Vodafone BYOD Report: Security, Challenges, and Implementations

Verified

Added on  2019/09/18

|5
|628
|79
Report
AI Summary
This report provides an analysis of Vodafone's Bring Your Own Device (BYOD) policy, examining the implications of allowing employees to use personal devices, such as laptops and smartphones, for work. The report highlights the benefits and challenges of BYOD, including the need for clear guidelines on device usage and the potential risks associated with data breaches and security vulnerabilities. It also discusses the importance of establishing strong security policies and managing IT infrastructure to address these challenges. Furthermore, the report emphasizes the need for reimbursement policies and the management of IT services to deal with traffic and connectivity issues. The report concludes by highlighting the need for security inventory management and strategies to ensure a secure and productive BYOD environment within the organization.
Document Page
Vodafone BYOD
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The BYOD is a policy of Vodafone which is made for the employees which states employees' to
bring personal devices such as pen drive, personal computer and others. The personal technology
(BYOT), the personal computer (BYOPC) and personal cell phones (BYOC) allows to the
employees in order to use personal and offices IT services in an integrated manner. It comprises
of the permission to use the personal devices in the office space such as a laptop, mobile phone
and others. The new technology is coined the information technology consumerization.
Factors to be considered
The following factors needs to be considered for the successful implementation:
1. Specification of permitted devices
The agreement must be signed between the employer and employee regarding the
accessibility of particular gadgets at the workplace.
2. Clear accessibility of apps and data
The apps may allow the virus to enter into the IT system of an organisation so the
accessibility of apps according to the designation must be specified (Gupta et al., 2013).
3. Building of stringent security policy
The rules and regulations for using the devices at every stage must be established in order to
maintain the security of IT.
Challenges of BYOD to IT network
The challenges are explained below:
1. Leaking of business information
Document Page
The use of personal gadget can lead to leaks the business information to the competitors
which eliminates the competitive advantage of the company.
2. Product replica
The information can be accessed by the third party who can lead to generating duplicate
products. So the company must check security at each level.
3. Sensitive information
The business sensitive information includes strategy, policies, and plans which can be used
by the third party and it impacts on the brand's image in the eyes of the customers (Morrow
et al., 2012).
4. Data breaches
The employee can exit without giving personal gadgets to the company which leads to the
unlawful sharing of data.
5. Security
The integration of personal devices and information technology of the company allows
entering virus to the computers due to which the company must weekly check the personal
devices in order to protect the information technology system of an organization (Garba et
al., 2015).
6. Security inventory management
It is difficult for the company to regularly tap on the personal gadgets of the employees due
to which the company have to spend on the recruitment of security inventory to safeguard IT
services.
7. Management issues
Document Page
It is difficult to manage various issues such as speed, connectivity and others by the IT
department due to large traffic usage. The use of the internet for personal and official use can
lead to develop a problem of high traffic which may delay the delivery of projects.
8. Reimbursement issues
The use of personal devices and company’s assets it is difficult to reimburse because the
personal gadgets are reimbursed with the IT services.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Gupta, V., Sangroha, D. and Dhiman, L., 2013. An Approach to Implement Bring Your Own
Device (BYOD) Securely. International Journal of Engineering Innovation and Research.
Garba, A.B., Armarego, J., Murray, D. and Kenworthy, W., 2015. Review of the information
security and privacy challenges in Bring Your Own Device (BYOD) environments. Journal of
Information Privacy and Security, 11(1), pp.38-54.
Morrow, B., 2012. BYOD security challenges: control and protect your most sensitive data.
Network Security, 2012(12), pp.5-8.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]