![]() ![]() Many people like the seamlessness of doing both work and personal activities on the same computer. For the purpose of this memorandum, computer peripherals are external devices (e.g., common access card (CAC) readers, cameras, microphones, keyboards, mice, monitors, etc.) physically or wirelessly connected to DoD-issued computers. For example, BYOD policies allow you to use your personal computer, which you might be more familiar with than a new work computer. Most employers that do allow employees to use their own devices try to limit the risks and complexity through comprehensive BYOD policies that outline acceptable use, what monitoring and security will be required on the devices, and what steps the organization will take if the employment relationship is terminated in the future. There are benefits to bring-your-own-device (BYOD) computer policies at work. These are some of the major issues employers must weigh when determining whether to have employees use company-provided devices or allow them to use their own. It can also be more difficult to manage employer software when it needs to be deployed across dozens of different devices and platforms, resulting in different users having a different user experience, which further complicates the situation. While there are ways to address these concerns via company policy, it’s likely employees will use their devices for personal reasons, as well, which also opens them up to more security risks.Īnother security risk is how easy it may be for company data to be taken off of these devices, either by employees themselves (while they’re employed or after) or by others who may use the devices. Employers will have less of an ability to ensure the devices are always covered by antivirus software, are always password-protected, are always avoiding insecure networks, etc. A computer is an electronic machine that processes informationin other words, an information processor: it takes in raw information (or data) at one end, stores it until its ready to work on it, chews and crunches it for a bit, then spits out the results at the other end. Security is a primary concern when employees use their own devices. Additionally, employees are more likely to update their own devices more frequently than the employer would, again resulting in their having a higher standard of technology than they would otherwise.īecause of their benefits, BYOD programs are still gaining popularity, but there are some pretty major caveats and risks that need to be mitigated. Moreover, employees may have a higher standard of technology than their employer would likely have purchased because of cost comparisons, and a faster device has its own benefits, especially if employees are willing to pay for it or already own it. And, if employees are likely to start working from home-such as during the COVID-19 pandemic-having a BYOD option could make that transition much easier. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |