Bring Your Own Device (BYOD) Policy Analysis: Vodafone Group
VerifiedAdded on 2020/07/22
|5
|827
|58
Report
AI Summary
This report analyzes Vodafone's Bring Your Own Device (BYOD) policy, focusing on the factors to be considered, such as control, policy compliance, monitoring usage, and security. It further examines the challenges BYOD poses to the network, including data loss risks from various apps and the potential for rogue gateways. The report concludes that while BYOD can increase productivity and reduce costs, careful consideration of security measures is essential to mitigate risks. The report references several sources including books and journals to support its findings. The report highlights the importance of addressing security concerns before implementing BYOD, and its impact on network infrastructure. Desklib provides students with access to this and other solved assignments and study materials to aid in their academic pursuits.

BRING YOUR OWN
DEVICE
DEVICE
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
Some of the important factors to be considered..........................................................................1
Challenges of BYOD to its network...........................................................................................1
CONCLUSION................................................................................................................................2
REFERENCES................................................................................................................................2
INTRODUCTION...........................................................................................................................1
Some of the important factors to be considered..........................................................................1
Challenges of BYOD to its network...........................................................................................1
CONCLUSION................................................................................................................................2
REFERENCES................................................................................................................................2

INTRODUCTION
Vodafone group is the leading group in the telecommunication networks which is
operating in around 30 countries and having approximately 50 partners worldwide. To bring the
efficiency in working system, the company has allowed to bring their own device in firm so that
they can work effectively (Song, 2014). Firm believes that such kind of policy will help in
increasing the productivity and it will lead to reduce the cost as well.
Some of the important factors to be considered
Bringing the personal smart device in the firm will make employees to perform better as
with the same, they are going to work effectively and efficiently. Some of the important factors
are as follows:
Control: This could be the most problematic issue when it comes into BYOD just
because various devices run with many other operating systems and this becomes difficult for the
IT department to regulate such policy
Policy compliance: Before implementing the BYOD structure in company, policy is
required to protect such as; security, protecting resources and expenses while implementing the
structure in firm (Miller, Voas and Hurlburt, 2012). It is important to define restrictions and this
includes that what the apps can and what the apps cannot download with the personal devices. s
Monitor usage: It is required to keep in the mind that once the device went inside the
corporate building then complete data on device will go through corporate bandwidth. This could
be the biggest threat when the bandwidth is used for their personal use like downloading movie
or songs.
Security: It is the great mistake done by companies as they leave their security with end
users. BYOD has corporate data in their various application which has to make like they have to
use like password which will help in protecting the data in efficient manner.
Challenges of BYOD to its network
The security can be threaten to network in various ways as it can also put the company's
business systems on risk as well (Emery, 2012). Some of the challenges of BYOD to network are
as follows:
Data loss: There is a big risk of getting the loss the data in their own personal devices
like I phone users have around 1.2 million apps from they can choose from and the other side the
1
Vodafone group is the leading group in the telecommunication networks which is
operating in around 30 countries and having approximately 50 partners worldwide. To bring the
efficiency in working system, the company has allowed to bring their own device in firm so that
they can work effectively (Song, 2014). Firm believes that such kind of policy will help in
increasing the productivity and it will lead to reduce the cost as well.
Some of the important factors to be considered
Bringing the personal smart device in the firm will make employees to perform better as
with the same, they are going to work effectively and efficiently. Some of the important factors
are as follows:
Control: This could be the most problematic issue when it comes into BYOD just
because various devices run with many other operating systems and this becomes difficult for the
IT department to regulate such policy
Policy compliance: Before implementing the BYOD structure in company, policy is
required to protect such as; security, protecting resources and expenses while implementing the
structure in firm (Miller, Voas and Hurlburt, 2012). It is important to define restrictions and this
includes that what the apps can and what the apps cannot download with the personal devices. s
Monitor usage: It is required to keep in the mind that once the device went inside the
corporate building then complete data on device will go through corporate bandwidth. This could
be the biggest threat when the bandwidth is used for their personal use like downloading movie
or songs.
Security: It is the great mistake done by companies as they leave their security with end
users. BYOD has corporate data in their various application which has to make like they have to
use like password which will help in protecting the data in efficient manner.
Challenges of BYOD to its network
The security can be threaten to network in various ways as it can also put the company's
business systems on risk as well (Emery, 2012). Some of the challenges of BYOD to network are
as follows:
Data loss: There is a big risk of getting the loss the data in their own personal devices
like I phone users have around 1.2 million apps from they can choose from and the other side the
1
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

android users have approximately 1.3 million apps. Although not every app could be having
same capacity in their devices to send the data and information to the third party in proper
manner. Thus, it can create a chance of getting the data lost.
Rouge gateways: Various organisations have the limited exposure to the internet through
the use of gateway architecture. The compromised device can use both Wi-Fi and the cellular
data networks (Bruder, 2014). As such thing is not a challenge unique for the BYOD but a large
variety of networks can hinder the working and can create problems for attack on stored data.
Clients and security: Various devices are there which are small in nature and structure.
Somewhere, the less variety will lead to less complexity and this will lead to human error and ,ay
be lead this to increased in the security of the data.
CONCLUSION
Through this it has come out that using the own device at the workplace will create mess
and it will lead to loss of data and network issues as well and can also harm on the security as
well the important data can be hacked by anyone in easier manner and can use their data for
fraud purposes so if implementing BYOD it is required to go for safety purposes before
implementing it. s
2
same capacity in their devices to send the data and information to the third party in proper
manner. Thus, it can create a chance of getting the data lost.
Rouge gateways: Various organisations have the limited exposure to the internet through
the use of gateway architecture. The compromised device can use both Wi-Fi and the cellular
data networks (Bruder, 2014). As such thing is not a challenge unique for the BYOD but a large
variety of networks can hinder the working and can create problems for attack on stored data.
Clients and security: Various devices are there which are small in nature and structure.
Somewhere, the less variety will lead to less complexity and this will lead to human error and ,ay
be lead this to increased in the security of the data.
CONCLUSION
Through this it has come out that using the own device at the workplace will create mess
and it will lead to loss of data and network issues as well and can also harm on the security as
well the important data can be hacked by anyone in easier manner and can use their data for
fraud purposes so if implementing BYOD it is required to go for safety purposes before
implementing it. s
2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

REFERENCES
Books and Journals
Bruder, P., 2014. Gadgets go to school: The benefits and risks of BYOD (bring your own
device). The Education Digest. 80(3). p.15.
Emery, S., 2012. Factors for consideration when developing a bring your own device (BYOD)
strategy in higher education.
Miller, K.W., Voas, J. and Hurlburt, G.F., 2012. BYOD: Security and privacy considerations. It
Professional. 14(5). pp.53-55.
Song, Y., 2014. “Bring Your Own Device (BYOD)” for seamless science inquiry in a primary
school. Computers & Education.74. pp.50-60.
Online
Bring your own device 2017. [Online] Available through:
http://www.techradar.com/news/computing/what-is-byod-and-why-is-it-important-
1175088
3
Books and Journals
Bruder, P., 2014. Gadgets go to school: The benefits and risks of BYOD (bring your own
device). The Education Digest. 80(3). p.15.
Emery, S., 2012. Factors for consideration when developing a bring your own device (BYOD)
strategy in higher education.
Miller, K.W., Voas, J. and Hurlburt, G.F., 2012. BYOD: Security and privacy considerations. It
Professional. 14(5). pp.53-55.
Song, Y., 2014. “Bring Your Own Device (BYOD)” for seamless science inquiry in a primary
school. Computers & Education.74. pp.50-60.
Online
Bring your own device 2017. [Online] Available through:
http://www.techradar.com/news/computing/what-is-byod-and-why-is-it-important-
1175088
3
1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.