Here’s the second installment for the BYOD checklist as promised :
- Ensure end-users are responsible for backing up personal data
- Clarify lines of responsibility for device maintenance, support and costs
- Require employees to remove apps at the request of the organization
- Establish that the company will disable a device’s access to the network if a blacklisted app is installed or if the device has been jail-broken or tampered with in any way
- Specify the consequences for any violations to the policy
All of these recommendations will require an enterprise to truly understand the nature of their BYOD estate. I fear a lot of organizations are under so much time pressure that BYOD has been implemented by stealth and not as part of the overall Security program. But the quicker you can gain control of the reigns puts you in a much stronger position to implement a comprehensive BYOD program.
These recommendations are part of the SBIC report – Realizing the Mobile Enterprise. Download the full report to read more