World Library  
Flag as Inappropriate
Email this Article

Bring your own device


Bring your own device

Bring your own device (BYOD)—also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own PC (BYOPC)—refers to the policy of permitting employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace, and to use those devices to access privileged company information and applications.[1] The term is also used to describe the same practice applied to students using personally owned devices in education settings.[2]

BYOD is making significant inroads in the business world, with about 75% of employees in high growth markets such as Brazil and Russia and 44% in developed markets already using their own technology at work.[3] Surveys have indicated that

  • 7 Myths About BYOD Debunked: BYOD in an education environment, by The Lisa Nielsen
  • Ovum's multi-market Q4 2012 BYOD survey by Ovum
  • Gartner: Security seen as major obstacle to BYOD
  • 6 Reasons To Care About BYOD by Renuka Rana
  • BYOD Design Considerations Guide

External links

  1. ^ BYOD on
  2. ^ Bring Your Own Technology on
  3. ^ "BYOD – Research findings". Logicalis. Retrieved 12 February 2013. 
  4. ^ Rene Millman, ITPro. "Surge in BYOD sees 7/10 employees using their own devices." Aug 12, 2012. Retrieved Jun 5, 2013.
  5. ^ UC Strategies. "BYOD’s Productivity Gains Are “Hard to Calculate” – Study Says." May 1, 2013. Retrieved Jul 11, 2014.
  6. ^ 10 myths of BYOD in the enterprise. TechRepublic.
  7. ^ Cisco ASA + Workspot = BYOD. Workspot.
  8. ^ Happiness Is ... Bringing Your Own Computer Devices to Work. RetailWire.
  9. ^ Casey, Kevin (19 November 2012). "Risks Your BYOD Policy Must Address", InformationWeek. Retrieved 19 June 2013.
  10. ^ "Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices". Gov Info Security. Retrieved 10 January 2013. 
  11. ^ [1]
  12. ^ Lisa Ellis, Jeffrey Saret, and Peter Weed (2012).
  13. ^ "BlackBerry Strategizes For More U.S. Government Clients."
  14. ^ By Melanie Turek, No Jitter."/ California Court Makes BYOD More Costly for Companies." August 19, 2014. Retrieved August 19, 2014.
  15. ^ "2nd Annual State of BYOD Report". Good Technology. 
  16. ^ "Bring your own device (BYOD) policies". Fraud Advisory Panel. 23 June 2014. Retrieved 23 June 2014. 
  17. ^ The U.S. Air Force Research Lab's (AFRL) Leader iPad Pilot did uses this method to provide its researchers unfiltered access to the Internet, reserving its filtered, sensitive network for other use.
  18. ^ [2]
  19. ^ 4 Steps to Securing Mobile Devices and Apps in the Workplace -
  20. ^ Wiech, Dean. "The Benefits And Risks Of BYOD". Manufacturing Business Technology. Retrieved 28 January 2013. 
  21. ^ David Weldon, FierceMobileIT. "No one-size-fits-all solution for BYOD policies, panel reveals." May 13, 2014. Retrieved Jul 11, 2014.
  22. ^ Tom Kaneshige, CIO. "Attack of the BYOD-Killing MDM Software." February 4, 2014. Retrieved Jul 15, 2014.
  23. ^ Lauren Weber, Wall Street Journal. "BYOD? Leaving a Job Can Mean Losing Pictures of Grandma." January 21, 2014. Retrieved Jul 15, 2014.
  24. ^ Kaneshige, Tom. "BYOD's Phone Number Problem". 
  25. ^ "BYOD Policy". Logicalis. Retrieved 12 February 2013. 
  26. ^ Jarrett, Marshall. "Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations". Office of Legal Education. Retrieved 15 May 2013. 
  27. ^ "Marine Corps mobile device strategy looks to cut costs."
  28. ^ El Ajou, Nadeen (24 September 2012). "Bring Your Own Device trend is ICT industry's hottest talking point at GITEX Technology Week".  
  29. ^ "BYOD research findings". Logicalis. Retrieved 12 February 2013. 
  30. ^ "90% American workers use their own smartphones for work". 
  31. ^ "What is bring your own device?". 


See also

A company can also see improved productivity from an employee with BYOD as it allows for the ability to easily take the device home and work.

A study[31] by IBM says that 82% of employees think that smartphones play a critical role in business. The study also shows benefits of BYOD include increased productivity, employee satisfaction, and cost savings for the company. Increased productivity comes from a user being more comfortable with their personal device; being an expert user makes navigating the device easier, increasing productivity. Additionally, personal devices are often more cutting edge as company technology refreshes don't happen as often. Employee satisfaction, or job satisfaction, occurs with BYOD by allowing the user to use the device they have selected as their own rather than one selected by the IT team. It also allows them to carry one device as opposed to one for work and one for personal. Cost savings can occur on the company end because they now would not be responsible for furnishing the employee with a device, but is not a guarantee.

Many industries are adopting BYOD quicker than others. A recent study[30] by Cisco partners of BYOD practices stated that the education industry has the highest percentage of people using BYOD for work at 95.25.


According to research by Logicalis, high-growth markets (including Brazil, Russia, India, UAE, and Malaysia) demonstrate a much higher propensity to use their own device at work. Almost 75% of users in these countries did so, compared to 44% in the more mature developed markets.[29]

The Middle East has one of the highest adoption rates (about 80%) of the practice worldwide in 2012.[28]


Another important issue with BYOD is of scalability and capability. Many organisations today lack proper network infrastructure to handle the large traffic which will be generated when employees will start using different devices at the same time. Nowadays, employees use mobile devices as their primary devices and they demand performance which they are accustomed to. Earlier smartphones did not use a lot of data and it was easy for Wireless LAN to handle that amount of data, but today smartphones can access webpages as quickly as most PCs do and have applications that use radio and voice at high bandwidths, hence increasing demand from WLAN infrastructure.

The USMC is seeking to outsource the security requirements of their BYOD policy to commercial carriers such as Sprint, Verizon, and AT&T.[27]

A challenging but important task for companies who utilize BYOD is to develop a policy that defines exactly what sensitive company information needs to be protected and which employees should have access to this information, and then to educate all employees on this policy.

If sensitive, classified, or criminal data lands on a U.S. government employee's device, the device is subject to confiscation.[26]

International research reveals that only 20% of employees have signed a BYOD policy.[25]

A key issue of BYOD which is often overlooked is BYOD's phone number problem, which raises the question of the ownership of the phone number. The issue becomes apparent when employees in sales or other customer-facing roles leave the company and take their phone number with them. Customers calling the number will then potentially be calling competitors which can lead to loss of business for BYOD enterprises.[24]

While MDM provides organizations with the ability to control applications and content on the device, research has revealed controversy related to employee privacy and usability issues that lead to resistance in some organizations.[22] Corporate liability issues have also emerged when businesses wipe devices after employees leave the organization.[23]

Several market and policies have emerged to address BYOD security concerns, including mobile device management (MDM), containerization and app virtualization.[21]

BYOD has resulted in data breaches.[18] For example, if an employee uses a smartphone to access the company network and then loses that phone, untrusted parties could retrieve any unsecured data on the phone.[19] Another type of security breach occurs when an employee leaves the company, they do not have to give back the device, so company applications and other data may still be present on their device.[20]

[17] BYOD security relates strongly to the

Various risks arise from BYOD, and agencies such as the UK Fraud Advisory Panel encourage organisations to consider these and adopt a BYOD policy.[16]


The proliferation of devices such as tablets and smartphones, which are now used by many people in their daily lives, has led to a number of companies allowing employees to bring their own devices to work, due to perceived productivity gains and cost savings. The idea was initially rejected due to security concerns but more and more companies are now looking to incorporate BYOD policies, with 95% of respondents to a BYOD survey saying they either already supported BYOD or were at least considering supporting it.[15]

New trends

In August 2014, a California court ruled that companies must now reimburse any work calls done on any employee's personal phone in the state (Labor Code section 2802).[14]

In 2012, the U.S.A Equal Employment Opportunity Commission adopted a BYOD policy, but many employees continued to use their government-issued BlackBerrys because of concerns about billing, and the lack of alternative devices.[13]

The term BYOD first entered common use in 2009, courtesy of Intel when it recognized an increasing tendency among its employees to bring their own devices (i..e., smartphones, tablets and laptop computers) to work and connect them to the corporate network.[10] However, it took until early 2011 before the term achieved any real prominence when IT services provider Unisys and software vendor Citrix Systems started to share their perceptions of this emergent trend. BYOD has been characterized as a feature of the "consumer enterprise" in which enterprises blend with consumers.[11] This is a role reversal in that businesses used to be the driving force behind consumer technology innovations and trends. [12]



  • History 1
  • New trends 2
  • Issues 3
  • Prevalence 4
  • Advantages 5
  • See also 6
  • References 7
  • External links 8


This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.