eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.
2The Democratization of Technology
BYOD increases the number of people in an organization who use mobile applications, which can lead to new efficiencies, increased productivity and cost savings. By 2015, the number of employees using mobile apps is expected to double. Still another perk: Gartner found that employees with the option of using their own devices tend to have more favorable opinions of their organizations.
3Opportunities Are Everywhere
4Have a Clear Strategy
Most IT leaders aren’t fully satisfied with the BYOD policy they have, Gartner found, and only 22 percent of business leaders described their strategy as “strong.” The key is to have a well-defined set of measurable processes that can benefit from mobility, said Gartner, offering examples of enabling a field force or sales force. From there, it’s possible to look for “softer” benefits such as employee satisfaction.
5Whether to Subsidize
6How to Subsidize
Critical to the economics of BYOD, says Gartner, is how you subsidize—whether by expense report, for example, or a device allowance that goes into an employee’s paycheck—as it can impact taxes and so hoped-for cost savings. “This task must not be completed by IT alone,” says Willis. “Involve your HR and legal departments in the policy.”
7Determine the Type of Policy You’d Like to Offer
8Tablets by Vertical
9Determine Who’s Responsible
The most common model is a hybrid-responsibility model, in which the company and the employee share responsibility for a device (and any issues). A version of this model is that the employee owns the phone and puts it on an employer carrier contract. A less common model—sometimes used for a normally unsupported platform or device—puts full responsibility on the employee.
10BYOD Increases Security Risks
11New Risks Mean a New CIO Focus
As BYOD becomes more common, CIOs are shifting from focusing on securing hardware to focusing on securing data. “Security has to exist in the application, in data controls and in add-on capabilities like containerization or virtualization,” Gartner advised.