Responsibility

If you’ve been diligent in keeping up with the news in mobile device management, Bring Your Own Device and mobility, you’ve heard a lot of “10 ways to implement …” or “5 points to a successful BYOD”. What you don’t hear, and what should be talked about more, is the responsibility of the user. As the “consumerization of IT” becomes more and more of a reality, users tend to forget that with that democratization of access comes an increased responsibility to take control of your own technology. This holds especially true in an environment where you are using your consumer technology in an enterprise environment. Here are five easy rules that the consumer needs to remember when participating in a BYOD environment, or in helping to transition a company to fully BYOD.

FIRST: Even though it’s your own device, it is still a privilege you have to respect.
So your IT department has given you the “green light” to use your own iPhone, iPad, Blackberry or Android device to connect to your corporate email, directory and data. Hopefully they have done so within the context of a larger mobility plan supported with a robust mobile device management infrastructure. Regardless, you as an employee have to remember that your company is opening the doors to its valuable corporate data for your personal device to access. You might not think it, but this is actually a significant sign of trust. Don’t abuse it!

SECOND: You have a responsibility to keep your device secure.
Forgetting this responsibility is the number one way company data is lost from personal devices. It’s likely that at the very least your company will require you to have a password on your device. If not and your company has simply turned on access, put a password on your device, keep your corporate emails in your corporate email inbox (your MDM policy might even prohibit doing otherwise) and always know where your device is. ake a habit out of checking your purse/pocket for your device the same way you do your wallet.

THIRD: Know your company’s mobility policy.
When you are given access to company email, data, VPN, directories, etc., don’t just click/tap on “accept” when that Acceptable Use Agreement (AUA) comes up. Take a minute to skim the main points at minimum. More and more companies are requiring that their employees take full responsibility for the financial damage that comes as a result of data loss on your personal device. If something isn’t clear to you, ask! Your company wants you to know what is okay and what isn’t, so don’t let something surprise you.

FOURTH: Give your IT department feedback.
90% of you are already using personal devices for work, but only 10% of companies have a solid mobile device management (MDM) policy in place. If your IT managers are doing their jobs in building policies that are designed to evolve, they want and need your feedback. You are the user, and they want to create policies that find a balance between security and usability. Tell them what you think works and what you think doesn’t. This brave new BYOD world only works if you communicate with your technology stewards.

FIFTH: With your own device, you are your own IT department.
For corporate IT, one of the reasons there is resistance to officially allowing personal devices into the corporate environment is the exponentially higher number of support calls that are generated. IT departments are accustomed to supporting a limited subset of laptop and mobile profiles. Most support questions are already answered before you call. When you add into the mix unknown mixes of operating systems and hardware configurations, each support call can be unique, making resolution incredibly expensive. To help with this, know your device!  Understand how to add your own email addresses, update your own software and call your carrier with problems instead of your overworked IT manager.