Mobile

BYOD: Trend or trivia?

The concept of employees using their own personal technology devices at work has started to catch on in the government — or at least in the government’s vocabulary.

BYOD, short for “bring your own device,” has become a common phrase almost overnight, and it has taken root in the private sector, too.

But whether the idea itself is practical, or even desirable, is far from clear. Peter Silva, writing in a blog at Sys-Con Media, wonders if it’s the hottest trend or just the hottest term.

“It goes by many names: ‘Bring Your Own Danger,’ ‘Bring Your Own Disaster’ and what most people call ‘Bring Your Own Device,’ and everyone, it seems, is writing, talking and surveying about BYOD,” he wrote.

In an unusual twist for articles that begin by raising the possibility that something new is just so much vaporware, Silva comes down on the side of the trend. In particular, he cites a survey by Avanade in which 90 percent of respondents said their employees are already using personal devices for work.

The survey, which was also cited by Gina Smith in a TechRepublic article titled “10 myths of BYOD in the enterprise,” focused on private-sector companies. But federal managers share many of the same concerns.

For example, the third myth on TechRepublic’s list is that BYOD policies will result in employees “trading cows, updating friends on their lunch choices and making fun of the boss publicly.” In other words, employees will be playing games and chatting on social media sites rather than working. Instead, Smith said research shows that the greatest use of personal devices in the workplace is for accessing enterprise applications. “Not an angry bird in sight,” she wrote.

In the government, managers might be embracing the trend a little less enthusiastically. Rob Burton, a partner at Venable law firm, summed up a common sentiment when he said the government is moving toward a BYOD environment “whether we like it or not,” as reported by Alice Lipowicz on FCW.com. Burton warned, however, that “this train may be moving too fast.”

On the other hand, Tom Kaneshige wrote an article in CIO magazine that tells managers not to expect BYOD policies to save money. Citing research from the Aberdeen Group, he writes, “BYOD's dirty little secret is that most CIOs aren't seeing cost savings. In fact, mobile BYOD often costs more in the long run than company-owned mobile devices.”

Ever-practical ZDNet published an article by Rob Shaughnessy on how to make BYOD work in practice. He advised managers to enlarge their network capacity or make it more efficient through wide-area network optimization techniques.

Then, he wrote, organizations should carefully evaluate the risks and benefits associated with employees using personal devices for work and clearly communicate their best practices and acceptable-use policies for the devices.

About the Author

Technology journalist Michael Hardy is a former FCW editor.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.

Featured

  • FCW @ 30 GPS

    FCW @ 30

    Since 1986, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

  • Shutterstock image.

    A 'minibus' appropriations package could be in the cards

    A short-term funding bill is expected by Sept. 30 to keep the federal government operating through early December, but after that the options get more complicated.

  • Defense Secretary Ash Carter speaks at the TechCrunch Disrupt conference in San Francisco

    DOD launches new tech hub in Austin

    The DOD is opening a new Defense Innovation Unit Experimental office in Austin, Texas, while Congress debates legislation that could defund DIUx.

  • Shutterstock image.

    Merged IT modernization bill punts on funding

    A House panel approved a new IT modernization bill that appears poised to pass, but key funding questions are left for appropriators.

  • General Frost

    Army wants cyber capability everywhere

    The Army's cyber director said cyber, electronic warfare and information operations must be integrated into warfighters' doctrine and training.

  • Rising Star 2013

    Meet the 2016 Rising Stars

    FCW honors 30 early-career leaders in federal IT.

Reader comments

Mon, May 21, 2012 Henry

Inverse-BYOD. is where the enterprise provides employees a user-managed device for Internet access, denies them enterprise network access, imposes Acceptable-Use / Behavior policies, provides Internet connectivity, and enforces relatively weak device security requirements. Inverse-BYOD increases enterprise network security by decreasing Internet-based risks, improves network performance by offloading modern, high-bandwidth traffic to less-managed local networks, improves user access to Internet content (typically because of less filtering for risks, larger connections, and lower latency), improves mobility (assuming the enterprise network offer some Internet-facing services like email or remote desktops), and improves moral since employees can use the latest commercial technology (and not their own devices) to be most effective. For a network with highly valuable intellectual property, Inverse-BYOD decreases total costs.

Thu, Apr 19, 2012 OccupyIT

Bring Your Own Disaster (BYOD) is another case of there being a rational approach (such as virtualized phones) becoming available that will be trampled by hype-mongering senior executives. Followed inevitably by sageful presentations about their 'pilots' and 'lessons learned' on the speaking tours. Followed by some sap in IT O&M getting stuck with the blame for some horrendous breach or loss of unencrypted data. Followed by some knee-jerk reaction to codify specific hardware/software into a unified architectural approach. Followed by lack of capability. Shampoo, rinse, repeat.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group