[The proposal of a BYOD (Bring Your Own Device) communications campaign] strikes me as a bit too “happy/clappy” about promoting BYOD adoption. Explaining the process won’t address deep-seated privacy concerns like Peter Nolan’s. If done the wrong way, such promotions smack of the old IT “if we explain it to you lunkheads one more time it will sink in” mentality.
I started as a BYOD advocate and I’m OK with it for myself, at least for certain devices (e.g.,work email on a personal tablet). However, if we in IT want to control devices, we should expect that some won’t want to hand over their personal property. Therefore, if we want to control them, we should be prepared to provision them.
Also, I’m just not sure that BYOD is a great lever for preventing shadow IT. My suggestion would be to start with a more open IT portfolio process, which would ensure that everyone buys into what’s proposed, being executed, and how approvals and controls work.
Adapted from a LinkedIn comment on this post re: shadow IT and trust as a strategy to prevent it.
Filed under: PMO | Tagged: bring your own device, BYOD, choose your own device, CYOD, IT Strategy, Mobile, Portfolio Management, shadow IT | Leave a comment »