We as innovators must be mindful of the boundaries we can or cannot introduce into the market.
- You are an organization with the industries leading software developers.
- You want your employees to be successful and understand your role in ensuring your teams activities are contributing to the strategy.
The next thing you must do; understand your role and the authority your team has in meeting the companies strategy.
- An organization elects to supply or reimburse their employees for cell phone expenses.
- Only in the case of corporate account or a cell phone supplied by the company would be in the companies authority to influence.
- The legal relationship between your company, organization or agency and a mobile carrier exist.
- The terms of the relationship draws clear boundaries on what you can or cannot do in regard to these services supplied under a contractual scenario.
- You are an employee or agent of the organization and you have an ethical responsibility to not put the company at risk.
- In this scenario you are only authorized within the boundaries of the companies intranet.
In some situations an employee may agree to transfer their contract to the companies account.
- In these situations the account will be owned by the company and typically taking the number back isn’t an option.
- The accounts and contacts you have engaged with at the company belong to the company the moment you shared them on a device owned by the company.
- The tradeoffs may be severe in a scenario where no longer have your contacts.
- Iongrid Nexus Enterprise Cracks BYOD (ubergizmo.com)
- BYOD: Mobile Device Management in the Enterprise (coydavidson.wordpress.com)
- We Really All Can Get Along With BYOD In The Mobile Enterprise (theemf.org)
- BYOD – A Blessing or a Curse? (margaret-powers.com)
- Five Rules for ‘Bring Your Own Device’ Teams (entrepreneur.com)
- Pros and Cons of BYOD (Bring Your Own Device) – PCWorld (pcworld.com)
- BYOD Starts Trending on Google (avaya.com)
- The Bottom Line: How Does BYOD Affect Company Finances? (spendmatters.com)
- BYOD Management Still Not a Slam Dunk (readwriteweb.com)
- BYOD and Security – What to Consider When Mobilizing to Employee-Owned Devices (skytechnologies.com)
- The BYOD Debate Continues (theemf.org)
- MDM Not The Only Avenue To BYOD Security (blogs.cisco.com)
- IBM buys Worklight, launches its own BYOD manager (venturebeat.com)
- Four Keys to Successful BYOD (oracleidentity.wordpress.com)
- Why BYOD will not be the “IT” thing for the military in 2012 (saluteandreboot.wordpress.com)