Choose the correct path to build a successful BYOD strategy
You've decided to embrace BYOD policies!
...But where do you begin?
Click the arrows to select your answer. Click an X to return to the question.
Had you sent out a newsletter, it might have gotten overlooked, meaning few employees would be aware of the awesome, new BYOD program.
At the all-staff provide details to let employees know how eligibility is determined & next steps for enrollment.
Make sure to prepare an overview of allowed devices, applications & data management policy.
Had you sent a #everyone email – Employees would’ve immediately embraced the new BYOD program before eligibility, enrollment & crucial use policies were rolled out.
Follow up with an outline of roles that are eligible for BYOD and offer a detailed explanation of which devices and channels are allowed?
Write yourself a note to look into capture and archive of social media, text, & instant message communications within the next year?
Email is already being archived - good job!
Prohibit text and instant messaging for employees using BYOD devices? They can be trusted to abide by the rules.
If you’re only capturing email, your risk is off the charts! Text, IM and collaboration communications sent on BYOD devices still must be supervised!
Well done! Your employees understand the BYOD program rules thoroughly and begin applying for eligibility, and signing user agreements.
Attempts to prohibit texts and instant messages without employees signing a letter of attestation will cause your risk to skyrocket.
Let BYOD communications begin! Employees were briefed, you can get formalize use policies in place in the next phase.
Almost! Draft and deliver BYOD use policies, communication policies, get employee signatures on legal user agreements. Set up data archiving.
Good enough! A whitelist/blacklist of apps will be created soon – you assume employees will hold off downloading apps until you deliver it.
Without use policies, app whitelist/blacklists or user agreements in place, a BYOD program can quickly fall into chaos, causing more problems than it solves!
In the absence of a whitelist/blacklist - employees
are likely to download cutting-edge apps, popular with clients & external colleagues in a heartbeat.