As part of our continuing webinar series we explore the phenomenon of BYOD and discuss various approaches for creating an effective BYOD policy for your organization.
1. June 26, 2014 presented by…
Johan Hammerstrom
Community IT Innovators
Webinar Series
Build Your Own
BYOD Policy
2. Webinar Tips
• Ask questions
Post questions via chat
• Interact
Respond to polls during webinar
• Focus
Avoid multitasking. You may just miss the best part of
the presentation
• Webinar PowerPoint & Recording
PowerPoint and recording links will be shared after the
webinar
3. About Community IT
Community IT Innovators partners with nonprofits to help them solve
their strategic & day-to-day IT challenges.
Strategic
Proactive approach so you can make IT decisions that support your
mission and grow with you
Collaborative
Team of over 40 staff who empower you to make informed IT choices
Invested
We are committed to supporting your mission, and take care of your IT
network as if it were our own
Nonprofit focus
Worked with over 900 nonprofits since 1993
19. • Email
• Files
Data
•Exchange Server
•File ServerServices
• Outlook
• Word, Excel, PowerPointApps
• WindowsOS
• Dell, HP, LenovoHardware
20. • Email
• Files
Data
•Exchange Server
•File ServerServices
• Outlook
• Word, Excel, PowerPointApps
• WindowsOS
• Dell, HP, LenovoHardware
21. • Email
• Files
Data
•Office 365, Google Apps
•Box, DropBox, OneDriveServices
• Outlook, mobile mail
• Word, Excel, PowerPointApps
• Windows, OS X, iOSOS
• PC, Tablet, MobileHardware
32. 1. Information Security Risks
a) Organization
– Data leakage
– Vector into the company
b) Personal
– Onerous security measures
– Loss of full control of device
33. 2. Legal Risks
a) Organization
– Lack of certainty in case law and legislation
b) Personal
– Personal device could be confiscated
– Personal blurs into the corporate
34. 3. Financial Risks
a) Organization
– Stipends can be more expensive than a single
corporate plan
– IT Support can become entangled
– Mobile Device Management (MDM) can be expensive
b) Personal
– Stipend may not cover full cost…or any at all
– Can be responsible for own support
35. Build your own BYOD
1. Inventory your data
• How sensitive is it?
• Compliance regulations?
2. Identify work roles
• Access to data
• Remote work requirements
• Flexibility requirements
36. Build your own BYOD
1. Identify Benefits
• Prioritize for your Organization
• Establish your strategy
2. Identify Risks
• Risk = Impact * Likelihood
3. Summarize
• Consider your options
• Summarize in a written policy
37. Program Staff Development Executive
Sensitive Data
Medical Records
Donor Contacts Yes Yes
Financial System Yes
HR Records
Less Sensitive
Email Yes Yes Yes
Grant Proposals Yes Yes
Program Mgmt Yes Yes
38. Program Staff Development Executive
Risks
Info Security low moderate high
Legal low low high
Financial low low moderate
39. Program Staff Development Executive
Benefits
Reduce costs Yes
Work Flexibility Yes Yes
Availability Yes Yes
User adoption Yes
Risks
Info Security low moderate high
Legal low low high
Financial low low moderate
BYOD ltd BYOD CYOD
Policy
provide small stipend
& limited access to
information
limited access to
information from
home
fully managed
access to info
44. Upcoming Webinar
Thursday July 24
4:00 – 5:00 PM EST
SharePoint
Taking Another Look
Matthew Eshleman & Steve Longenecker
45. After the webinar
• Connect with us
• Provide feedback
Short survey after you exit the webinar. Be sure to
include any questions that were not answered.
• Missed anything?
Link to slides & recording will be emailed to you.
Notas del editor
Poll: For mobile devices, what does your organization provide?
Poll: For laptops and desktops, what does your organization provide?