Rachel Ashwood: Bring your own devices to work: An employment practice to be encouraged or restricted?

-

Last week, Apple posted the biggest quarterly profit ever made by a public company; a clear sign that the proliferation in use of mobile technology is not showing any sign of abating.  With more employees owning sophisticated tablets and smartphones than ever before, businesses that perhaps once thought the Bring Your Own Device (BYOD) phenomena may go away, are facing continued requests from employees to allow them to use their personal devices for work purposes.

Encourage…

On the face of this, surely BYOD is something to be encouraged?  Allowing employees to access their business e-mail account, contacts and documents outside of the office, means they can work remotely at any time of day.  The parameters of the working day are stretched, which must in turn lead to increased levels of productivity.  BYOD can also mean cost savings for organisations, if it is the employee (rather than the employer) that is purchasing the device the employee uses to staying in contact with work outside of core working hours.  Whilst potential increased productivity and cost savings are enough for some businesses to embrace BYOD, others have also seen the practice as a useful tool to enhance employee wellbeing and thereby improve staff retention rates.

Restrict…

If the BYOD debate is so clearly one-sided, why are not all businesses jumping on the BYOD bandwagon?  The answer lies in the fact that the potential benefits go hand in hand with increased security, data protection and managerial issues for employers.

Let’s take an obvious example.  What happens if an employee leaves their mobile phone on a train on their way back from work?  Clearly, losing a phone is no more likely to happen if an employee uses his phone for business and personal purposes rather than just personal use.  However, the consequences of losing work, business contacts and other confidential data are so much greater if the device is used for business use.  Or, what if an employee’s child accidentally uses his parent’s tablet to e-mail a key potential client?  Are the consequences of this just embarrassing or could they genuinely jeopardise the business?

HRreview Logo

Get our essential weekday HR news and updates.

This field is for validation purposes and should be left unchanged.
Keep up with the latest in HR...
This field is hidden when viewing the form
This field is hidden when viewing the form
Optin_date
This field is hidden when viewing the form

 

Very importantly, employers are data controllers under the Data Protection Act 1998 (DPA) and as data controllers, they have a duty to ensure compliance with the DPA in respect of data that is processed.  Specifically, the seventh data protection principle requires that “appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data”.  The employer’s obligations apply irrespective of who owns the device upon which the data is stored and it is all too obvious to see that the employer’s responsibilities become more difficult, where the employer is not the owner of the device.

Proceed (but with caution)…

The view amongst many organisations is that having balanced the potential benefits against the perceived risks of BYOD, it is an approach to be embraced, provided that it is managed in an effective way.  Helpfully, at the end of 2014 the Centre for the Protection of National Infrastructure (CESG) published guidance for organisations that are both considering and already operating a BYOD approach.

In light of the CESG guidance and based on our experience of dealing with BYOD issues, the key issues that employers should consider in connection with BYOD are as follows:

  • Create an effective BYOD Policy.  BYOD policies are not new and whilst we certainly recommend that organisations have one, any policy will only be effective to the extent that it appropriate for the organisation and backed up with appropriate training, policing and technical support (see below).
  • Training.  Employees must understand their obligations when accessing company data from their own devices.  What additional measures are they expected to take to ensure the confidentiality of the data?  What should they do if they suspect a security breach?  What constitutes misuse of devices and importantly what is the sanction if they breach any applicable policy?
  • Policing.  As with all policies and procedures, on-going monitoring of the effectiveness of a BYOD approach will be critical.
  • Technical support.  Employers should anticipate that employees may require greater IT support initially in respect of matters that arise when using their own devices.  Compatibility issues of platforms and devices will need to be considered and thought given (amongst other things) to determining how the employees’ devices will obtain all the necessary updates they require.

Rachel Ashwood is a Senior Associate in the employment team at Taylor Vinters.

Latest news

Helen Wada: Why engagement initiatives fail without human-centric leadership

Workforce engagement has become a hot topic across the boardroom and beyond, particularly as hybrid working practices have become the norm.

Recruiters warned to move beyond ‘post and pray’ as passive talent overlooked

Employers risk missing most candidates by relying on job boards as hiring methods struggle to deliver quality applicants.

Employment tribunal roundup: Appeal fairness, dismissal reasoning, discrimination tests and religious belief clarified

Decisions examine appeal failures, dismissal reasoning, discrimination claims and religious belief, offering practical guidance on fairness, causation and proportionality.

Fears of AI cheating in hiring ‘overblown’ as employers urged to rethink assessments

Employers may be overstating concerns about AI misuse in recruitment as evidence of candidate manipulation remains limited.
- Advertisement -

More employees use workplace health benefits, but barriers still limit access

Many workers struggle to access employer healthcare support due to confusion, costs and unclear processes.

Gender pay gap in tech widens to nine-year high as AI roles drive salaries

Women in IT earn less as salaries rise faster in male-dominated AI and cybersecurity roles, widening pay differences.

Must read

Why HR should be check-ins champions

Advances in technology have changed the way we work beyond all recognition. Having the ability to be connected whenever and wherever has blurred the lines between home and work life

Why traditional training methods no longer work

In a faltering economy where managers and leaders are...
- Advertisement -

You might also likeRELATED
Recommended to you