BYOD requires written policies

June 10, 2013       The NonProfit Times      

The BYOD movement can come with a laundry list of risks to the organization, and staying on top of risks can be extremely challenging. The Littler Report, “The Bring Your Own Device to Work Movement: Engineering Practical Employment and Labor Law Compliance Solutions” provided a framework to help companies out in regard to dual-service technologies. This allows the companies to assess risk and develop policies to effectively manage them.

1.  Lead: Assign a person or a team to own and manage key risk areas. Employers should be preparing to assign risk responsibility to a multi-faceted executive with thorough experience of the company.

2.  Inspect: The next step is to inspect the risk area and point out what needs to be worked on. This data is crucial in implementing risk mitigation initiatives.

3.  Teach: A teaching component is necessary because simply writing the risks down is not as effective to the employees in understanding the topic.

4.  Train: Employers must train employees to know how to react in given situations. Giving them hands-on scenarios will prepare them for any situation.

5.  Launch: The most effective approach in seizing an opportunity is to reduce or mitigate a competing risk to the point that it fits within the employers risk appetitive.

6.  Examine: Employers must continually examine their risk inventory since technologies emerge at such a fast pace.

7.  Report: The risk management function must report to stakeholders the key information that will allow the employer to overall better the risk management area.