Fewer than a third of large EU companies have BYOD policies

Fewer than a third of businesses in Europe with more than 1,000 employees have a formal ‘bring your own device’ (BYOD) policy, but almost all British businesses (97%) have suffered or anticipated a BYOD security breach, according to a new study.

Samsung surveyed chief information officers (CIOs) and IT decision makers at 490 European companies with more than 1,000 staff. More than a third (34%) said their business had lost customer data as a result of personal mobile devices being used by employees for work.

In the UK, 56% of the 100 large business CIOs and IT decision makers surveyed said their company promotes BYOD for work. Across Europe, 31% of large businesses have a formal BYOD policy whilst a further 21% have an informal policy, Samsung said. At the moment, 30% of staff take up the option of using their own device for business when able to do so by their employer, it said.

However, Samsung’s survey also revealed that businesses that permit BYOD save 17%, or £6 million, on average on their yearly communications costs.

In Britain, 47% of companies have reported that staff are better engaged as a result of being able to use their own device for business, with employees at 46% of those organisations delivering “enhanced productivity” as a result, it said.

At the beginning of March this year, the UK’s data protection watchdog published new guidance for employers on BYOD. The Information Commissioner’s Office (ICO) stressed that organisations should remember that they are duty-bound to look after the personal data they are responsible for under data protection laws “regardless of the ownership of the device used to carry out the processing”. Companies must ensure that devices used for work purposes are password-protected, and that data is encrypted when being transferred as well as being stored, it said.

Source: Out-Law

This entry was posted in Business Productivity, BYOD, IT Strategy, Mobile Device Management, Network Management and Audit, Social Media Governance, Social Media Security and tagged , , , , , , , . Bookmark the permalink.