{"id":1918,"date":"2013-02-19T16:32:37","date_gmt":"2013-02-19T16:32:37","guid":{"rendered":"https:\/\/blogs.poly.com\/?p=425"},"modified":"2013-02-19T16:32:37","modified_gmt":"2013-02-19T16:32:37","slug":"the-ten-commandments-of-byod","status":"publish","type":"post","link":"https:\/\/blogs.poly.com\/the-ten-commandments-of-byod\/","title":{"rendered":"The Ten Commandments of BYOD"},"content":{"rendered":"
Create Thy Policy before Procuring Technology \u2013 This step couldn\u2019t be more important.\u00a0 Having your policy set in place is crucial to having a successful deployment of any management technology.<\/p>\n
Seek the Flocks Devices \u2013 Understanding what devices your users have, and how many they use is very important.\u00a0 If you don\u2019t do your due diligence, you will have a network built for 250 devices, and have 500 devices connection to it.<\/p>\n
Enrollment Shall Be Simple \u2013 Keeping it simple should be a cornerstone of every rollout, especially with BYOD.\u00a0 Users shouldn\u2019t have to break a sweat to enroll a device and configure it.\u00a0 This however should not interfere with your corporate or IT policies.<\/p>\n
Thou Shalt Configure Devices Over-the-Air \u2013 Neither IT nor your users have the time to configure devices one by one.\u00a0 Over the air setup is really the only way you can get anything done efficiently.<\/p>\n
Give Thy Users Self-Service \u2013 This ties in with the time savings of the last item, but also allows them to perform their own password resets, locate a lost device, wipe a lost device remotely, and other functions.<\/p>\n
Hold Sacred Personal Information \u2013 Keeping personal information private is important to keeping your user’s trust.\u00a0 Make clear your policies on the sharing and viewing of personal data including emails, contacts, calendars, text messages, call history, and voicemails.<\/p>\n
Part the Seas of Corporate and Personal Data \u2013 There is a fine line between work and personal when using your own device at work, so it is up to you to make that line clear.\u00a0 Finding a middle ground that is agreeable for both IT and for users is key.\u00a0 IT should be backing up and protecting corporate apps and files, but not user’s personal files like pictures and videos.<\/p>\n
\nManage Thy Data Usage \u2013 If you are footing the bill for the mobile data, make sure you set a data limit, setup automatic connection to WiFi, or only pay a stipend to users for a certain amount.\u00a0 Give them a warning though if they are about to go over, otherwise you will end up with angry employees.<\/p>\n
Monitor Thy Flock \u2013 Make sure devices are up to standards.\u00a0 Make sure you check for devices that are out of compliance due to missing updates, out of date OS versions, or unacceptable software.\u00a0 These can be fixed with remote wipes or a text message asking to perform the updates\/remove the software.<\/p>\n
Drink from the Fountain of ROI \u2013 Remember that what worked for your last company may not work for this one.\u00a0 Each company is unique and needs its own model, but with a little preparation, BYOD can increase efficiency.<\/p>\n
Source<\/a>\u00a0from Maas360<\/a><\/p>\n","protected":false},"excerpt":{"rendered":" Create Thy Policy before Procuring Technology \u2013 This step couldn\u2019t […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[508],"tags":[858,442,392],"_links":{"self":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/1918"}],"collection":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/comments?post=1918"}],"version-history":[{"count":0,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/1918\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/media?parent=1918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/categories?post=1918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/tags?post=1918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}