A Blueprint for Implementing a Bring Your Own Device Policy


Less than a third of companies have policies governing personal devices in the workplace. 68% of employees use their own devices for work but only 29% actually have a policy in place covering Bring Your Own Device (BYOD).

14% of employees do not even know if their company has a BYOD policy at all. (Globo)

We have entered the age of Bring Your Own Device; a growing trend that has given the modern worker enormous work flexibility. Simply put, BYOD is when employees have the ability to bring their own technical devices – like smart phones, tablets and laptops – to work, and use the company’s network instead of a company-provided device. The increased flexibility for employees to work remotely also corresponds with a growth in the use of remote collaboration methods for business, such as video conferencing.

Given that by 2017, half of all employers will no longer provide devices to their workers (Gartner), it is more important than ever for organisations and workers to realise the importance of having a policy in place to avoid the security implications of incorrect usage.

Security is a big issue when allowing BYOD in your organisation. The security needs of a mobile workforce can be broken into:

  • Ensuring that the devices used to access the corporate network are safe and free of malware, spam, or applications that can compromise the corporate network or data
  • Making sure all users and devices accessing the corporate network meet company policy
  • Ensuring secure access and communication with proper encryption and data loss prevention
  • Device-level security functionality such as remote wipe to ensure that action can be taken on non-compliant devices
  • Visibility into users, devices and the applications they are running on the corporate network

So what can you do to protect your company from the security risks of BYOD?

With a significant number of employees already using their personal devices for work, companies should be focused on creating a BYOD program and policies that fit their specific needs.

While companies can`t always guarantee full compliance with their rules, having a formal BYOD policy in place will go a long way towards protecting them. An effective BYOD policy should give employees a clear set of guidelines for safe usage of personal devices and clear consequences for improper use. It should also ensure IT have heightened security measures in place to guarantee security access and prevent loss of data.

Defining and managing a BYOD strategy will not only protect the security of your communications infrastructure, but will keep your company competitive in the market by creating a mobile workforce.

If you already have a watertight Bring Your Own Device policy in place then you most likely have nothing to worry about when it comes to your video conferencing security. But if you would like more information on how best to optimise your security and mitigate potential risks, give us a call on 01276 706706.

Alternatively download our eBook “What is Compromising Your Video Conferencing Security” to learn how you can minimise security risk and start reaping the business benefits of video collaboration.

Image courtesy of Polycom