{"id":5678,"date":"2020-03-05T15:48:11","date_gmt":"2020-03-05T15:48:11","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5678"},"modified":"2021-04-07T17:43:30","modified_gmt":"2021-04-07T16:43:30","slug":"byod-policy-overview","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview","title":{"rendered":"BYOD Policy Overview: Good Idea or Risky Business?"},"content":{"rendered":"<div class=\"field field--name-body field--type-text-with-summary field--label-hidden field--item\">\n<p>Over the past couple of decades, employees have increasingly used their own personal devices for their work. From checking into corporate systems on home laptops to sending emails on their smartphones after hours, using personal devices has allowed workers to improve productivity while offering incredible convenience.<\/p>\n<p>However, it can open businesses up to security risks. For instance, a personal smartphone rarely carries the same level of security that a corporately managed device will. As a result, many businesses have implemented bring your own device (BYOD) policies allowing employees to use the technology of their choice while still giving businesses some control. Yet BYOD policies still bring some risks for the businesses using them. This blog will look at these nuances so you can make a smarter decision on whether or not to use a BYOD policy.<\/p>\n<p><b>Caution:\u00a0<\/b>Nothing in this post constitutes legal advice. Please consult with legal counsel before developing BYOD policies.<\/p>\n<h3>What are the risks of BYOD?<\/h3>\n<\/div>\n<div class=\"field field--name-field-blog-paragraphs field--type-entity-reference-revisions field--label-hidden field--items\">\n<div class=\"field--item\">\n<div class=\"paragraph paragraph--type--blog-section paragraph--view-mode--default clearfix\">\n<div class=\"sidebar-width-40\">\n<div class=\"field field--name-field-sidebar field--type-entity-reference-revisions field--label-hidden field--item\">\n<aside class=\"paragraph-align-right pull-right paragraph paragraph--type--blog-cta paragraph--view-mode--default\">\n<div class=\"explore-box quick-cta\">\n<div id=\"solar-features-trial\"><\/div>\n<\/div>\n<\/aside>\n<\/div>\n<\/div>\n<div class=\"blog-section-content\">\n<p>BOYD policies can help your customers improve productivity and even morale by allowing employees to use technology they prefer and are already comfortable with. However, there are some risks.<\/p>\n<p>For starters, letting employees bring personal devices to work can increase network security risks. For example, some employees won\u2019t stay current with updates on their phones or laptops unless they\u2019re actively managed by the IT team. This can open your customers\u2019 networks to significant vulnerabilities. Plus, there\u2019s an increased potential for data breaches. For example, if an employee allows their family to use their personal laptop or tablet at home, that family member could technically gain unauthorized access to your corporate resources. While this can occur if the employee takes a company-issued device home as well, it could be a greater risk if the employee owns the device.<\/p>\n<p>This brings up another major risk\u2014ownership. If you allow users to access company resources using a smartphone (either their own or company-issued), you may have to wipe the device if it\u2019s lost. Employees may lose personal data in the process. If you don\u2019t explicitly point this out in your BYOD policy, you could increase the chances of a lawsuit.<\/p>\n<h3>Considerations for a BYOD strategy<\/h3>\n<p>If you decide to implement a BYOD strategy, there are a few things to consider. Again, make sure to consult with legal counsel before you embark on BYOD services.<\/p>\n<ul>\n<li><strong>Create a fair use policy:<\/strong>\u00a0Whether offering BYOD or not, you should outline a fair-use policy around company data and devices. You need to delineate who owns data, who owns property, and what people can and can\u2019t do with company resources. If you offer BYOD, you should consider incorporating elements from that policy into your fair-use policy.<\/li>\n<li><strong>Set clear security policies:<\/strong>\u00a0Outline minimum security policies for any personal devices. For example, all phones should be password protected with strong pins, preferably using a mix of numbers and letters. Devices should also be encrypted and you should consider having a list of banned and approved applications. Also, consider listing out approved and banned devices. For example, you\u2019ll likely want to ban the use of jailbroken iPhones.<\/li>\n<li><strong>Define support levels:<\/strong>\u00a0Decide how much support you\u2019ll offer for personal devices. You may opt to offer complete support for personal devices or require the employee to fix their own devices by calling their vendor\u2019s support line. Either is acceptable\u2014greater support means more productivity for clients but also means more work on your team\u2019s part.<\/li>\n<li><strong>Draw clear lines around data:<\/strong>\u00a0This was mentioned this under fair-use policy, but it\u2019s worth reiterating\u2014you\u2019ll need to clearly outline who owns data. Make it clear that the company owns all relevant data created for the company and outline how you\u2019ll handle any personal and private data contained on the device.<\/li>\n<li><strong>Set expectations around lost devices:<\/strong>\u00a0If a device is lost or stolen, you\u2019ll need to remotely lock and wipe it so proprietary data doesn\u2019t fall into the wrong hands. Wiping a device typically removes\u00a0<em>all<\/em>\u00a0data, and users may be surprised when they lose personal photos or videos. Make sure to outline this in your policies and also consider reminding customers in user trainings to back up their personal data.<\/li>\n<\/ul>\n<p>Beyond your BYOD policy, don\u2019t forget to keep other security layers in place. This means protecting employer-owned machines with patching, endpoint protection, and backup. Also, consider segmenting networks to prevent devices from spreading malware across the network. You may even consider requiring BYOD devices to be put on a guest network while company-provided devices connect to the main corporate network.<\/p>\n<h3>Is BYOD a good idea?<\/h3>\n<p>Ultimately, it\u2019s your call on whether to wade into the BYOD waters for your customers. On one hand, there are a lot of benefits for clients, from improved employee morale and convenience to enhanced productivity. On the other hand, you may end up responsible for more than you bargained for. Regardless, if you do start a BYOD program, make sure to consult with legal counsel along the way. You have to protect your own reputation and your customers\u2019 just as much as you have to protect their employees\u2019 data.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Whether you decide to offer BYOD to your clients or not, it helps to have multiple layers of security in place. SolarWinds<sup>\u00ae<\/sup>\u00a0RMM offers multiple layers of security in one web-based console\u2014from patch management to endpoint detection and response to backup and recovery. And it offers mobile device management features that let you track and remotely wipe mobile devices as needed.\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/\">Learn more today<\/a>.\u00a0<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>With the number of employees wanting to use their own devices in the work place exploding, MSPs can find themselves getting to grips with BYOD policies. This blog looks at&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5678","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>BYOD Policy Overview: Good Idea or Risky Business? - N-able<\/title>\n<meta name=\"description\" content=\"With the number of employees wanting to use their own devices in the work place exploding, MSPs can find themselves getting to grips with BYOD policies. This blog looks at some of the key areas to look out for.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BYOD Policy Overview: Good Idea or Risky Business? - N-able\" \/>\n<meta property=\"og:description\" content=\"With the number of employees wanting to use their own devices in the work place exploding, MSPs can find themselves getting to grips with BYOD policies. This blog looks at some of the key areas to look out for.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-05T15:48:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-07T16:43:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"BYOD Policy Overview: Good Idea or Risky Business?\",\"datePublished\":\"2020-03-05T15:48:11+00:00\",\"dateModified\":\"2021-04-07T16:43:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview\"},\"wordCount\":938,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview\",\"name\":\"BYOD Policy Overview: Good Idea or Risky Business? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2020-03-05T15:48:11+00:00\",\"dateModified\":\"2021-04-07T16:43:30+00:00\",\"description\":\"With the number of employees wanting to use their own devices in the work place exploding, MSPs can find themselves getting to grips with BYOD policies. This blog looks at some of the key areas to look out for.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BYOD Policy Overview: Good Idea or Risky Business?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"BYOD Policy Overview: Good Idea or Risky Business? - N-able","description":"With the number of employees wanting to use their own devices in the work place exploding, MSPs can find themselves getting to grips with BYOD policies. This blog looks at some of the key areas to look out for.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview","og_locale":"pt_BR","og_type":"article","og_title":"BYOD Policy Overview: Good Idea or Risky Business? - N-able","og_description":"With the number of employees wanting to use their own devices in the work place exploding, MSPs can find themselves getting to grips with BYOD policies. This blog looks at some of the key areas to look out for.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-03-05T15:48:11+00:00","article_modified_time":"2021-04-07T16:43:30+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"BYOD Policy Overview: Good Idea or Risky Business?","datePublished":"2020-03-05T15:48:11+00:00","dateModified":"2021-04-07T16:43:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview"},"wordCount":938,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview","url":"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview","name":"BYOD Policy Overview: Good Idea or Risky Business? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2020-03-05T15:48:11+00:00","dateModified":"2021-04-07T16:43:30+00:00","description":"With the number of employees wanting to use their own devices in the work place exploding, MSPs can find themselves getting to grips with BYOD policies. This blog looks at some of the key areas to look out for.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/byod-policy-overview#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"BYOD Policy Overview: Good Idea or Risky Business?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/5678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=5678"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/5678\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=5678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}