Mobile

BYOD: Trend or trivia?

The concept of employees using their own personal technology devices at work has started to catch on in the government — or at least in the government’s vocabulary.

BYOD, short for “bring your own device,” has become a common phrase almost overnight, and it has taken root in the private sector, too.

But whether the idea itself is practical, or even desirable, is far from clear. Peter Silva, writing in a blog at Sys-Con Media, wonders if it’s the hottest trend or just the hottest term.

“It goes by many names: ‘Bring Your Own Danger,’ ‘Bring Your Own Disaster’ and what most people call ‘Bring Your Own Device,’ and everyone, it seems, is writing, talking and surveying about BYOD,” he wrote.

In an unusual twist for articles that begin by raising the possibility that something new is just so much vaporware, Silva comes down on the side of the trend. In particular, he cites a survey by Avanade in which 90 percent of respondents said their employees are already using personal devices for work.

The survey, which was also cited by Gina Smith in a TechRepublic article titled “10 myths of BYOD in the enterprise,” focused on private-sector companies. But federal managers share many of the same concerns.

For example, the third myth on TechRepublic’s list is that BYOD policies will result in employees “trading cows, updating friends on their lunch choices and making fun of the boss publicly.” In other words, employees will be playing games and chatting on social media sites rather than working. Instead, Smith said research shows that the greatest use of personal devices in the workplace is for accessing enterprise applications. “Not an angry bird in sight,” she wrote.

In the government, managers might be embracing the trend a little less enthusiastically. Rob Burton, a partner at Venable law firm, summed up a common sentiment when he said the government is moving toward a BYOD environment “whether we like it or not,” as reported by Alice Lipowicz on FCW.com. Burton warned, however, that “this train may be moving too fast.”

On the other hand, Tom Kaneshige wrote an article in CIO magazine that tells managers not to expect BYOD policies to save money. Citing research from the Aberdeen Group, he writes, “BYOD's dirty little secret is that most CIOs aren't seeing cost savings. In fact, mobile BYOD often costs more in the long run than company-owned mobile devices.”

Ever-practical ZDNet published an article by Rob Shaughnessy on how to make BYOD work in practice. He advised managers to enlarge their network capacity or make it more efficient through wide-area network optimization techniques.

Then, he wrote, organizations should carefully evaluate the risks and benefits associated with employees using personal devices for work and clearly communicate their best practices and acceptable-use policies for the devices.

The 2014 Federal 100

Get to know the 100 women and men honored this year for going above and beyond in federal IT.

Reader comments

Mon, May 21, 2012 Henry

Inverse-BYOD. is where the enterprise provides employees a user-managed device for Internet access, denies them enterprise network access, imposes Acceptable-Use / Behavior policies, provides Internet connectivity, and enforces relatively weak device security requirements. Inverse-BYOD increases enterprise network security by decreasing Internet-based risks, improves network performance by offloading modern, high-bandwidth traffic to less-managed local networks, improves user access to Internet content (typically because of less filtering for risks, larger connections, and lower latency), improves mobility (assuming the enterprise network offer some Internet-facing services like email or remote desktops), and improves moral since employees can use the latest commercial technology (and not their own devices) to be most effective. For a network with highly valuable intellectual property, Inverse-BYOD decreases total costs.

Thu, Apr 19, 2012 OccupyIT

Bring Your Own Disaster (BYOD) is another case of there being a rational approach (such as virtualized phones) becoming available that will be trampled by hype-mongering senior executives. Followed inevitably by sageful presentations about their 'pilots' and 'lessons learned' on the speaking tours. Followed by some sap in IT O&M getting stuck with the blame for some horrendous breach or loss of unencrypted data. Followed by some knee-jerk reaction to codify specific hardware/software into a unified architectural approach. Followed by lack of capability. Shampoo, rinse, repeat.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above