BYOD Bill of Rights aims to close perceptions gap

Tools

A growing number of organizations are adopting, or at least condoning, bring-your-own-device practices, but there appears to be a growing disconnect between what employers want and what employees expect.

That is the finding of new research by Harris, which was commissioned by cloud-based Internet security provider Webroot. The study looked at how employers and employees each view the elements and restrictions of a BYOD program.

The greatest gap between employers and employees seems to be in regard to mandatory security features. While a majority of organizations now permit the use of BYOD, in many cases it is with the understanding that the organization's IT department can secure each device and, if necessary, wipe it of sensitive data when lost or stolen.

In an email to FierceMobileIT, Webroot revealed the key findings of the study as follows:

  • 62 percent of respondents agreed that organizations have the right to secure personal phones if they are being used for work purposes
  • 54 percent of respondents would allow the installation of security software on their phone
  • 46 percent of respondents said they would stop using their device for work altogether if security features became mandatory
  • 37 percent of respondents said they currently use only default security precautions on their phones and tablets used for these purposes

To help resolve the gap, Webroot has devised a BYOD Bill of Rights. In the email to FierceMobileIT, the firm noted: "The BYOD Bill of Rights has been created as a guideline to bridge the gap between employees' preferences and the needs of their organization."

According to the BYOD Bill of Rights, employees have the right to:

  1. Privacy over their personal information
  2. Be included in decisions that impact their personal devices and data
  3. Choose whether or not to use their personal device for work
  4. Stop using their personal device for work at any time
  5. Back up their personal data in the case of a remote wipe
  6. Use security apps that do not significantly degrade speed and battery life
  7. Know about any activity that might affect device performance or privacy
  8. Download safe apps on their personal device

Related Articles:
Enterprises are embracing BYOD, despite security risks and support costs
No one-size-fits-all solution for BYOD policies, panel reveals