Presentation on theme: "BYOD – Panel Discussion Introductions – Who, where, what have you done so far in BYOD Peter Mariahazy – MBM, Director of Technology & HR John Messer."— Presentation transcript:
BYOD – Panel Discussion Introductions – Who, where, what have you done so far in BYOD Peter Mariahazy – MBM, Director of Technology & HR John Messer - SoCal, Director of Information Systems Craig Newbanks - GIS, Sr. Security Engineer Jon Karis - Zoom, MIS/IT Neal Liu - NWG, Director of Information Technology
Forrester’s study of US information workers revealed that 37% are doing something with technology before formal permissions or policies are instituted. Gartner survey of CIO’s – 80% of employees will be eligible to use their own equipment with employee data on board by 2016. CompTIA survey – 51 % of large companies are not doing BYOD at all. Less than half companies believe it boosts productivity.
7 Tips for Establishing a Successful BYOD Policy Specify What Devices Are Permitted. Establish a Stringent Security Policy for all Devices. Define a Clear Service Policy for Devices Under BYOD Criteria. Make It Clear Who Owns What Apps and Data Decide What Apps Will Be Allowed or Banned. Integrate Your BYOD Plan With Your Acceptable Use Policy. Set Up an Employee Exit Strategy. (CIO Magazine - May 17, 2012)
Ten Commandments Create Thy Policy Before Procuring Technology Seek The Flocks' Devices Enrollment Shall Be Simple Thou Shalt Configure Devices Over the Air Thy Users Demand Self-Service Hold Sacred Personal Information Part the Seas of Corporate and Personal Data Monitor Thy Flock - Herd Automatically Manage Thy Data Usage Drink from the Fountain of ROI (MaaS 360 The Ten Commandments of BYOD)
HQ requirements – Ted presentation on Wednesday GIS/Xerox Policy Looking for thoughts and input from cores.
Core consideration options/parameters Update Core Electronic Data and Use policies Employee release of both number and waiver for remote wipe HR implications Fair Labor Standards Overtime PCI, HIPAA requirements Driving safety Core Support Level Commitment of Employee Devices
Core consideration options/parameters Acceptable use (Facebook, appropriate content, email content, etc.) Data retrieval and discovery Access Control – Remote wipe MDM MAS360 MS Mobile Device Management How to control/identify devices