Close Menu
    Facebook X (Twitter) Instagram
    • Our Story
    • Partner with us
    • Reach Us
    • Career
    Subscribe Newsletter
    HR KathaHR Katha
    • Exclusive
      • Exclusive Features
      • Research
      • Point Of View
      • Case In Point
      • Dialogue
      • Movement
      • Profile
      • Beyond Work
      • Rising Star
      • By Invitation
    • News
      • Global HR News
      • Compensation & Benefits
      • Diversity
      • Events
      • Gen Y
      • Hiring & Firing
      • HR & Labour Laws
      • Learning & Development
      • Merger & Acquisition
      • Performance Management & Productivity
      • Talent Management
      • Tools & Technology
      • Work-Life Balance
    • Special
      • Cover Story
      • Editorial
      • HR Forecast 2024
      • HR Forecast 2023
      • HR Forecast 2022
      • HR Forecast 2021
      • HR Forecast 2020
      • HR Forecast 2019
      • New Age Learning
      • Coaching and Training
      • Learn-Engage-Transform
    • Magazine
    • Reports
      • Whitepaper
        • HR Forecast 2024 e-mag
        • Future-proofing Manufacturing Through Digital Transformation
        • Employee Healthcare & Wellness Benefits: A Guide for Indian MSMEs
        • Build a Future Ready Organisation For The Road Ahead
        • Employee Experience Strategy
        • HRKatha 2019 Forecast
        • Decoding and Driving Employee Engagement
        • One Platform, Infinite Possibilities
      • Survey Reports
        • Happiness at Work
        • Upskilling for Jobs of the Future
        • The Labour Code 2020
    • Conferences
      • Rising Star Leadership Awards
      • HRKatha Futurecast
      • Automation.NXT
      • The Great HR Debate
    • HR Jobs
    WhatsApp LinkedIn X (Twitter) Facebook Instagram
    HR KathaHR Katha
    Home»Exclusive Features»Is it safe to BYOD to work?
    Exclusive Features

    Is it safe to BYOD to work?

    mmBy Prajjal Saha | HRKathaAugust 8, 20165 Mins Read1650 Views
    Share LinkedIn Twitter Facebook
    Share
    LinkedIn Twitter Facebook

    Bring Your Own Device offers some interesting benefits to employers and employees both, yet a lot of organisations are giving up on this idea

    Bring your Own Device or BYOD is not a new concept. However, it seems organisations are still in a fix about whether to adopt it or not. Organisations that did, failed miserably only to later realise that they did not have the required data security measures to allow people the use of their own systems. On the other hand, organisations that do have the right kind of security and monitoring measures, only make the employees utterly uncomfortable about using their personal devices at work, as they risk exposing even their personal usage to the employers. Looks like it doesn’t seem safe for either employer or employee to adopt BYOD.

    Bring your Own Technology (BYOT) or Bring your own Phone (BYOP) or Bring your own Personal Computer (BYOPC) are all related to the broader bring your own device idea. This refers to the policy where an organisation allows employees to carry their personal devices to the workplace and use them to access corporate network or data. Intel first adopted it in 2009. Sriharsha A Achar, chief people officer & chief information security officer, Apollo Munich Health Insurance, shares, “Adoption of BYOD in high growth markets is touching 60–70 per cent and is making significant inroads in the business world. The Middle East had one of the highest adoption rates — about 80 per cent of the practice worldwide in 2012. However, as per the recent survey, organisations are moving out slowly from BYOD.”

    Sriharsha Achar

    BYOD offers some interesting benefits to both the employers and the employees, such as improved productivity owing to the comfort level with one’s own device and reduced cost for the company. However, the reasons why a lot of organisations are giving up on the idea lately are even more. Some of the common cons of BYOD are — additional cost towards protecting the device, risking data and systems to attacks and malware, and even corporate liability in case of fraud. In addition, as Achar says, “It is a little bit trickier telling an employee what is, or is not, an acceptable use of their own laptop or smartphone. There might also be cases of non-compliance to the Acceptable Use Policy.” Worse, if workers are terminated or leave the company of their own accord, segregating and retrieving company data can be a bigger problem.

    An employee of one of the telecom majors with a BYOD policy, shared with us that he had the entire security system installed on his personal computer, but when he left the job, to his dismay—on his last day at work— his personal computer was formatted, with most of the key hardware disabled and with the OS lost. This is a case of someone who had agreed to the terms of the company — when he started working there — believing that when he leaves the organisation, his system will be restored to the same settings as it had before the company installed its own. However, the organisation simply safeguarded itself by retrieving what was theirs, deleting the rest and leaving the employee empty-handed.

    “In today’s context when information security is at its peak, it becomes difficult to deploy BYOD in a company like ours. While we tried to do it at some point in time, there was resistance because people did not want to get the company’s security system installed on their laptops.”

    Achar shares how people reacted when at Apollo Munich, they discussed the idea of a BYOD internally. He says, “In today’s context when information security is at its peak, it becomes difficult to deploy BYOD in a company like ours. While we tried to do it at some point in time, there was resistance because people did not want to get the company’s security system installed on their laptops.” Moreover, at the senior management levels, where data sensitivity is high and most systems have to be encrypted, Achar believes that a BYOD policy becomes all the more difficult to implement. “Since people are not comfortable with the information security system monitoring their personal devices, as a policy we are unable to bring in BYOD”, Achar adds. In fact, people are also concerned about the accountability of the company, in case something goes wrong with their systems when at work.

    On the other hand, where an organisation lacks the appropriate information security methods or the recovery process after an employee decides to leave the organisation, the vulnerability rises and the insecurity leads to organisations taking extreme measures, which probably was also the case with this employee who was left with a personal laptop good for nothing!

    “Unless and until there is a strong and agreeable policy, which is understood and signed off by the people who will use BYOD, it is going to be challenging to execute it”, says Achar.

    The vulnerability of course, is high, as on a personal system it is very difficult to monitor and sometimes differentiate personal and professional usage. What might seem as a professional threat, may at times just be a personal action, while something harmful may as well at times go unnoticed. When organisations get into the control mode, then sending out even simple e-mails from the company domain also become difficult. Such monitoring will only result in more administrative hassles.

    BYOD puts organisations into a dilemma of how much to control and what to let go of. However strong the security measures may be, the ever-developing world of technology will always come up with new hacks, which is why a lot of companies are now drifting away from BYOD.

    Apollo Munich Health Insurance Bring Your Own Device Bring your own Personal Computer Bring your own Phone Bring your Own Technology BYOD BYOD policy BYOP BYOPC BYOT Corporate fraud Corporate liability Information security Information security system Sriharsha A Achar Workplace
    Share. LinkedIn Twitter Facebook
    mm
    Prajjal Saha | HRKatha

    Dr. Prajjal Saha, editor and publisher of HRKatha since 2015, leverages over 25 years of experience in business journalism, writing, and editing. He founded HRKatha to provide insightful analysis on the evolving workplace. With expertise spanning HR, marketing, distribution, and technology, Saha has a deep understanding of business dynamics. His authorship of the acclaimed Marketing White Book highlights his versatility beyond HR. A trusted voice across industries, his clear and thoughtful commentary has earned him a reputation for thought leadership, making him a reliable source of knowledge and insights for professionals navigating the complexities of the business world.

    1 Comment

    1. Dr M Ramakrishnan on August 8, 2016 6:20 am

      It is intersting article. Nature of assignment determines whether we permit Laptop of employee for official work. For example Sales force data, R & D data

      Reply
    Leave A Reply Cancel Reply

    one + nine =

    Related Posts

    Meta offering $100 million bonuses to lure OpenAI talent? 

    June 18, 2025

    Employee turns suspension into vacation after refusing weekend work

    June 18, 2025

    Karnataka launches study to map AI’s impact on IT jobs and skills

    June 18, 2025

    Amazon to shrink corporate workforce amid rise of AI tools

    June 18, 2025

    QUICK HR INSIGHTS

    EDITOR'S PICKS

    Psychological safety: the new superpower in winning the talent war

    June 18, 2025

    How entitlement is quietly reshaping the modern workplace

    June 18, 2025

    How Raymond stitched tradition to transformation

    June 17, 2025

    Why career progression no longer needs a managerial badge

    June 16, 2025
    Latest Post

    Meta offering $100 million bonuses to lure OpenAI talent? 

    News June 18, 2025

    Artificial intelligence (AI) talent is clearly in high demand. Meta, it is reported, has offered…

    Employee turns suspension into vacation after refusing weekend work

    News June 18, 2025

    A workplace suspension turned into an unexpected holiday for one employee who refused to work…

    Karnataka launches study to map AI’s impact on IT jobs and skills

    News June 18, 2025

    To future-proof its technology workforce, the Government of Karnataka has initiated a landmark study to…

    Psychological safety: the new superpower in winning the talent war

    By Invitation June 18, 2025

    In today’s job market, companies are facing a growing challenge— how to stop good employees…

    Asia's No.1 HR Platform

    Facebook X (Twitter) Instagram LinkedIn WhatsApp Bluesky
    • Our Story
    • Partner with us
    • Career
    • Reach Us
    • Exclusive Features
    • Cover Story
    • Editorial
    • Dive into the Future of Work: Download HRForecast 2024 Now!
    © 2025 HRKatha.com
    • Disclaimer
    • Refunds & Cancellation Policy
    • Terms of Service

    Type above and press Enter to search. Press Esc to cancel.