{"id":16716,"date":"2021-10-18T07:23:36","date_gmt":"2021-10-18T07:23:36","guid":{"rendered":"https:\/\/businessadapter.es\/working-with-personal-devices\/"},"modified":"2024-12-11T10:48:47","modified_gmt":"2024-12-11T10:48:47","slug":"working-with-personal-devices","status":"publish","type":"post","link":"https:\/\/businessadapter.es\/en\/working-with-personal-devices\/","title":{"rendered":"Working with personal devices"},"content":{"rendered":"\n<h2 style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Working with personal devices (BYOD)<\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\">Times change, and so do fashions, and <strong>working with personal devices<\/strong> is<strong> an<\/strong> increasingly common trend applied to the dynamics of work.<\/p>\n<p style=\"text-align: justify;\"><strong>Working with personal devices or<\/strong> <strong>BYOD <\/strong><em>(Bring Your Own Device<\/em>) is a company policy whereby employees use their own personal devices to work and access company resources such as:<\/p>\n<ul style=\"text-align: justify;\">\n<li>E-mail access<\/li>\n<li>Access to databases<\/li>\n<li>Access to computer applications<\/li>\n<li>Access to servers<\/li>\n<li>Etc.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">And as we have said, this trend is becoming more and more widespread as <a href=\"https:\/\/www.incibe.es\/protege-tu-empresa\/blog\/tematicas-byod-bring-your-own-device\" target=\"_blank\" rel=\"noopener\">it is estimated that 90% of employees<\/a> use their own devices in some way to access company information. In this case it seems logical to have an internal regulation, but first let&#8217;s take a closer look at what it means to work with personal devices. <\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Benefits of working with personal devices<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">We expose the factors understood as <strong>benefits<\/strong> of <strong>working with personal devices <\/strong>in the business and work environment:<a href=\"https:\/\/businessadapter.es\/ciberseguridad\/\"><img decoding=\"async\" class=\"wp-image-8730 alignright\" src=\"https:\/\/businessadapter.es\/wp-content\/uploads\/2021\/10\/office-work-1149087_1920-300x200.jpg\" alt=\"\" width=\"561\" height=\"374\" srcset=\"https:\/\/businessadapter.es\/wp-content\/uploads\/2021\/10\/office-work-1149087_1920-300x200.jpg 300w, https:\/\/businessadapter.es\/wp-content\/uploads\/2021\/10\/office-work-1149087_1920-1024x683.jpg 1024w, https:\/\/businessadapter.es\/wp-content\/uploads\/2021\/10\/office-work-1149087_1920-768x512.jpg 768w, https:\/\/businessadapter.es\/wp-content\/uploads\/2021\/10\/office-work-1149087_1920-1536x1024.jpg 1536w, https:\/\/businessadapter.es\/wp-content\/uploads\/2021\/10\/office-work-1149087_1920-900x600.jpg 900w, https:\/\/businessadapter.es\/wp-content\/uploads\/2021\/10\/office-work-1149087_1920-scaled.jpg 1200w\" sizes=\"(max-width: 561px) 100vw, 561px\" \/><\/a><\/p>\n<h4 style=\"text-align: justify;\"><strong>For the company<\/strong><\/h4>\n<ol style=\"text-align: justify;\">\n<li>Reduced spending<\/li>\n<li>Increased productivity<\/li>\n<\/ol>\n<h4 style=\"text-align: justify;\"><strong>For workers<\/strong><\/h4>\n<ol style=\"text-align: justify;\" start=\"3\">\n<li>Labor flexibility<\/li>\n<\/ol>\n<h2 style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Disadvantages of BOYD<\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\">We expose the factors considered as <strong>disadvantages<\/strong> of <strong>working with personal devices <\/strong>in the business and work environment:<\/p>\n<h4 style=\"text-align: justify;\"><strong>For the company<\/strong><\/h4>\n<ol style=\"text-align: justify;\" start=\"4\">\n<li>IT staff reinforcement <\/li>\n<li>Information security risk and risk of sanctions for non-compliance with regulations<\/li>\n<\/ol>\n<h4 style=\"text-align: justify;\"><strong>For employees<\/strong><\/h4>\n<ol style=\"text-align: justify;\" start=\"6\">\n<li>Own resources expense<\/li>\n<\/ol>\n<h2 style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Evaluate to decide<\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\">We will try to help our customers and supporters evaluate whether the benefits outweigh the disadvantages of applying the BOYD policy.<\/p>\n<p style=\"text-align: justify;\">To this end, we have prepared a table as a customizable tool, in which we will set out the 6 factors detailed above (benefits and drawbacks) and give them a value for each one from 1 to 10, with 1 being the least important and 10 the most important. These values could be quantified in economic terms or other factors that help to identify the importance of each factor within the company. The idea is to offer a simple tool that would serve as a starting point to get a preliminary idea and with the result to know whether to discard or proceed to a deeper analysis.    <\/p>\n<p style=\"text-align: justify;\">Obviously, we give the value that in our opinion has each factor, but the interesting thing is that each company customizes it according to their circumstances or their own criteria. The number of devices to be managed or the type of data influences in a different way, i.e., it is not the same that data on office furniture measurements are exposed than patient medical records. <\/p>\n<p style=\"text-align: justify;\">Our hypothetical case of feasibility evaluation of a policy of <strong>working with personal devices<\/strong>, is a small company of 50 employees whose activity is the wholesale of office furniture:<\/p>\n<table style=\"width: 100%; height: 305px;\" width=\"453\">\n<tbody>\n<tr style=\"height: 61px;\">\n<td style=\"height: 61px;\" width=\"132\">\n<p><strong>BOYD Benefits<\/strong><\/p>\n<\/td>\n<td style=\"height: 61px;\" width=\"76\">\n<p style=\"text-align: center;\"><strong>Value<\/strong><\/p>\n<\/td>\n<td style=\"height: 61px;\" width=\"180\">\n<p><strong>Disadvantages BOYD<\/strong><\/p>\n<\/td>\n<td style=\"height: 61px;\" width=\"66\">\n<p style=\"text-align: center;\"><strong>Value<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 61px;\">\n<td style=\"height: 61px;\" width=\"132\">\n<p>Reduced spending<\/p>\n<\/td>\n<td style=\"text-align: center; height: 61px;\" width=\"76\">\n<p>7<\/p>\n<\/td>\n<td style=\"height: 61px;\" width=\"180\">\n<p>Strengthen IT Dept. <\/p>\n<\/td>\n<td style=\"text-align: center; height: 61px;\" width=\"66\">\n<p>5<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 61px;\">\n<td style=\"height: 61px;\" width=\"132\">\n<p>Increased productivity<\/p>\n<\/td>\n<td style=\"text-align: center; height: 61px;\" width=\"76\">\n<p>8<\/p>\n<\/td>\n<td style=\"height: 61px;\" width=\"180\">\n<p>Security risk and sanction<\/p>\n<\/td>\n<td style=\"text-align: center; height: 61px;\" width=\"66\">\n<p>10<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 61px;\">\n<td style=\"height: 61px;\" width=\"132\">\n<p>Labor flexibility<\/p>\n<\/td>\n<td style=\"text-align: center; height: 61px;\" width=\"76\">\n<p>9<\/p>\n<\/td>\n<td style=\"height: 61px;\" width=\"180\">\n<p>Own resources expense<\/p>\n<\/td>\n<td style=\"text-align: center; height: 61px;\" width=\"66\">\n<p>7<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 61px;\">\n<td style=\"height: 61px;\" width=\"132\">\n<p><strong>Total Benefits<\/strong><\/p>\n<\/td>\n<td style=\"text-align: center; height: 61px;\" width=\"76\">\n<p><strong>26<\/strong><\/p>\n<\/td>\n<td style=\"height: 61px;\" width=\"180\">\n<p><strong>Total Disadvantages<\/strong><\/p>\n<\/td>\n<td style=\"text-align: center; height: 61px;\" width=\"66\">\n<p><strong>22<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>In our assumption, the benefits outweigh the disadvantages, so this would be the starting point to analyze in more detail the economic issues, valuation of the workers, etc.<\/p>\n<p style=\"text-align: justify;\">It is possible that the factors may also be different from one company to another, so it is vital that each entity evaluates its own pros and cons of using this modality, and in case of opting for the BOYD policy, all possible precautions are taken to avoid ending up being victims of a security incident and possible sanctions in terms of personal data protection (GDPR), <u>which would be the greatest economic risk to which we would be exposed<\/u>.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Having expert professionals<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">We noticed a very common problem and that is that many companies are not prepared to implement all the technical and organizational measures for a policy of <strong>working with personal devices<\/strong>.  <\/p>\n<p style=\"text-align: justify;\">In addition to approving the mode of <strong>working with personal devices<\/strong>, other corporate security policies must be developed that contemplate the decision to opt for the BOYD mode. For example: <\/p>\n<p style=\"text-align: justify;\">-Authentication policies and passwords<\/p>\n<p style=\"text-align: justify;\">-Networking policy<\/p>\n<p style=\"text-align: justify;\">-Personnel Rules on the use of the information system and personal data<\/p>\n<p style=\"text-align: justify;\">-Security Breach Communication Policies<\/p>\n<p style=\"text-align: justify;\">-Periodic audits and controls<\/p>\n<p>-Training in data protection, information security and cybersecurity.<\/p>\n<p style=\"text-align: justify;\">-etc., etc.<\/p>\n<p style=\"text-align: justify;\">It is obvious that everything is easier if we count <strong>on experts in <\/strong><a href=\"https:\/\/businessadapter.es\/ciberseguridad\/\"><strong>Cybersecurity<\/strong><\/a><strong> y <\/strong><a href=\"https:\/\/businessadapter.es\/en\/\"><strong>Data Protection<\/strong><\/a>It is obvious that everything is simpler if we have experts in Cybersecurity and Data Protection<strong>,<\/strong> who elaborate these policies, who advise us on the most appropriate options taking into account the peculiarities of each company.<\/p>\n<p style=\"text-align: justify;\">In conclusion, there is no doubt that <strong>BYOD<\/strong> is taking hold and everything points to the fact that it will continue to spread.<\/p>\n<p style=\"text-align: justify;\">However, to enjoy the advantages of this trend, count on professionals to advise you.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #800000;\">We help you<\/span><\/h3>\n<p>Business Adapter\u00ae is an expert consultant in Data Protection Law and Cybersecurity solutions. Do not hesitate to contact us without obligation. <\/p>\n<h4 style=\"text-align: center;\"><span style=\"display: inline !important; float: none; background-color: transparent; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">[su_button url=&#8221;https:\/\/businessadapter.es\/contacto&#8221; target=&#8221;blank&#8221; background=&#8221;#f6f903&#8243; color=&#8221;#181818&#8243; size=&#8221;7&#8243; center=&#8221;yes&#8221; icon_color=&#8221;#000000&#8243;]We help you[\/su_button]<\/span><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>Working with personal devices (BYOD) Times change, and so do fashions, and working with personal devices is an increasingly common [&hellip;]<\/p>\n","protected":false},"author":1373,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75],"tags":[],"class_list":["post-16716","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/users\/1373"}],"replies":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/comments?post=16716"}],"version-history":[{"count":1,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16716\/revisions"}],"predecessor-version":[{"id":16718,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16716\/revisions\/16718"}],"wp:attachment":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/media?parent=16716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/categories?post=16716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/tags?post=16716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}