BYOD (bring your own device) is also known as (BYOT), bring your own technology means the policy for providing permission to employees, to access privileged information of the company and application using those devices and technologies. Nowadays, IT leaders of the world are facing rapid changes and other security challenges. These leaders have to protect the information of the company and other data while providing advanced technologies to their end users. These dynamics have shifted organization for using BYOD; a trend in the workplace which is now becoming the rule instead of an exception. It may be ultra light books, smart phones, tablets and others. It also includes services and software as employees can use tools on the web (Lennon, 2012, pp.171-180). Risks Associated with BYOD The device for the program of BYOD is used for accessing both risky and sensitive services and networks. It is internet based risk; therefore it can lead to adverse effect on organization issue devices more importantly for use of internet. It can also result in the breaching of data for instance Smartphone used by the employee of any organization, is lost then untrusted individual can retrieve this information of organization. It can be based on information of sales, customers or others. The device can be subjected to confiscation because criminal data lands on a US government employees. The phone number problem is also one of the major issues with BYOD because question arose for the ownership of the phone number.
Advantages
It increased the satisfaction, motivation and moral of employees. It also increased productivity and innovation. The new and rapid technologies are adopted frequently. It is cost saving approach because of shifting the cost of hardware cost to the employees.