Last week I met clients in the Bay area and had two very intesting conversations about BYOD (Bring Your Own Device) policies.
In one case, the CIO had been struggling for so long with frequent requests from users to support their devices of choice that he went for a much broader choice of enterprise-provided user devices. The reasoning that the cost of supporting an increasing variety of user-owned devices and the risks posed by how employees may mismanage the boundary between enterprise and personal use were greater than the cost of providing enterprise devices. He claimed that this helped make employees more conscious of and cautious about the distinction between business and personal use.
In the other case, the CIO told me that there s a proliferation of devices, despite the lack f a formal BYOD policy. When we touched upon one of the typical risk, which is the use of personal clouds (such as DropBox, iCloud, Google Drive), he told me that one of the personal cloud providers contacted him, providing a list of hundreds of employees in his organization who had registered for their service (presumably with their business email address). The purpose was clearly to sell the enterprise version, but this raises a vary interesting question: to what extent are consumer software providers respecting their users’ privacy and how is our personal data being used in ways that we would not anticipate.
If I were one of the employees using that tool, I would be pissed at the vendor. I may be using the personal cloud for purely personal purposes or to store public data, hence in full compliance with my code of conduct, and yet my employer would have reasons to believe that am doing something wrong.
This is not new. Every time we visit a web site from our corporate network or give our business email address when registering for a service we leave a digital trace. We rarely think about what the provider might do with it besides piling on our spam load. However this example shows that the vendor can simply tell our employer.
BYOD looks like an unstoppable trend, as more and more people look for the convenience of usin their own device. However there are potentially serious implications, ranging from the enterprise erasing a personal device in case it is lost (including all personal data, which is irremediably lost in case we find the device but have missed the last backup), to a vendor airing our possible non-compliance to our employer, to our employer accessing and analyzing our personal data.
The irony is that while everybody is worried about the risks of BYOD to the enterprise, the worst risks could be for us.
View Free, Relevant Gartner Research
Gartner's research helps you cut through the complexity and deliver the knowledge you need to make the right decisions quickly, and with confidence.Read Free Gartner Research
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.