Parthenis said that while BYOD should not only be formulated by cost guidelines, IT administrators must understand total cost of ownership (TCO) (including security, hardware, programs, and so on), and present this to executive management.
The fourth phase involved defining the policy, as well as establishing a set of rules and guidelines to which employees must agree in order to have access to the network. Examples of this include allowing the employer to wipe devices remotely, access timeouts, and reporting.
The last element is developing a user support structure which identifies the resources in place for employees to utilise, and how these can be accessed. Again, this is a balancing act which negotiates between crucial information relating directly to the network (supplied by the employer), and non-corporate functions (to be resolved by the user).
Sign up for CIO Asia eNewsletters.