ICFiles
SOC 2

content

Secure File Transfer Soc 2 starts at $1 per month

Join Us

 

ICFiles Logo

 

How and Why to Develop a Bring-Your-Own-Device Policy

General Business News

September, 2021

Get this Article  Get this Article & Suite of Tools

How and Why to Develop a Bring-Your-Own-Device Policy

Bring-Your-Own-Device PolicyWith the internet available for essentially all employees and remote work becoming a part of more businesses’ operations, developing a bring-your-own-device (BYOD) policy is almost necessary to help employees be more productive and safe while working. Research shows there are many reasons why businesses should develop the right type of BYOD policy.

According to Intel and Dell, 61 percent of Gen Y and 50 percent of workers 30 and older think the electronic devices they use at home are more capable in completing tasks in their everyday life compared to their work devices.

Frost & Sullivan found that connected handheld technology helps employees, making them about one-third more productive and reducing their average workday by 58 minutes.

A BYOD policy simply means that companies permit their workers to use their own smart devices to perform job-related tasks. It can be beneficial for a company, especially a smaller one; but it’s important to evaluate the advantages and disadvantages before implementing one.

Advantages

One of the most obvious reasons for a business to develop and implement a BYOD policy is due to the proliferation of technology. Along with saving employers money by not having to provide a work device, there is no need to provide costly training on how to use the device. A 2016 Pew Research survey determined that 77 percent of U.S. adults have a smartphone. For those ages 18 to 29, more than 9 in 10 (92 percent) own a smartphone. In 2021, even more adults likely have at least one smartphone.

Potential Drawbacks/Legal Considerations

According to a 2017 Pew Research Center report, there’s a significant portion of smartphone users with less-than-ideal security habits. For example, 28 percent of respondents don’t secure their phone with a screen lock or similar features. Forty percent said they update their apps or phone’s operating system only when it’s convenient for them. Less common, but equally alarming: Between 10 percent and 14 percent of respondents never update their phone’s operating system or apps.

Without a proper system setup there are more security risks, including reduced or compromised company privacy and a lack of basic digital literacy among employees. Mobile Device Management software can help monitor, secure, and partition personal and business files in a dedicated area, providing more confidence when permitting employees to BYOD.

Other considerations for a BYOD policy might include prohibiting employees from downloading unauthorized apps; performing local back-ups of company data; disallowing syncing to other personal devices; not allowing modifications to hardware/software beyond routine installations; and not using unsecured internet networks.

Depending on how employees are classified by the Fair Labor Standards Act (FLSA) for overtime compensation, businesses may be liable for overtime wages if non-exempt employees perform their duties outside the office. If non-exempt employees perform duties beyond “40 hours of work in a work week,” as the U.S. Department of Labor outlines, businesses could be liable for additional wages paid if they use their device for work-related tasks.

While each company has its own needs and unique workforce, crafting a BYOD policy that increases productivity while maintaining security and privacy can give businesses a competitive edge.

Sources

https://i.dell.com/sites/content/business/solutions/whitepapers/it/Documents/intel-imr-consumerization-wp_it.pdf

https://insights.samsung.com/2016/08/03/employees-say-smartphones-boost-productivity-by-34-percent-frost-sullivan-research/

https://www.pewresearch.org/fact-tank/2017/01/12/evolution-of-technology/

https://www.pewresearch.org/fact-tank/2017/03/15/many-smartphone-owners-dont-take-steps-to-secure-their-devices/

https://www.dol.gov/agencies/whd/flsa

Get this Article  Get this Article & Suite of Tools

 

These articles are intended to provide general resources for the tax and accounting needs of small businesses and individuals. Service2Client LLC is the author, but is not engaged in rendering specific legal, accounting, financial or professional advice. Service2Client LLC makes no representation that the recommendations of Service2Client LLC will achieve any result. The NSAD has not reviewed any of the Service2Client LLC content. Readers are encouraged to contact their CPA regarding the topics in these articles.

Protected by Copyscape Plagiarism Finder

Dynamic Content Powered by Service2client.com
SEO Content Powered by DynamicPost.net

 

ICFiles
SOC 2

content

Secure File Transfer Soc 2 starts at $1 per month

Join Us

 

content

 
website bundles

MyWeb, WordPress
1 Click Hosting
Install free themes

websites

Hosting Bundles

 
 
Electronic Commerce

Copyright © 2024 Service2Client, LLC All Rights Reserved.
Terms of Service  |  Privacy Policy

CPA Website Content Powered by Service2Client.com


 

CLOSE