In our modern working world, new methods are constantly being developed to facilitate collaboration. When employees had to work from home overnight during the coronavirus pandemic, this reinforced the already growing BYOD trend. Find out how this concept works and what companies need to consider when introducing Bring Your Own Device here.
BYOD is the abbreviation for "Bring your own Device", which means "Bring your own end device". This term refers to the fact that private smartphones, laptops and tablets are integrated into closed networks. These include schools, universities and libraries as well as those of companies.
More and more employees are allowed to work with their own end devices - and the trend is continuing to rise, according to a recent analysis by market research company Mordor Intelligence. For companies, this means that employees use their favourite laptops or smartphones for their work. They then download company-specific applications and programmes onto their personal devices. This allows them to carry out their work on their personal laptop at any time and from anywhere.
The first level of BYOD is the unregulated form. It allows employees to use their private end devices for business purposes without any guidelines or security measures from the company. This leads to considerable security risks, as company data is stored unencrypted on external devices.
In the second level of BYOD, companies have established firm security policies, privacy policies and regulations for the use of personal devices in the workplace. Although this level offers significantly more security than the first, it requires a certain degree of personal responsibility on the part of employees. After all, it is up to them to adhere to these regulations - if they don't, sensitive data can fall into the wrong hands.
The third level describes a fully managed BYOD model in which organisations implement strict security and management measures for BYOD devices. This can include only allowing employees to use devices and operating systems that the employer deems secure. It also allows companies to manage and remotely access the devices concerned, for example. This level offers the highest level of security and the greatest control for the company.
BYOD policies should address the following points in particular:
According to Art. 4 No. 7 GDPR, the employer is also responsible for the devices on which business-related processes are carried out if they do not belong to him and he only has limited access. Restricted access refers to the fact that only company-specific data may be viewed by the IT administrator on private end devices. This means that it is much more difficult to detect risks as not all programmes can be accessed.
BYOD allows employees to process personal data on personal devices. For this to be GDPR-compliant, companies must comply with the applicable data protection laws and regulations that govern the protection of personal data. This may include obtaining consent from employees to process their data, implementing appropriate data protection measures and reporting data breaches.
The labour law firm Taylor Wessing clarifies: In principle, the employer is obliged to provide the work equipment required for work performance. If he fails to do so, the employee can use his own end device for work purposes under certain conditions. In this case, it is essential that it is determined in advance who will bear the costs of the device in the event of loss, theft or damage. However, not every employee is convinced by BYOD, as companies have deep access to personal end devices. This can give the impression that the employer is stingy, which in turn can reduce acceptance of the concept as well as employee satisfaction and work motivation.
There are also risks for the employer in that private and company data are not clearly separated from each other on a private laptop. This increases the risk of sensitive data being stored or copied without authorisation and falling into the hands of third parties. To avoid this, detailed BYOD guidelines based on current data protection concepts are a must.
Before companies allow their employees to work on business matters using their own devices, a policy is essential. Computerweekly recommends that the policy covers the following points:
To conclude such a works agreement, templates such as the one from Haufe on "§ 6 Transfer and use of work equipment / VI. Works agreement: Bring Your Own Device (BYOD)" are suitable.
BYOD solutions are technologies, strategies and approaches that companies use to enable their employees to use their personal devices at work - while ensuring the security of company data and compliance with company guidelines. These include
BYOD management takes over the management and control of personal devices used by employees in a company for business purposes. The aim of BYOD management is to ensure the security, compliance and efficiency of these devices.
The BYOD app is a software application that is installed on employees' personal devices and gives them access to business applications. The BYOD app enables the clear separation of professional and personal data. It also increases the security of company-specific information, as it can be monitored and managed remotely.
Managing BYOD with the cloud-based software solution Microsoft Intune has proven its worth. This gives administrators access to all mobile devices in the company network so that they can update and uninstall applications. The ACMP Intune Connector is suitable for optimising the use of this solution in practice with an existing UEM application. This provides a better overview and standardises the interfaces in the ACMP Console.
In addition to the technical requirements - i.e. that every employee has the necessary mobile devices for private use - the legal requirements must also be met. In addition, the use of private work equipment is subject to co-determination by the works council in accordance with Section 87 of the Works Constitution Act (Betriebsverfassungsgesetz, BetrVG), Section 87 (1) No. 6 BetrVG (introduction and use of technical equipment), Section 87 (1) No. 1 BetrVG (organisation of the company with specifications on usage behaviour) and Section 87 (1) No. 2, 3 BetrVG (working hours).
If a company introduces a BYOD strategy, it is essential that all employees are aware of it and agree to it. In addition, various training courses on malware and guidelines are necessary so that every employee can work with their end device without causing damage to the company.
Once written guidelines have been drawn up and all employees have been trained, technical measures such as MDM, encryption, authentication, network access controls and security monitoring are introduced.
Model | BYOD | COPE | CYOD | COBO |
Meaning | Bring your own device | Corporate-owned, personally enabled | Choose your own Device | Corporate, Business only |
summary | Employees may use private devices for business purposes. | Company provides employees with devices not only for business purposes, but also for personal use. | Company provides employees with a selection of mobile devices from which they may choose which one they use for business purposes. | Device provided by the company may only be used for business purposes. |
Per | Employees have control over device selection. | Employers control the range of devices they support. | Employees have a choice of devices. | The IT department controls the device and the applications on it to ensure maximum security and ease of management. |
Per | Employees use the same phone for work and personal use. | Employees receive the benefits of a mobile device without bearing all or part of the associated costs. | The IT department determines the scope of device diversity, e.g. that only Apple iOS products are used. | The workforce is mobile. |
Contra | Comprehensive BYOD guidelines are necessary to ensure data protection and privacy. | Employees expect the freedom to choose, upgrade and share mobile devices - restrictions are undesirable. | Employees may already have a personal mobile device. | Employees have limited flexibility and control |
Contra | IT department manages an unlimited number of devices and operating systems. | Cost and management trade-offs with a mobile device plan. | Companies are responsible for devices on which personal information and applications are stored. | The organisation is responsible for the cost and management of the devices. |
Use Case | In organisations where employees already install work email and other applications on personal devices. | In organisations with security and compliance restrictions that still want to enable a mobile, flexible workforce. | In organisations where employees do not already have personal mobile devices or where the IT department needs to streamline mobile device management. | Workplaces that require certain applications/mobile device functions outside the workplace. Devices can be shared between employees. |
Although BYOD offers many benefits such as flexibility and cost savings, it also brings challenges in terms of security and data protection. Organisations need to address these challenges by implementing appropriate security measures, ensuring compliance and training employees in security awareness and practices. With the right measures and precautions, BYOD can be used safely and effectively in an organisation.
Es scheint, als wären Sie auf nicht auf der gewünschten Sprachversion dieser Website gelandet. Möchten Sie wechseln?