NYT Article on BYODs, Workplace App Policies

interiors of an office

This is a nice overview of the concerns facing employers who have an active, creative workforce using websites and apps that are not necessarily in comformity with in-house security standards.  See article at:


Quotes from the article:

“People are going to bring their own devices, their own data, their own software applications, even their own work groups,” drawing off friends and contractors at other companies, said Bill Burns, the director of information technology infrastructure at Netflix. “If you try and implant software that limits an employee’s capabilities, you’re adding a layer of complexity.”

“The popular term now when people bypass the in-house organization is ‘shadow I.T.,’ ” says Sunny Gupta, chief executive of Apptio.

In the comments section below the article, many industry observers share their thoughts:

From Milwaukee, one says:

To be honest, the problem isn’t really the integrity of the apps, but the app user. If a person is going to mis-use proprietary information, they will do it, security or no security.

From New York, the comment is:

HIPPA rules are only taken seriously after the breach, fine or lawsuit. BYOD is what keeps hospital CIOs and CEOs up late at night.

Another suggests corporate IT teams continually lag behind what their personnel wants or is doing.  One suggests IBM SmartCloud.  And, finally, others mention that the best security is no outside devices inside the office or an agreement by the employee to have their device readily available and subject to getting wiped clean remotely without notice.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.