A personal device includes any portable technology such as cameras, USB flash drives, mobile wireless devices, tablets, laptops or personal desktop computers.


Corporate-owned, personally enabled (COPE)

As part of enterprise mobility, an alternative approach are corporate-owned, personally enabled devices (COPE). Under such policies, the company purchases and provides devices to their employees, but the functionality of a private device is enabled to allow personal usage. The company maintains all of these devices similarly to simplify its IT management; the organization will have permission to delete all data on the device remotely without incurring penalties and without violating the privacy of its employees.


BYOD policy

A BYOD policy must be created based on the company's requirements. BYOD can be dangerous to organizations, as mobile devices may carry malware. If an infected device connects to the company network, data breaches may occur. If a mobile device has access to business computing systems, the company's IT administrator should have control over it. A BYOD policy helps eliminate the risk of having malware in the network, as the management team can monitor all contents of the device and erase data if any suspicious event is captured. BYOD policies may specify that the company is responsible for any devices connected to a company network.


Additional policies

BYOD policies can vary greatly from organization to organization depending on the concerns, risks, threats, and culture, so differ in the level of flexibility given to employees to select device types. Some policies dictate a narrow range of devices; others allow a broader range of devices. Related to this, policies can be structured to prevent IT from having an unmanageable number of different device types to support. It is also important to state clearly which areas of service and support are the employees' responsibilities versus the company's responsibility. BYOD users may get help paying for their data plans with a stipend from their company. The policy may also specify whether an employee is paid overtime for answering phone calls or checking email after hours or on weekends. Additional policy aspects may include how to authorize use, prohibited use, perform systems management, handle policy violations, and handle liability issues. For consistency and clarity, BYOD policy should be integrated with the overall security policy and the acceptable use policy. To help ensure policy compliance and understanding, a user communication and training process should be in place and ongoing.


See also

* List of Mobile Device Management Software *
Bring your own encryption Bring your own encryption (BYOE) also known as bring your own key (BYOK) is a cloud computing security marketing model that aims to help cloud service customers to use their own encryption software and manage their own encryption keys. BYOE allows c ...
*
Bring your own operating system Bring your own operating system (BYOOS) relates to the practice of providing PC computers, usually without internally installed disks, so users can bring their own operating system (commonly on USB pen drives) and use the supplied hardware with t ...
* Mobile security *
One-to-one computing In the context of education, one-to-one computing (sometimes abbreviated as "1:1") refers to academic institutions, such as schools or colleges, that allow each enrolled student to use an electronic device in order to access the Internet, digital ...
*
Remote mobile virtualization Remote mobile virtualization, like its counterpart desktop virtualization, is a technology that separates operating systems and applications from the client devices that access them. However, while desktop virtualization allows users to remotely ac ...


References

{{Reflist, 25em Mobile phones Mobile computers Mobile telecommunication services Mobile device management