Community IT Innovators - BYOD for Nonprofits

Post on 12-May-2015

400 views 2 download

Tags:

description

BYOD stands for Bring Your Own Device. It refers to staff bringing their own devices to work, instead of working on the computer provided by the organization. BYOD can have its benefits and challenges. It also raises a lot of questions. - Does your nonprofit have a BYOD policy? - Does your organization help staff configure their personal devices to use for work? - How does BYOD affect your organization’s data? In this webinar Johan Hammerstrom, COO, discussed how nonprofits can prepare for BYOD, leverage the strengths and minimize the challenges.

Transcript of Community IT Innovators - BYOD for Nonprofits

BYOD for Nonprofits

June 20, 2013

Community IT Innovators Webinar Series

presented by…

Johan Hammerstrom

Webinar Tips

• Ask questions

Post questions via chat

• Interact

Respond to polls during webinar

• Focus

Avoid multitasking. You may just miss the best part of the presentation

• Webinar Powerpoint & Recording

Powerpoint and recording links will be shared after the webinar

About Community IT

Community IT Innovators partners with nonprofits to help them solve their

strategic & day-to-day IT challenges.

Strategic

Proactive approach so you can make IT decisions that support your

mission and grow with you

Collaborative

Team of over 40 staff who empower you to make informed IT choices

Invested

We are committed to supporting your mission, and take care of your IT

network as if it were our own

Nonprofit focus

Worked with over 900 nonprofits since 1993

about the presenter

Johan Hammerstrom

Chief Operating Officer

jhammerstrom@communityit.com

@hammerstromj

Agenda

I. BYOD…a brief history

II. Best Practices

III. BYOD Risk Management

IV. BYOD Policy Guidelines

Brief History

Computers used to be big

…and expensive

But then they got smaller

and friendlier…

ubiquitous

and personal.

Consumerization

Best Practices

Best Practices

Best Practices

1. Goal: 90% of 150,000

workforce

2. Custom Authentication

System

3. Reason: Avoid locked-in

corporate environment

Aggressive BYOD

1. 20% use their own device

2. Increasing restrictions on

personal device use

3. Reason: Security concerns

4. Dropsmack!

Conservative BYOD

Risk

Benefits of BYOD

1. Reduce hardware & support costs

2. Work flexibility

3. Employee availability

4. User adoption and satisfaction

Risks of BYOD

1. Information Security

2. Legal

3. Financial

Risks of BYOD

(b)

Personal

(a)

Org

1. Information Security Risks

a) Organization

– Data leakage

– Vector into the company

b) Personal

– Onerous security measures

– Loss of full control of device

2. Legal Risks

a) Organization

– Lack of certainty in case law and legislation

b) Personal

– Personal device could be confiscated

– Personal blurs into the corporate

3. Financial Risks

a) Organization

– Stipends can be more expensive than a single

corporate plan

– IT Support can become entangled

– Mobile Device Management (MDM) can be expensive

b) Personal

– Stipend may not cover full cost…or any at all

– Can be responsible for own support

Risks

• Security

• Legal

• Financial

Benefits

• Cost

• Flexibility

• Adoption

Risk/Benefit Analysis

One Size Fits All?

• Sales

• Accounting

• Executive

Guidelines

1) Identify Benefits

a) Prioritize for your Organization

b) Establish your strategy

2) Identify Risks

a) Risk = Impact * Likelihood

3) Consider a few solutions

4) Summarize in 1-page policy

Program Staff Development ExecutiveBenefits

Reduce costs 1Work Flexibility 1 1

Availability 1 1User adoption 1

RisksInfo Security 2 1 1

Legal 3 3 1Financial 1 1 3

Policy

provide small stipend & limited access to

information

provide limited access to

information from home

org provided device, fully

managed access to info

Generic

1) BYOD by staff role

a) Exec staff, accessible 24x7 stipend of $80/mo

b) Senior staff, accessible 10x7 stipend of $50/mo

c) Line staff, accessible 10x5 stipend of $30/mo

2) Requirement of PIN code on device

3) Acceptable Use policy

4) IT Support policy

the Future

mobile first

authentication

Check out…

www.mobilecitizen.org

Upcoming Webinar

July 25

IT Security Best Practices

Presenter

Steve Longenecker

Mark Kraemer

Next Steps

• Connect with us

• Provide feedback

Short survey after you exit the webinar. Be sure to

include any questions that were not answered.

• Missed anything?

Link to slides & recording will be emailed to you.