
BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
Mobile device policy guide: How BYOD policies help IT manage devices
-
Article
Creating BYOD policies
There isn't one cookie-cutter program that works for every company, so every BYOD policy will be different. But there are certain things every business should consider when writing BYOD policies, such as how users should protect their devices, which apps they can and can't use on their personal devices, and what users and IT should do when an employee loses a device or leaves the company. Decide which devices you'll support, draw up policies, then get users to agree to the terms. Read Now
-
Article
Enforcing BYOD policies
Users need to know the consequences of violating their company's BYOD policies, and IT needs the tools to enforce those consequences. For example, if your BYOD policy states that users' passwords must meet certain requirements, then your mobile device management system should be able to push those requirements to devices. And if you tell employees their devices will be wiped if they're lost or stolen, you should be able to wipe their devices. Read Now
-
Article
Following BYOD and mobile security policy best practices
There are some basic strategies and best practices you can follow to strengthen your BYOD and mobile security policies: Encrypt business data on users' devices, update hardware and apps (or make sure users are doing it), register devices before you let users connect them to the network and use Secure Sockets Layer certificates to authenticate devices. Read Now
-
Article
Using acceptable use policies to improve app management
You can tailor acceptable use policies to gain control over applications. Informing users what they can and can't do with their devices and having them agree to those terms lets you un-enroll or auto-quarantine noncompliant devices. If you want employees to only download apps from your app store, let them know you will block devices from the network that download apps from another source. But you also have to explain why you're instating such a rule and make sure the punishment fits the crime. Read Now
Editor's note
For companies intent on embracing enterprise mobility, crafting a bring your own device (BYOD) policy is just the first step in defining safe and productive mobile device usage. Those policies, once written and implemented well, can head off lots of potential problems.
1Need to know: Mobile device policy definitions
There are more policies out there aside from just BYOD guidelines. Get familiar with some different types of mobile device policies.
-
Definition
BYOD policy
A BYOD policy, or bring-your-own-device policy, is a set of rules governing a corporate IT department’s level of support for employee-owned PCs, smartphones and tablets. Read Now
-
Definition
consumerization policy
A consumerization policy is a documented set of practices for managing the use of consumer devices and technologies within a given organization. A consumerization policy defines acceptable use. Read Now
-
Definition
end user policy
An end user policy is a set of directives that describes what actions employees must take -- or avoid -- in order to protect corporate assets Read Now
-
Definition
corporate mobility policy
A corporate mobility policy is a set of guidelines, established by a corporation, that govern the use and security of mobile devices such as smartphones, PDAs and tablets within the corporate network. Read Now
-
Definition
acceptable use policy (AUP)
An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet. Read Now
2Test your knowledge of mobile device policy
Think you're a mobile device policy guru? Check how much you learned in this guide with this quiz.