Showing posts with label Workplace technology. Show all posts
Showing posts with label Workplace technology. Show all posts

Thursday, May 3, 2018

BYOD: Brief case study of the San Diego County Library policy



Hot topics this decade include breaking the internet, viral videos, and BYOD (bring your own device). The BYOD trend began when senior executives became “app-happy” with the rise of smartphones and tablets, Acohido says in his 2013 article about security, and continues as concerns are addressed using MDM (mobile device management).  Executives argued that to increase productivity, they needed more access to work items during non-work hours. (Let’s be frank though, executives don’t have many non-work hours, do they? I think the lines are kind of blurred for them.) IT departments argued that using a personal device for work couldn’t compromise company interests, and so they had to figure how to make the guys who sign their paychecks happy while fulfilling their obligations. San Diego County Library has built and developed their policies into a solution which gives employees flexibility while maintaining security.  

The county has a BYOD policy in place for employees, but it varies based on the type of employee. For example, library techs have use of an exclusive employee network which they can connect to from their smartphones and tables. They have apps for email, and are allowed off-network access via their login to their company email. This security layer of a private network is one example of a solution to the concerns personal devices present. Also, using logins for off-network access from a personal device has been a standard procedure for many years before handhelds. 

However, when an employee gets to upper management, the policy changes slightly. They are allowed access to download more apps than techs, based on their job duties and responsibilities. In this way of restricting mobile downloads based on the employee’s status, the library is able to give access to just those employees who need it and maintain security. 

At the highest levels of management, the policy restricts access to certain systems from personal devices, and only county-issued devices are allowable for access to certain mobile apps. This compromise allows upper management the flexibility of mobile computing but maintains sensitive data in a secure container. For example, the payroll app for timecard approvals can be done on a mobile device, but it must be a county-issues mobile device. 

According to Storey’s doctoral dissertation, “Organizations that support CIT [consumer information technology] in the workplace should have a bring-your-own-device (BYOD) policy designed to (a) safeguard the employee’s mobile device, (b) safeguard the organization’s network and data assets, and (c) stipulate a code of conduct for the employee to follow as a condition to use their own device at work.” The San Diego County Library has done an excellent job on all three points. 

 

The San Diego County Library is not affiliated with this blog and has neither endorsed nor denied its contents.


References

Acohido, B. (2013, January 8). Using personal devices at work gets more secure. USA Today, p. 01B. Retrieved from http://link.galegroup.com.ezproxy.palomar.edu/apps/doc/A314276156/OVIC?u=cclc_palomar&sid=OVIC&xid=0376f957

Meyer, E. (2018). Interview with Vanessa Perez, Assistant Branch Manager, SDCL. [Oral interview].

Storey, G. S. (2017). An empirical analysis of bring-your-own-device (BYOD) policy adoption in organizations (Order No. 10265019). ProQuest Dissertations Publishing. Retrieved from https://login.ezproxy.palomar.edu/login?url=https://search-proquest-com.ezproxy.palomar.edu/docview/1886088909?accountid=35685


 



Wednesday, April 25, 2018

BYOD (Bring Your Own Device)

BRING YOUR OWN DEVICE
By Rosemary Rico 

BYOD or “Bring Your Own Device” is a term that references the practice of allowing the use of an individuals own personal devices (phones, tablets, laptops). This term applies frequently to work place employees and also in educational spaces such as schools. As there is a need to increase greater access to technology and mobility BYOD is a practice that is currently on the rise within the workplace and within classrooms.

Certainly there are advantages to BOYD policies as well as potential issues that should be considered when allowing a BOYD policy. For workplace policies, employers should consider that personal devices with workplace sensitive or business privileged information would be at a higher risk without investing in software programs such as anti-virus or data protection and recovery programs (Hodge). There are advantages to BOYD in the workplace such as increasing efficiency with greater workplace mobility—there is a constant connection to the workplace, everywhere you go. So since devices such as cell phones would be used for business purposes during work hours and for personal reasons after work hours (such as online shopping or internet browsing)—these are important considerations to think of (Hodge).

BOYD policies within classrooms and education also face advantages and potential issues that should be considered. Schools face an increasing pressure to provide greater access to the internet and to technology with tighter and tighter budget constraints (Cavanagh). It is schools like this that may benefit the most from BOYD policies. One such advantage of BOYD within the classrooms is giving students a sense of ownership in which they are responsible for their learning and their actual devices (Thompson). Potential concerns within the classroom would be the threat of distractions and unwanted personal usage such as texting during lessons. Teachers would need to understand and anticipate these potential concerns and create an engaging lesson plan to deter this kind of behavior so that the devices are only used when appropriate. Success of BOYD comes down to how prepared the teachers and educators are for various devices of various ages being used in the classroom (Thompson).

Works Cited: 

Cavanagh, Sean. "Districts Turn 'BYOD' Disorder to Their Advantage; Flexibility sought in dealing with sea of devices." Education Week, 11 June 2015, p. 26. Opposing Viewpoints In Context, http://link.galegroup.com.ezproxy.palomar.edu/apps/doc/A418872041/OVIC?u=cclc_palomar&sid=OVIC&xid=13fd9efc.

Hodge, Ian. "How to protect your business secrets in the age of smartphones." Australian [National, Australia], 23 Nov. 2013, p. 44. Opposing Viewpoints In Context, http://link.galegroup.com.ezproxy.palomar.edu/apps/doc/A349991774/OVIC?u=cclc_palomar&sid=OVIC&xid=2977802c.

Thompson, Greg. "3 Keys to a Successful 1-To-1 and BYOD Implementation." T H E Journal, vol. 44, no. 5, Fall2017, pp. 14-18. EBSCOhost, login.ezproxy.palomar.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=126029338&site=ehost-live&scope=site.