Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to BYOD EIT, Author Gay Robertson, 2017.

Similar presentations


Presentation on theme: "Introduction to BYOD EIT, Author Gay Robertson, 2017."— Presentation transcript:

1 Introduction to BYOD EIT, Author Gay Robertson, 2017

2 What is BYOD? BYOD stands for Bring Your Own Device
Meaning: bringing your own mobile device such as a smartphone, tablet or laptop to work and use the device on the company’s network; accessing, and storing company data on the device for work tasks

3 This trend has come about with the freedom of being able to carry small mobile computing devices anywhere and anytime instead of being limited to a big desktop computer sitting on a desk within the workplace The internet and cloud technology have allowed companies to have more ability to connect, communicate and collaborate together

4 Why BYOD? More and more companies have begun to operate outside of the traditional 9-5 work day. Many have begun trading and operating globally 24/7 thanks to e-commerce This shift has also lead to more employees working outside of the office and on the go Some companies require employees to travel to other parts of the country to other offices or even overseas Mobile technology allows organisations to operate and trade on a larger scale, and mobile devices allow employees to produce and complete work anytime and anywhere

5 The effects of BYOD BYOD allows employees to use their own personal device such as their own smartphone or tablet to be able to connect to their work network and access the companies data and files One of the advantages is that the employer doesn’t need to be providing employees with the mobile devices if the employees already own and are happy to use there personal device The employee might also find their own device more familiar and easy to use a different device provided from the company

6 However BYOD and mobile devices being used on company networks can lead to risks such as:
Data/Device theft Security Risks Lack of Support for device use Lack of employee education around the use of BYOD and safe practices can create more problems BYOD is about employees bringing there own devices so it can be difficult for the Company to support and ensure that the device can run and access data and information correctly over the network

7 Business owned devices
Some business have introduced systems where they will provide employees with mobile devices owned by the company These devices are preferred by the IT Department and are supported by the company IT Department The company might offer different models or devices from a list they are able to support and provide one suitable to each employee depending on their needs The company might have specific software suitable to be used on the devices to help ensure security of company data and information

8 Another procedure being used around BYOD is to provide a list of mobile devices to employees suitable for BYOD that can be supported by the IT department Then the employees choose to purchase one of the supported devices and can use these personal devices for work

9 BYOD Policies To protect themselves, many organisations have begun to create policies around the use of BYOD devices and network access for employees. These policies can include information such as: Suitable and unsuitable use: of devices applications or network access Device support: as explained in previous slide some organisations will only offer support to IT approved devices Risk/Liabilities: Such as procedures on informing the company when a device is stolen or missing, rules around the company reserving the right to disconnect or disable devices that breach the organisations policies In the Student Handbook the Computer Usage Policy tells you what is expected of you if you connect a BYOD to any EIT system. If you do not have one of these handbooks, look on

10 Security rules or procedures: Such as passwords not being shared; or using Apps that are banned or not to be used on devices when connected to the organisation systems

11 Videos to watch: BYOD - Duration 3m 6s Our world is changing fast. Workers now collaborate anytime and anywhere, making instant real-time decisions thanks to smart phones, tablets and devices. We're about to rocket past the 1 billion mark of smart devices purchased worldwide, with 80% of workers using personal devices in the workplace. With the new era of Bring Your Own Device, we're seeing the most radical shift in business hardware since PCs invaded the workplace in the 70s.

12 BYOD and the Ethical Problems - Duration 4m 34s As people increasingly bring their own (mostly mobile) devices into the workplace, and use them for both personal and professional activities, new challenges arise—for the employees as well as their employers. In this brief video, Pat Gelsinger, the CEO of VMware, discusses some of the implications of BYOD for data security and personal privacy. Can people enjoy the convenience of BYOD without compromising either the assets of their employers or their own personal privacy? 

13 BYOD Discussion Page - Duration 3m 32s Logicalis brought together a "panel of experts" to talk about why and how to implement a Bring Your Own Device policy, including the technology, cultural implications and policy requirements. Watch the video for five tips on successfully implementing BYOD in your workplace

14 BYOD Privacy v Security - When your YouTube video of twerking kittens goes viral, it's a fantastic feeling. When it's your company's trade secrets that go viral, not so much. And that's exactly what can happen when employees use their personal smartphones to transmit and store business data. When that device is lost or stolen, it can cause a data breach. Security vendor Bitglass put together an infographic to illustrate the extent of the problem.

15 Okay, let’s go use the workbook


Download ppt "Introduction to BYOD EIT, Author Gay Robertson, 2017."

Similar presentations


Ads by Google