should we do it? byod. group x06 nah zheng xiang philsona0067379m tay wen yin (jaslyn)a0071489u wong...
TRANSCRIPT
![Page 1: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/1.jpg)
Should We Do It?
BYOD
![Page 2: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/2.jpg)
Group X06
NAH ZHENG XIANG PHILSON A0067379M
TAY WEN YIN (JASLYN) A0071489U
WONG CHIH YONG A0075128E
GOH AIK HWEE A0075053L
Our Team
![Page 3: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/3.jpg)
Introduction
BYOD and IntelIssues & Implications ImplementationConclusion
Presentation Agenda
![Page 4: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/4.jpg)
Introduction
![Page 5: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/5.jpg)
The Post-PC EraIncreased consumerization of technologyIncreased adoption of mobile devices
Evolution of ubiquitous servicesCloud and social media technologiesBlurring lines of work and personal
Many organizations are supporting it
62% to support by year’s end
IT Consumerization
![Page 6: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/6.jpg)
Strengths• Costs savings & ROI• Connected mobile workforce• Appeals to younger workforce
Weaknesses• System integration &
interoperability• Needs additional policies &
measures
Opportunities• Freedom of choice for
employees• Apps for mobile productivity• Maintain competitive edge
Threats• Increased security risks• Causes blurring of work &
personal
SWOT Analysis
![Page 7: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/7.jpg)
BYOD @ Intel
![Page 8: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/8.jpg)
AdvantagesProductivity gains
Work outside office hoursReal-time collaboration
Cost reductionHardware and support costsEmployees to take on the costs
Competitive advantageAttract young innovative talentIT savvy employees
![Page 9: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/9.jpg)
SecurityTechnology and people
Legal and ethicalE-Discovery and privacy concerns
Financial considerationsIncentives and costs
Issues
![Page 10: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/10.jpg)
Issues & Implications
![Page 11: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/11.jpg)
Financial Implications
![Page 12: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/12.jpg)
Financial Considerations
• Considered Options:– Incorporate incentives for
purchasing devices with specific support provisions• “Approved” device: Pick up the entire
tab for both device and service• “Unapproved” device: Pay only for the
cost of service
![Page 13: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/13.jpg)
• Pros:– Easier for IT staffs to provide support and troubleshooting– Decreases costs of evaluating, configuring and
supporting large pool of devices
• Cons:– No significant cost-savings on device procurement– Does not eliminate problem of lost devices– Still required to provide support for “unapproved” devices
Financial Considerations
![Page 14: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/14.jpg)
• Do not restrict employee’s choice of devices• Do not sponsor employee’s devices and/or
service• Better utilize funds to improve support
infrastructure– Additional firewall controls– Information delivery methods to tablets,
Windows PCs, Macs etc.• Most commonly: Web portals
Recommendation
*10,000 SFF devicesAssuming 6000 smartphones at $500, 1000 tablets at $200, and 3000 laptops at $2,000
= $1,200,406,000,000
![Page 15: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/15.jpg)
• Result:– Employees can use desired devices– Intel able to provide sufficient support
and configuration for employee’s devices– Better utilization of funds– Eliminate Intel’s obligation to replace
lost devices
Recommendation
![Page 16: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/16.jpg)
Dollarized risks/returns of BYOD?
• Employee’s productivity!– BYOD employees additional 57 mins daily– Burden rate: $100/hr
– Approximately $238 million / year
Assume 251 working days in 201010,000 employees$95/57 min251 * 10000 * 95 = $238,450,000 a year in increased productivity
![Page 17: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/17.jpg)
Security
![Page 18: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/18.jpg)
Considered OptionsDeny “unmanaged” devices
Pro: BYOD devices would be fully “managed”
Con: Promote shadow IT
Client-server solutionPro: Secure data from unmanaged deviceCon: Attacks via compromised unmanaged device
![Page 19: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/19.jpg)
Mobile device managementIncrease visibilityGain controlWipe rule
Application managementBlacklist of appsContainerisation/App-wrapping
Technology
![Page 20: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/20.jpg)
Network ManagementControl access to corporate network
Data managementDocument repositoriesCollaboration tools
Technology
![Page 21: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/21.jpg)
PeopleCommunicate with End Users & Key Stakeholders
EducationTraining
User, Service Desk & Developers
Code of ConductRisk awareness
![Page 22: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/22.jpg)
Legal and Ethics
![Page 23: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/23.jpg)
Considered Options:Signing Agreement on legal safeguardsAllow Information to flow through corporate serversCollaborate with Device Manufacturers to install e-Discovery
E-Discovery
![Page 24: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/24.jpg)
Data storage and Backup
Monitoring and Audit Rights
Signing Service Agreement
![Page 25: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/25.jpg)
Compliance with privacy laws
Impossible for all data to flow through servers
Information flow through corporate servers
![Page 26: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/26.jpg)
Restricts employees to buying devices from specific manufacturers
Defeats the purpose of BYOD
Cost of Collaboration
Install E-Discovery in Device
![Page 27: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/27.jpg)
Provide apps that use make use of corporate servers
Manage Data Retrieval Process
Proper Handling of Data
How to solve the issues?
![Page 28: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/28.jpg)
Implementation Challenges
![Page 29: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/29.jpg)
Human ResourceLegalFinanceIT
Stakeholders
![Page 30: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/30.jpg)
Implementation Plan
![Page 31: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/31.jpg)
Device Support
Handling OS Updates
Managing Lost Devices
Roll-out PlanPilot Program
Implementing BYOD
![Page 32: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/32.jpg)
Conclusion
![Page 33: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/33.jpg)
BYOD: more than a passing fadSource of competitive advantage
Issues and ImplicationsSecurity, financial, legal and ethicalRecommendations and implementation plan
Should we implement BYOD?Not about technology, but about peopleEncourage and embrace innovation
Conclusion
![Page 34: Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA0067379M TAY WEN YIN (JASLYN)A0071489U WONG CHIH YONGA0075128E GOH AIK HWEEA0075053L Our Team](https://reader038.vdocuments.us/reader038/viewer/2022103015/551803205503466e558b4736/html5/thumbnails/34.jpg)
Questions & Answers