Categories
Uncategorized

BYOD Roundup: Mobility Policies and CTS’ Mobility Policy Guidebook, Samsung Knox, Making BYOD More Appealing to Users

byod t-shirt

Create a Mobility Policy, Educate Your Employees About It, and Get Them to Sign Off On It

“Whatever your BYOD policy is,” goes the second of four tips in the PC World article When alien hardware invades: 4 keys to BYOD success. “you should define it in a written document.” It’s an important point, and one with which we agree. At my company, CTS, we recommend that you…

Create a mobility policy.

This is a written set of rules governing the use of mobile devices for work, whether the devices are owned by your organization or by your employees, and covers company-liable, COPE, BYOD and everything in between. Note that this is something you can’t do in isolation, but in consultation with your employees: not just the IT department, but also management, various business units, HR, legal and so on. You should also consider the various levels of mobility in your company: the needs of “road warriors”, who spend most of their time on the road, vs. your office core, who spend most of their time at the office (but can easily spend half their time away from their desks at meetings) differ greatly, but they both need to be accounted for. CTS has a Mobility Policy Guidebook to help you figure out what should go into your organization’s mobility policy.

Once you’ve created a mobility policy, educate your employees.

Mobility policies can sometimes be lengthy documents, and it’s all too likely that people will simply glance at at, say “I’ll read this later” and file it away in that Place Where Things Are Never Heard From Again. This is bad, especially considering that mobile technology is a new, rapidly-changing thing, and BYOD is also a new, rapidly-changing thing; it’s likely that many of your employees’ assumptions about mobile devices at work are wrong (consider the case of Amanda Stanton, whose employers remote-wiped her iPhone). Hold info sessions to explain the broad strokes of your mobility policy, and more importantly, the rationale behind the rules in the policy. CTS’ Mobility Policy Guidebook not only helps you set up the rules in your mobility policy; it also explains the rationale behind them.

Have your employees sign mobility agreements.

signing an agreementThese agreements, typically handled by HR, specify the terms and conditions by which employees agree to abide. Some organizations use a single agreement, while others break them up into documents such as:

  • a Mobile Acceptable Use Policy agreement,
  • a Mobile Remote Wipe Policy agreement,
  • and in the case where the organization helps cover part or all of an employee’s mobile bills, a Mobile Reimbursement Policy agreement.

Once again, CTS’ Mobility Policy Guidebook covers these.

Want to know more about CTS’ Mobility Policy Guidebook? Contact us at sales@ctstech.net!

Samsung Knox

samsung knoxSamsung’s courtship of the enterprise market continues with the announcement of Knox, their containerization solution that lets you split your phone into two different sides: one for work, and one for the rest of your life. Each side is under a completely different “jurisdiction”, with your company’s IT department having control of the work side, while you have full control over the “rest of your life” side, free to install whatever apps you want.

Here’s an excerpt from an article on Knox written by a Samsung partner, Centrify:

…even in the case that the device itself has no unlock passcode and no corresponding security policies, the secure container of business apps on the phone cannot be accessed unless the appropriate passcode is entered. And inside the container the user is able to share data between business apps (e.g. copy and paste text from an email into a CRM record), but corporate IT would of course not want data inside the container copy-and-pasted onto a non-container app such as Twitter or Facebook — i.e. data leak prevention. And of course corporate IT should have the ability to wipe the container if the device is lost or the employee leaves the organization, but not delete music, photos, personal apps, etc. that the employee put on the phone.

Knox works on any SAFE (SAmsung For Enterprise) -certified devices. Currently, there are only two such devices: the Galaxy S III and the Galaxy Note II.

Ten Ways to make BYOD More Appealing to Users

10

TechRepublic have ten suggested ways to make BYOD more appealing to those users who are still a little reluctant. The full details are in the article, but we thought we’d list those ten ways in summary:

  1. Tell them that BYOD means more freedom. BYOD allows users the freedom to do their work anytime, and in any place. This means that they can be productive while on the go, whether they’re on their commute, while waiting to pick up their kids from school, or doing other things that wouldn’t be possible in the age before mobile technology. The TechRepublic article also talks about more time to use social networks, but we feel that the real benefits come from getting stuff done and not being stuck at the office.
  2. Allow longer work lunches. If employees take their devices to lunch, why not take advantage of those “any time, anywhere” capabilities and let them take longer lunches — which are often used to run mid-day errands — as long as they’re being productive.
  3. Provide software incentives. “More than likely, your company has access to software titles at lower prices than do your employees. Why not extend these prices to your employees as an added incentive for BYOD?”
  4. Allow them to take advantage of deals through hardware purchases through the company. “Similar to the software incentive, you probably can allow your employees to purchase the hardware they will use in the BYOD program through your own channels.”
  5. Give them an end-of-year bonus. “You’ve saved money by having your employees bring in their own devices. There is no reason why you can’t pass on a fraction of those savings to participating BYODers.”
  6. Offer more telecommuting opportunities. Give BYODers the opportunity to occasionally telecommute.
  7. Offer cloud storage. “If your company has the resources, offer BYOD employees an internal cloud storage option. This solves a number of problems. It allows your employees easy access to the data they need to work with and enables them to store personal data in a safe cloud environment.”
  8. Subsidize their phone plans. “For those BYODers using their personal smartphones for business, it makes sense to compensate their phone plan somewhat.” A number of organizations do this as part of their mobility policy, and we expand on this in the CTS Mobility Policy Guidebook.
  9. Give free (limited) support. A limited amount of support (say assistance getting connected to corporate resources such as email and intranet) is helpful, and keeps them productive.
  10. Tell them about the security benefits. If you can offer BYODers added security on their devices — say, through an MDM application installed as part of your BYOD program — tell them about those benefits.

This article also appears in 'Mobilize!: The CTS Mobile Tech Blog'.

2 replies on “BYOD Roundup: Mobility Policies and CTS’ Mobility Policy Guidebook, Samsung Knox, Making BYOD More Appealing to Users”

You’re awful cavalier about the idea that a company must preserve the ability to wipe an employee-owned device. I can’t imagine why I’d ever agree to that. It’s entirely unreasonable for me to risk having an IT drone in some giant enterprise zap my phone by mistake (and, as you note, it does happen).

Corporate remote wipes must be confined to corporate data (ie, data under control of the Exchange account), full stop. I get that it’s a hard pill for CIOs to swallow — they can’t mandate phone choice anymore and get any kind of compliance. That’s the new world. A remote wipe of an exchange account is reasonable. Remote bricking of a personal device by the employer isn’t acceptable, and nobody should put up with it as a possibility.

Leave a Reply

Your email address will not be published. Required fields are marked *