BYOD requires written policies
June 10, 2013 The NonProfit Times
The BYOD movement can come with a laundry list of risks to the organization, and staying on top of risks can be extremely challenging. The Littler Report, “The Bring Your Own Device to Work Movement: Engineering Practical Employment and Labor Law Compliance Solutions” provided a framework to help companies out in regard to dual-service technologies. This allows the companies to assess risk and develop policies to effectively manage them.
1. Lead: Assign a person or a team to own and manage key risk areas. Employers should be preparing to assign risk responsibility to a multi-faceted executive with thorough experience of the company.
2. Inspect: The next step is to inspect the risk area and point out what needs to be worked on. This data is crucial in implementing risk mitigation initiatives.
3. Teach: A teaching component is necessary because simply writing the risks down is not as effective to the employees in understanding the topic.
4. Train: Employers must train employees to know how to react in given situations. Giving them hands-on scenarios will prepare them for any situation.
5. Launch: The most effective approach in seizing an opportunity is to reduce or mitigate a competing risk to the point that it fits within the employers risk appetitive.
6. Examine: Employers must continually examine their risk inventory since technologies emerge at such a fast pace.
7. Report: The risk management function must report to stakeholders the key information that will allow the employer to overall better the risk management area.