Managing Bring-Your-Own-Device Practice


Bring-your-own-device is a popular and flexible IT policy allowing employees to work on their own devices. The concept explains the pros and cons of implementing BYOD policies and provides essential advice on managing these policies successfully - and most importantly, securely.

Technique Overview

Managing Bring-Your-Own-Device Practice

Managing Bring-Your-Own-Device Practice Definition

Bring-Your-Own-Device (BYOD) is an increasingly popular practice that allows employees to access organisational networks securely through their own personal laptops, smartphones, tablets or other devices, either on organisational premises or from remote locations (Dyer, 2012).

Managing Bring-Your-Own-Device Practice Description *

* The full technique overview will be available soon. Contact us to register your interest in our business management platform, and learn all about Managing Bring-Your-Own-Device Practice.

Business Evidence

Strengths, weaknesses and examples of Managing Bring-Your-Own-Device Practice *

* The business evidence section is for premium members only. Please contact us about accessing the Business Evidence.

Business Application

Implementation, success factors and measures of Managing Bring-Your-Own-Device Practice *

* The business application section is for premium members only. Please contact us about accessing the Business application.

Professional Tools

Managing Bring-Your-Own-Device Practice videos and downloads *

* The professional tools section is for premium members only. Please contact us about accessing the professional tools.

Further Reading

Managing Bring-Your-Own-Device Practice web and print resources *

Managing Bring-Your-Own-Device Practice references (4 of up to 20) *

  • Bossert, J. L., Blank, A. and Margetson, B. (2004) Basic Issues: Supplier Rating, in Bossert, J. L. (Ed.), The Supplier Management Handbook, American Society for Quality, Quality Press, Milwaukee.
  • Digital Services Advisory Group (2012) Bring Your Own Device, Digital Services Advisory Group and Federal Chief Information Officers Council, The White House, US.
  • Dyer, J. (2012) Cloud Concerns: The Safe Route to Adoption, Computer Fraud & Security, Vol. 2012 (10), pp. 16-19.
  • Flinders, K. (2012) CIO Interview: Frank Modruson, Accenture, [Online], available at: http://www.computerweekly.com/news/2240165534/CIO-interview-Frank-Modruson-Accenture

* The further reading section is for premium members only. Please contact us about accessing the further reading.


Learn more about KnowledgeBrief Manage and how you can equip yourself with the knowledge to succeed on Managing Bring-Your-Own-Device Practice and hundreds of other essential business management techniques

Other members were also interested in...

Related Concept: Safeguarding

This technique offers a review of the essential concept of safeguarding, exploring the legal requirements, explanations and application. It presents a number of case studies and success factors showing you how to create a safe and secure working environment for your staff, clients and customers.