BYOD Brings Security and Intellectual Property Concerns

If your business has yet to adopt a bring your own device (BYOD) program, there's a strong possibility it will in the next few years. A 2013 report by research firm Gartner forecasted that half of employers will require employees to supply their own devices for work. BYOD saves employers money and removes the barrier of technology confusion, but it's not without risk. IT managers have to establish secure networks across an array of devices. Then there's the question of intellectual property. When employees develop business content on their personal devices, they may feel entitled to that content. BYOD can pay dividends, but businesses should know the ins and outs before they ask their employees to swap out the company smartphone.

Software Takes Precedent in IP Ownership

BYOD blurs the line between personal and professional devices. Employers are working to make sure it doesn't cause any confusion in terms of intellectual property. Some employees may assert that they can claim ownership of content created on their personal devices, which is a serious claim for business, as most value intellectual property immensely. Employees with that claim don't usually have a leg to stand on, however. In reality, software ownership usually establishes a default right to intellectual property. If an employee uses their tablet computer to develop a PowerPoint presentation, the employer would retain the intellectual property ownership because it owns the software. There are exceptions to this rule. When a business hires a contracted employee, that employee retains rights to the content he created, regardless of what software he used. When businesses get in BYOD-related intellectual property battles, they usually win. The best bet is to make it clear that employers retain all intellectual property rights, including work done on personal devices.

Written Policies Avoid Confusion

The best bet to avoid confusion on intellectual property, security and other BYOD particulars is with a detailed written agreement. In this document, you should explain security practices, BYOD dos and don'ts, and intellectual property agreements. Peak IP solutions notes that this agreement should be in place before employees can opt in to the BYOD program. Employers can also use this agreement to establish ground rules for personal device use in the workplace. If you're drafting such an agreement, it may be wise to explain that while these personal devices are to be used at work, they aren't to be used for personal activities. Further, you can use this form to detail how employees can properly use their tablets, and set up guidelines, including recommending unlimited data plans. Whether or not you're going BYOD, cellular providers have business platforms such as MDM (Mobile Device Management) solutions and HMMS (Hosted Mobility Management Services). These technologies provide secure access to company assets, cloud-based mobile functions and other uses for small or large businesses.

Security is Getting Better

On the surface, BYOD looks like a win for all parties involved. Employers save money, employees save hassle, and everyone gets more work done. This lasts until a hacker breaks into an unregulated employee device, sending IT on a wild hunt within an unfamiliar platform. Security is the concern keeping business from adopting this policy, but it's getting better. Secure Access Technologies provides the only security technology that secures enterprise applications no matter where the device is, or whether it's connected to a network. This helps eliminate password thefts, device attacks and failed attempts at a remote wipe. Also, as more firms attack the business security issue, expect BYOD to become more common.

Comments

Post new comment

The content of this field is kept private and will not be shown publicly.
CAPTCHA
This question is for preventing automated spam submissions.