Essays.club - Get Free Essays and Term Papers
Search

Byod and Morgan Stanley

Autor:   •  May 28, 2018  •  2,056 Words (9 Pages)  •  703 Views

Page 1 of 9

...

Despite the many benefits of these BYOD policies it is important to note the cons in order to work on managing /preventing them. One of the biggest issues with these policies is the security of sensitive data and the implementation of these policies. According to the case study in the text book they key for the implementation of these policies is for companies to ensure that the devices uses are fully secured before being able to access the systems. Some of the techniques mentioned in the case study are ensuring the device can have its memory wiped remotely, blocking certain apps that are not deemed secure, and installs Approved replacements for certain apps. In some companies each phone is treated differently and is secured to meet the specific needs of the employee based on position and are they work in.[6] Another concern of implementing these policies is workers may feel that they have no privacy and that work is 24/7. “From the employee perspective, the biggest concern is that BYOD practices could lead to a loss of employee privacy.”[7] Examples of this is management expecting employees to read and answer emails after work and having knowledge of their location and social media habits. This is noteworthy because in the long run it could result in a decrease of employee morale which is the opposite result of what the BYOD would be used for. To combat this management has options with one being they can implement companywide policies that standardize if employees are responsible for keeping up to date with work information after hours. By establishing this employees will be aware that in certain situations they will be required to check emails and report on them after hours, and because they have prior knowledge will not be significantly bothered by it. In terms of privacy the company can have agreements in which they do not access or monitor personal information or interactions, so long as they don’t pertain to work. These can be monitored by establishing notifications when certain key words are recorded. By doing these employees can be assured that their personal information and activity stays private as long as work is kept out of it. By establishing this it not only will keep morale high but can also discourage insider or other illicit activities. Lastly a major concern with these policies is in the case an employee resigns or is terminated the device needs to be wiped of all company data in a timely fashion without compromise of the individuals device. Should an employee be allowed to leave without their device being properly wiped they could go to a competitor and still have access to sensitive information that could harm the original company. To combat this management can utilize the remote wipe of the dev ice and can implement the cleansing of secure access in the exit procedures. It is clear that BYOD policies can have negative effects but through proper management and preparation Morgan Stanley can solve these problems before implementation and can set up a quarterly review of the effectiveness and feedback regarding the policies,

Each company needs to establish its own BYOD policy as each company is unique and has its own needs/ threats that reflect their industry and culture. Based on this the companies need to carefully plan on how they will implement the policy and what it will entail. Some of the key areas that need to be addressed are which devices will be given access, have an established security strategy, have a clear service policy, ensure employees know which apps are owned by or give the company access, have a pre made list of approved and disapproved apps/practices, set up policies to ensure employees know which practices can be done with these devices, and lastly have an established exit strategy to ensure secure data is not compromised.[8] To accomplish the company can have a list of acceptable devices and then do an additional screening process to ensure the security of each device. The security strategy will comprise of anti-malware software and firewalls to ensure data is secure along with having the IT department monitor devices weekly and get alerts to any unusual behavior. Have the BYOD policies including privacy and acceptable practices/application in the new hire orientation. By following these practices and implementing employee feedback and quarterly assessments of the success Morgan Stanley can ensure that the BYOD policies are operating efficiently across all levels of the corporation.

A corporation like Morgan Stanley utilizes information systems on a day to day basis to assist in managing the millions of accounts on their books whose total value is in the billion dollar range. Morgan Stanley recognizes that by using and updating these systems they can continue to be a profitable company. BYOD policies can further assist Morgan Stanley in day to day operations and will have a long term positive impact on the firm if these systems are implemented and followed correctly. By utilizing BYOD they can even attract more clients and even poach some from competitors because they can offer client support even if the employees are not in the office. Additionally employee’s performance will have a positive impact because they have a higher sense of ownership regarding their work, and management can ensure employees are using their time effectively. All of these associations with BYOD lead to increased profit margins which the most important aspect for a corporation.

Works Cited

Hassell, Jonathan. "7 Tips for Establishing a Successful BYOD Policy." CIO. CIO, 17 May 2012. Web. 14 Dec. 2016. .

Kvochko, Elena. "Has Bring Your Own Device to Work Become Inevitable?" Forbes. Forbes Magazine, n.d. Web. 14 Dec. 2016. .

Lanonn, Paul G., and Philip M. Schrieber. "BYOD Policies: What Employers Need to Know." SHRM. N.p., 01 Feb. 2016. Web. 14 Dec. 2016. .

Laudon, Kenneth C.; Laudon, Jane P.. Management Information Systems: Managing the Digital Firm (Page 185). Pearson Education. Kindle Edition.

Price, Curtis, and Leslie Rosenberg. "Four Key Trends Impacting Mobile Infrastructure Strategy." IBM Mobile BYOD – Bring Your Own Device. IBM Global Technology Services, Aug. 2014. Web. 14 Dec. 2016. .

---------------------------------------------------------------

...

Download:   txt (12.5 Kb)   pdf (56.1 Kb)   docx (15.4 Kb)  
Continue for 8 more pages »
Only available on Essays.club