Mobile

BYOD: Trend or trivia?

The concept of employees using their own personal technology devices at work has started to catch on in the government — or at least in the government’s vocabulary.

BYOD, short for “bring your own device,” has become a common phrase almost overnight, and it has taken root in the private sector, too.

But whether the idea itself is practical, or even desirable, is far from clear. Peter Silva, writing in a blog at Sys-Con Media, wonders if it’s the hottest trend or just the hottest term.

“It goes by many names: ‘Bring Your Own Danger,’ ‘Bring Your Own Disaster’ and what most people call ‘Bring Your Own Device,’ and everyone, it seems, is writing, talking and surveying about BYOD,” he wrote.

In an unusual twist for articles that begin by raising the possibility that something new is just so much vaporware, Silva comes down on the side of the trend. In particular, he cites a survey by Avanade in which 90 percent of respondents said their employees are already using personal devices for work.

The survey, which was also cited by Gina Smith in a TechRepublic article titled “10 myths of BYOD in the enterprise,” focused on private-sector companies. But federal managers share many of the same concerns.

For example, the third myth on TechRepublic’s list is that BYOD policies will result in employees “trading cows, updating friends on their lunch choices and making fun of the boss publicly.” In other words, employees will be playing games and chatting on social media sites rather than working. Instead, Smith said research shows that the greatest use of personal devices in the workplace is for accessing enterprise applications. “Not an angry bird in sight,” she wrote.

In the government, managers might be embracing the trend a little less enthusiastically. Rob Burton, a partner at Venable law firm, summed up a common sentiment when he said the government is moving toward a BYOD environment “whether we like it or not,” as reported by Alice Lipowicz on FCW.com. Burton warned, however, that “this train may be moving too fast.”

On the other hand, Tom Kaneshige wrote an article in CIO magazine that tells managers not to expect BYOD policies to save money. Citing research from the Aberdeen Group, he writes, “BYOD's dirty little secret is that most CIOs aren't seeing cost savings. In fact, mobile BYOD often costs more in the long run than company-owned mobile devices.”

Ever-practical ZDNet published an article by Rob Shaughnessy on how to make BYOD work in practice. He advised managers to enlarge their network capacity or make it more efficient through wide-area network optimization techniques.

Then, he wrote, organizations should carefully evaluate the risks and benefits associated with employees using personal devices for work and clearly communicate their best practices and acceptable-use policies for the devices.

About the Author

Technology journalist Michael Hardy is a former FCW editor.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • computer network

    How Einstein changes the way government does business

    The Department of Commerce is revising its confidentiality agreement for statistical data survey respondents to reflect the fact that the Department of Homeland Security could see some of that data if it is captured by the Einstein system.

  • Defense Secretary Jim Mattis. Army photo by Monica King. Jan. 26, 2017.

    Mattis mulls consolidation in IT, cyber

    In a Feb. 17 memo, Defense Secretary Jim Mattis told senior leadership to establish teams to look for duplication across the armed services in business operations, including in IT and cybersecurity.

  • Image from Shutterstock.com

    DHS vague on rules for election aid, say states

    State election officials had more questions than answers after a Department of Homeland Security presentation on the designation of election systems as critical U.S. infrastructure.

  • Org Chart Stock Art - Shutterstock

    How the hiring freeze targets millennials

    The government desperately needs younger talent to replace an aging workforce, and experts say that a freeze on hiring doesn't help.

  • Shutterstock image: healthcare digital interface.

    VA moves ahead with homegrown scheduling IT

    The Department of Veterans Affairs will test an internally developed scheduling module at primary care sites nationwide to see if it's ready to service the entire agency.

  • Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

    MGT Act poised for a comeback

    After missing in the last Congress, drafters of a bill to encourage cloud adoption are looking for a new plan.

Reader comments

Mon, May 21, 2012 Henry

Inverse-BYOD. is where the enterprise provides employees a user-managed device for Internet access, denies them enterprise network access, imposes Acceptable-Use / Behavior policies, provides Internet connectivity, and enforces relatively weak device security requirements. Inverse-BYOD increases enterprise network security by decreasing Internet-based risks, improves network performance by offloading modern, high-bandwidth traffic to less-managed local networks, improves user access to Internet content (typically because of less filtering for risks, larger connections, and lower latency), improves mobility (assuming the enterprise network offer some Internet-facing services like email or remote desktops), and improves moral since employees can use the latest commercial technology (and not their own devices) to be most effective. For a network with highly valuable intellectual property, Inverse-BYOD decreases total costs.

Thu, Apr 19, 2012 OccupyIT

Bring Your Own Disaster (BYOD) is another case of there being a rational approach (such as virtualized phones) becoming available that will be trampled by hype-mongering senior executives. Followed inevitably by sageful presentations about their 'pilots' and 'lessons learned' on the speaking tours. Followed by some sap in IT O&M getting stuck with the blame for some horrendous breach or loss of unencrypted data. Followed by some knee-jerk reaction to codify specific hardware/software into a unified architectural approach. Followed by lack of capability. Shampoo, rinse, repeat.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group