BYOD policy success requires balancing act


For a successful BYOD policy, enterprises need to strike the right balance between productivity, security and privacy, advises an article at Inside Counsel.

"This balance cannot be achieved without involving the right stakeholders and without understanding how mobile technology can be used to influence written policies that may otherwise be difficult to enforce," writes Matt Nelson, an attorney and legal tech expert with Symantec.

The right stakeholders include reps from IT, finance, legal, compliance, security, human resources and sales teams within the company and outside counsel--business partners and tech consultants from outside the company.

"Although including every stakeholder in early discussions is not necessary, failure to include key people in discussions before finalizing policy decisions is a costly but common mistake. The risks and benefits of a particular policy decision cannot be comprehensively identified or measured without including the right stakeholders in the discussion," argues Nelson.

Understanding mobile technology is also the key to developing the right policy. "Deploying the right suite of mobile security technology can provide organizations with the flexibility to implement enforceable policies that enhance security without unnecessarily sacrificing worker productivity, privacy interests and employee morale," according to Nelson.

While enterprises might want to prohibit workers from using their mobile devices for personal use during work hours, such a rule is unenforceable in practice. A policy "prohibiting the personal use of devices in the workplace is also likely to have a cultural impact on employee morale, or worse yet, the bottom line," he notes.

"The BYOD horse may have already left the barn, but it is not too late to create or update your mobile policy to reflect the changing needs of your organization and the rapid expansion of mobile technology in the workplace," Nelson concludes.

For more:
- check out Nelson's Inside Counsel article

Related Articles:
BYOD practices complicate legal e-discovery efforts
Communicating BYOD policy to employees is crucial for success
3 steps to a more secure BYOD program