What to Consider Before Adopting a BYOD Policy | Wahaya IT Consulting

Employee convenience is touted as one of the primary drivers for adopting a BYOD policy. However, just because it can make life easier doesn’t mean employees don’t have serious concerns about the implementation of BYOD in the workplace. From the employee perspective, there are downsides.

One particular issue that arises with BYOD are employee’s concerns about the privacy of personal data and applications. Because these are their own devices, they have an enormous amount of personal data, including health information, photos, texts, emails and other information stored on the device. Also, apps they may have installed could potentially reveal information about their religion, politics, sexual orientation or other characteristics that they may consider private and off-limits. Concern that their employer could see their personal data is a legitimate worry; there are Human Resource implications here. Knowledge of certain data about an employee could make an employer vulnerable to discrimination laws. What about GPS tracking? Can the employer track employee whereabouts? The employer has a compelling interest to track the device in case it is lost or stolen, but the employee has similar competing concerns about privacy.

There are no absolutely correct answers here, but a perception of overstepped boundaries could lead to an atmosphere of distrust that can be counter-productive. It is also important that these decisions be made with knowledge of all applicable local, state and federal regulations. In short, just be aware BYOD is a complex matter that can’t be handled within the silo of IT.

Click here to learn more about our cybersecurity and compliance solutions.

Want more information?

First Name (required)
Last Name (required)
Email (required)
Company Name (required)
Telephone Number (required)

Cybersecurity Training Best Practices for Employees

Cybersecurity Training Best Practices for Employees Cybersecurity services provide protection against hacking, viruses, and other threats to an organization’s data. While there are many outside threats, employees are usually the first targets of cyberattacks such as phishing, malware, and ransomware....

IT Company Baton Rouge

Looking for an IT company that offers network support in Baton Rouge? Wahaya IT Consulting offers exceptional end user support and services to businesses. From desktop application to network support, we cover it all. We have top notch technicians and...

Managing Risks: Small firms need to wake up

Managing Risks: Small firms need to wake up You may not think too much about serious disasters. Most of us focus on the day-to-day chores of running our businesses and keeping revenues up. However, there are long term planning concerns...

Contact Us
close slider

Who should we contact?

Let us know how to get back to you.


How can we help?

What are we trying to accomplish?