Bring your own device Unlock value for your organization

reject to fail 1 2 4 11 12 2 Bring your own device . your way Embrace to succeed.Content To BYOD or not to BYOD? The BYOD management challenge Find nirvana BYOD.

introduced BYOD to the sales force. By investing in the tools. BYOD presents many opportunities for those prepared to face the challenge. According to 63% of CEOs. Already. BYOD gives employees anytime. two-thirds of the Canadian workforce use personal devices for work–a number expected to reach three-quarters by 20151. While productivity can be difficult to measure. a 100-year-old hydraulics maker.To BYOD or not to BYOD? There’s an accelerating trend in the workplace raising new challenges for today’s CIO: the bring your own device (BYOD) revolution.. As the BYOD trend gains momentum. tablets and laptops – for work purposes. According to 62% of CEOs. BYOD enhances creativity and boosts employee productivity5 –and 54% of the workforce agrees6. with many citing concerns about the diminishing privacy of corporate email. permitting employee-owned devices at work positively influences employees’ view of the company7. their sales cycle fell from days and weeks to hours and minutes8. as IT groups typically underestimate the proportion of employees using their personal devices for work purposes by as much as 50%4. they must determine how to enable BYOD in a way that mitigates its risks and creates value for the entire enterprise. solutions and practices required to support BYOD. The benefits don’t stop there. anywhere access Spurred on by the consumerization of IT. organizations can mature their technology and infrastructure capabilities to deliver IT services more efficiently and effectively. enabling them to work while on the go. up from 30% just a year ago2. Consumerization of IT refers to the rising influence consumer-focused technology experiences have on technology expectations at work9. And these statistics tell only part of the story. According to IDC. BYOD is here to stay. As a result. network login credentials and other sensitive information3. on-time and on-demand technical support. companies can no longer afford to ask whether or not they should BYOD. 71% of businesses believe mobile device use has already caused an increase in security incidents. ability to add new users more efficiently following a merger or acquisition) • Develop an end-user productivity platform that enables true mobility and anytime. anywhere access to corporate data. BYOD also improves hiring and retention and boosts employee morale. As employees increasingly use unmanaged and unsecured devices to transfer data into and out of the corporate infrastructure. When Eaton Corp. Instead. Bring your own device 1 . such as self-support models. from compliance issues to data leaks–and those challenges will only intensify as the number of mobile devices and operating systems proliferate. • Adopt device-agnostic security policies and practices. particularly as employees continue to favour the flexibility and usability of their own devices. On the flip side.g. BYOD is a widely-used phrase that refers to employees using their own computing devices – such as smartphones. including easier-to-manage centralized security capabilities • Build agile IT processes that are more responsive to changing business needs (e. organizations face a variety of challenges. 40% of devices used to access business applications are consumer-owned. This positions them to: • Improve end-user services. etc. it is clear that IT organizations caught unprepared will face mounting network management and security issues. customer data.

Hardware device costs. organizations can expect to face challenges in four main areas: Governance With BYOD raising significant data. including HR and overtime policies. mobile device management) and an environment of low vendor maturity • Take legal issues into account in their implementation.g. only account for 20% of the total cost of device ownership10 –and these savings are more than offset by the costs associated with: • Improving the organization’s information security posture • Training staff to support multi-device platforms Organizations struggle to balance flexibility and security. Stipends. They must also determine the repercussions that may arise if employees do not embrace their new BYOD strategy. Given the lack of BYOD standardization. the numbers don’t add up. for example.The BYOD management challenge Although BYOD is the new face of mobile consumerization.g. an organization needs to: • Develop well-defined policies for BYOD. privacy and security concerns. and support Service Level Agreements. ranging from human resource (HR) and legal issues to compliance and security risks. As a result of these organizational implications. management’s requirements for working onsite and employee expectations regarding uniform access and privileges. When creating BYOD governance processes. something that today’s early adopters are moving forward without • Create consumerization policies that maintain a balance between user flexibility and security • Consistently control and enforce policies. organizations must put the right policies and processes into place to protect themselves and their employees from potential legal and liability risks. organizations must do more than listen to what employees want. as they strongly influence policy making for BYOD • Consider the impact of BYOD on existing policies. Organizational In addition to representing an economic and technological shift. appropriate usage. BYOD is also driving a change in corporate culture– and employees are leading the charge. numerous challenges follow in its wake. to avoid potential contradictions and confusion • Balance employee needs for flexibility and accessibility with the enterprise’s needs for security • Address the impact of BYOD on the organization’s culture. To address these workforce realities. For instance. companies will need to: • Changing expense policies as costs traditionally allocated to the capital budget now need to be accounted for differently on financial statements. Financial Although some organizations approach BYOD as a cost saving opportunity. broadband / 3G / wireless costs) associated with the growth of unmonitored data usage • Engaging in lengthy projects to effect policy and procedural changes • Changing platforms to virtualize applications. cannot be capitalized • Increasing data costs (e. open corporate networks and implement new management tools 2 Bring your own device . such as control rights for lost or stolen devices. which is complicated by the current lack of standardized tools (e. which are often seen as the major savings opportunity. will all your employees be able to select the platform of their choice? Or will this differ by class of employee? • Put incentives in place to encourage employees to adopt BYOD • Mobilize and sustain the BYOD program through appropriate training and communication Misconceptions around cost savings can lead organizations to fool’s gold.

What’s more. such as corporate/enterprise applications and data. through virtualization. This puts corporate IT teams under pressure to: • Manage multiple end-user device platforms and integrate with the IT infrastructure which complement business goals and enhance the capability to support BYOD • Determine how to enable access to corporate resources. support staff training • Broadband / 3G / wireless costs. As a result. including the re-engineering of existing network architecture if required • Strategically invest in applications and infrastructure. software licenses and wireless / data usage Savings • Hardware device purchase • Pre-defined allowances / stipends for wireless / data usage • Reduction in device support costs through leveraging more selfsupport compared to traditional agent-assisted service desk support • Decreasing hardware refresh program costs as more and more employees adopt BYOD IT support Miscellaneous Technology Today’s $500 handheld device packs more computing power than a $10. such as virtualization networks and cloud applications. the ubiquitous availability of free or cheap applications creates unprecedented threats to information security. antivirus licensing costs • Security tools. potential tax liabilities. etc.000 server did a decade ago. loss of volume discounts on devices. • Define enterprise mobility programs that cover not just the technology issues but also the business issues to help secure continued investment for BYOD programs Manage the personal device Security Data Device management • Provision. Applications Personal device Support Network (public /private) Versioning (OS & apps) Virtualization Bring your own device 3 . upgrade to cloudbased / browser-based / platformindependent apps • Changes to processes to support multiple devices and platforms. mobile apps. warranty costs. mobile device management. etc. BYOD is compelling corporate IT units to manage this complexity and risk while still enabling the business to exploit its benefits. changes to enterprise expense management processes. activate and support a multi-device environment • Secure data networks by investing in the right tools. as even the most novice employee can wreak havoc for IT. • Operating system. Organizations taking a casual approach to these trends are bound to suffer.Common BYOD costs and savings Costs Hardware Software Infrastructure and application upgrade • Stipends for devices.

increased productivity vs. structured approaches are few and far between. 4 Bring your own device . Similarly. Organizations that attempt to meet all three goals will invariably set themselves up for downstream challenges. data loss. reduce risks • BYOD programs should be rooted in specific business objectives. mobilize workforce. as the lack of clear and consistent objectives impede their efforts to appropriately define and implement new policies. As a result. HR and legal Operationalize and implement • Evaluate and implement supporting solutions around security. policy violations. most responses to this unsettling trend have been reactionary. it is time to adopt a multi-tiered approach that addresses key BYOD challenges. a business strategy focused on increasing the size of your mobile workforce would be a key BYOD driver and one that may influence an organization to place a higher priority on productivity enablement when determining tradeoff decisions.g.support. organizations need to begin by soliciting input about business strategies. This needs to stop.Find nirvana Approach to BYOD management Elements to effective management Define BYOD objectives • Why are you doing BYOD? E. Step 1: Define BYOD objectives Before embarking on a BYOD journey. reimbursement. etc Operationalize and implement • Identify and evaluate vendor solutions based on alignment with your objectives and policies • Streamlined device certification is key to provide timely access Evaluate risks Operationalize and implement As organizations ride the BYOD tsunami and launch initiatives to tame it. to reduce costs. business. etc. device management. organizations must begin by answering one fundamental question: why are they implementing BYOD? Frequently. HR and legal) • Key policy considerations include: eligibility. aligned with overall enterprise strategy Evaluate risks • What key business and technology risks must be accounted for? • Critical enterprise risks should be considered when defining your BYOD program Define policy • Define BYOD program elements that address risks and exploit benefits • Ensure collaboration between technology. organizations try to accomplish too much with their BYOD initiatives and find themselves pursuing three often-conflicting goals: cost reduction. For instance. If organizations hope to reach both their short. a strict security stance will likely interfere with an organizations ability to realize productivity gains. For instance. goals and planning. While all three objectives are valid. risk mitigation Evaluate risks • Identify internal and external risks that will impact the success of your BYOD program • What is the degree of current personal device penetration within your organization? What regulatory risks exist? • What are the implications to your organization? Define policy • Effective BYOD programs require enterprisewide collaboration (ie.and long-term objectives. finance. Doing this will only heighten risk due to looser security controls. finance. To determine BYOD objectives. risk mitigation and productivity enablement. it is not possible to simultaneously install detailed security precautions and provide users with extensive flexibility and options. successfully implementing a BYOD program requires a tradeoff. as per your defined policies Define policy Define objectives Key BYOD considerations Define BYOD objectives • Align BYOD objectives with your overall strategy • Decide on a position: cost reduction vs.

.g. as down stream activities regarding policy definition. software management) • How are lost/stolen devices managed today? (e.g..) • Who is currently entitled to corporate-owned devices today? Why? • Are there opportunities to scale back corporate-owned devices? • What are the costs (hardware. any local data must be centrally managed. support)? Employee expectations Current entitlements Process Device management Technology Security Tools Bring your own device 5 . service. level of reimbursement. etc. remote lock... productivity enablement and risk mitigation • BYOD programs that are founded on all three goals are not setup for success. app management. backup/ recovery.Make tradeoff decisions Cost reduction • Defining your BYOD objectives requires you to make tradeoff decisions between inherently conflicting goals – cost reduction. encrypted and backed up) • To what extent will existing security practices constrain BYOD opportunities? • What tools/solutions are used today for device management? • What are the costs? (hardware.)? • What processes are in place for managing devices? (e. etc. etc.) • What are the current security policies and practices in place today? (e. governance and process enhancements will be impeded by the lack of a clearly defined decision criteria Productivity enablement Risk mitigation Current state considerations Consideration People Employee interest in BYOD Description • What percentage of employees are interested in adopting BYOD? • What percentage of employees are using personal devices for work purposes today? • What are your employees’ expectations around BYOD? (e. software.g. remote wipe.g. service. software. selection of specific devices/platforms.

External Competitors may possess productivity advantages if your BYOD program is not appropriately defined and executed. Organizations may be exposed to liability concerns arising from device usage or implications posed by reimbursements you provide to employees. employees working onsite. which inhibits IT’s ability to manage and control devices. such as requirements for outside of normal working hour for work purposes. Undisciplined use of devices by The consumerization of devices and resulting advancement of employees can expose your organization applications. on the cloud). Your organization. entitled to overtime pay. An organization needs to define its business and technology objectives. processes and technology. have limited ‘out of the box’ security. may be overtime pay. as organizations are increasingly accumulating and exploiting personal information. and are contacted rights. Increasing level of device diversity and complexity may stress your abilities to manage these devices. promote user behavior that can be incongruent with what’s ultimately best for your organization. and come in a variety of different platforms and makes. A BYOD program that contains high degree of control on device usage. Where and when devices are used could shift liability ownership to your organization. Description Employees favor flexibility and minimal restrictions on device use. who lose their phone or have them damaged. Proliferation of multiple devices and platforms (as the result of consumerization) minimizes the feasibility of a simple and single solution to device management. For example. app stores. Supporting too many devices and inefficient support processes can result in incremental costs. may be entitled to full device replacement paid for by the employer.These decisions will similarly be influenced by the current state of people. Compromising an employee’s personal information can lead to severe consequences for your organization. to additional security threats.. may incur unforeseen costs and be exposed to security concerns. BYOD policies may infringe on employee Employees that are participating in BYOD. information loss. data portability (e. work to uncover information about the level of Common BYOD implementation risks Risk type Internal Risk Employees can be dissatisfied by the limited selection of supported devices. 6 Bring your own device . facing significant hurdles in effectively managing devices. the current level of entitlements for corporate-provisioned devices and evaluate existing security policies and practices.g. Privacy issues are top of mind in today’s business world. etc. Your organization may be exposed to regulatory risks that result from data breaches. platforms. Mishandling of personal information can quickly become public knowledge and severely tarnish your brand and reputation. and applications can impede potential productivity gains and ultimately result in competitive risks to your business. etc. interest in BYOD among its employees. Poor management of end point data and sensitive information can lead to regulatory exposures that could be debilitating to your business. Devices are consumer-focused.

aligned with enterprise-wide interests. Bring your own device 7 .Step 2: Evaluate risks BYOD programs bring a new focus to many risks that an organization already faces. competitive pressures and privacy issues. By evaluating your organization’s risks in advance. For example. including the potential for employee dissatisfaction. reap rewards By defining response strategies early in the BYOD journey. risk evaluation leads to a “no surprises” experience. By evaluating your organization’s risks in advance. When combined with defined objectives. Make it count Effective risk evaluation requires participation from both business and technology stakeholders. Control risks. The defined BYOD objectives combined with current state analysis are key inputs when an organization is engaging in risk evaluation discussions. liability concerns. you can both identify areas of concern and define appropriate mitigation strategies. you can both identify areas of concern and define appropriate mitigation strategies. effective governance requires robust policy making. Risks should be assessed for probability and impact. such as those associated with the potential loss of sensitive data residing on unmanaged devices. However. BYOD also comes with new risks. Risk evaluation ensures those interests are defined in advance – with appropriate business and technology input. with corresponding response strategies developed in line with business and technology interests. risk evaluation also helps set parameters for future BYOD discussions. which can strengthen both policy making and enforcement activities.

lock/wipe and restore. stipend refreshes every 2 years)? What will be reimbursed (hardware. and obtaining support? Will the device be remotely wiped? What kind of support. finance and legal functions. etc. platforms. overtime. A comprehensive policy discussion requires a collection of unique perspectives that can only come from across an organization. effective policy formulation requires collaboration organization wide..g. containerization)? How will devices be locked.)? How will employee privacy be protected? Will your support group have access to personal information? How will policy violators be dealt with? Will BYOD policies contradict or conflict with other policies (e. service. are eligible and in what way (e. and how much support. Collaboration is key Given the number of levels it touches. as a lack of collaboration between security. can a user expect from your organization? What kinds of devices. business. applications.)? Who is eligible for the BYOD program? What roles. technology. This is especially important as an organization begins to assess the implications of its policy decisions on its risk profile. Common policy elements include device management. levels.Step 3: Define policy Once objectives are clearly understood and risks are measured.. an organization can begin to define the policies that will govern a BYOD program. operations and application management teams can result in confusing and inconsistent policies and practices–leading to user frustration and unacceptable user behaviour. such as remote management.g. including. wiped and restored? What happens when a device is lost. such as responsibility for hardware costs and stipend levels. tiered eligibility)? Lost/stolen device Support Acceptable use Reimbursement Privacy Policy violations Eligibility 8 Bring your own device .g.g. etc. services and accessories are allowed under the BYOD program? Who pays for the initial device? What level of stipend is available? Is it consistent across all eligible users? Is it available recurrently (e. and policy violations. Typical BYOD policy decisions Element Activation Device management Key considerations What is the process for enabling a new employee with a device? How will devices be remotely managed? What level of centralized control will exist? What level of management will be done at the end-point (e. reimbursement. This may lead to potentially revisiting previously-defined risk response strategies. HR policies for employee responsibilities. etc. Coordination between various technology groups is also critical.. HR.. stolen or damaged? What process should the employee follow for reporting the event.

retry and timeout • App encryption and cleanup Lost/stolen device High-risk usage scenarios • Email/data loss prevention • Limit system access (via VPN) • Wipe/rebuild after exposure to high risk geographies Support/help desk • Limited supported devices/models • Lock. To facilitate this level of governance.g. it is important to continuously report on the level of employee participation in any BYOD program.g. etc. Policies also need to be enforced by adopting formal governance mechanisms across the enterprise. for executives) Administrative • Expense rules and controls for company-paid access plans Personal devices • Filter sensitive data • Employee acceptance of lock/wipe decisions • Use of encrypted containers Compliance • Policy monitoring • Consequences of intentional violation Liability • Employee signs code of conduct • External media access and encryption          Support Acceptable use  Reimbursement  Privacy   Policy violations     Eligibility   Bring your own device 9 . web portals) • Code of conduct agreements All devices • Min/max device levels (hardware.Reinforce over time As most corporate managers know. enacting a new policy is rarely sufficient to gain buy-in. by tracking data such as device usage. incidents. application usage. Sample policy responsibilities11 BYOD program discussion Activation Discussion areas Risk • Device segmentation • Authentication requirements  Business HR Legal IT IT ops App dev Security   Device management Contractors and partners • Limited system access (e. wipe and restoration • Exceptions (e. firmware and operating system) • PIN length.

For example. an IT organization will be front and centre in translating BYOD decisions into defined programs. These solutions allow administrators to remotely locate and wipe devices. companies use device. install anti-virus and anti-malware software and enforce corporate policies relating to passwords and other security measures. Containerization allows organizations to limit their responsibilities–and exposure–for controlling personal devices.and file-level encryption as well as containerization–a process that isolates personal data on a device and prevents it from contaminating corporate applications and data. Consider mobile device management Of course. This includes highlycustomized solutions that address specific business needs. most companies pay particular attention to information stored locally on the device12 . for instance. enterprises can enable employees to connect their devices to the network with only basic user authentication protocols. MDM lets organizations control these employee-owned devices in the same way they control legacy systems. To succeed at this task. NAC allows organizations to control which devices can access each level of the organization’s internal network. risk mitigation strategies and policy definitions for guidance. as well as enterprise-wide product suites that provide end-to-end mobile device management. Other NAC features include encrypted email sessions. mobile VPN and encrypted traffic for specific apps. while requiring more extensive authentication procedures for users who try to perform configurations or health checks. rather than the entire personal device. like service activation and provisioning. Open up the network Network access controls (NAC) have become a popular and effective way to manage the risk of employee-owned devices. remote lock and wipe. They also allow organizations to focus only on supporting the containers. such as PCs and laptops. IT organizations should turn to their BYOD objectives. This can significantly reduce support costs.Step 4: Operationalize and implement Once an organization begins to implement its new policies by developing core processes and capabilities. One size does not fit all While mobile technologies are still reaching maturity. Using technologies such as VPN and virtual desktop environments on mobile platforms. To control this data. Essentially. Control the data. To navigate the array of choices and select the appropriate solutions. such as device backup and recovery. there are a variety of solutions available to address the growing needs of today’s businesses. while limiting an organization’s level of liability. the IT organization must keep several things in mind. mobile device management (MDM) solutions extend beyond containerization by enabling organizations to control all personal devices across the enterprise. and app support and management. this step also generally involves the introduction of new technology capabilities. Beyond leveraging existing IT processes. 10 Bring your own device . the BYOD program starts to come to life. risk response strategies and policies. with NAC. not the device In managing employee devices. containerization products can be cost effective to implement and operate. Base technology decisions on your objectives. Whether there are existing processes in place or new ones are required.

an organization can build a BYOD program that aligns with its overall strategic direction.BYOD. legal. your way By leveraging a process that fosters collaboration. an organization can build a solid foundation to pursue BYOD. finance) during policy development. Approached effectively. proactive decision making and effective risk evaluation. and ensuring participation from key functional groups (e. to evaluate the opportunities and threats posed by BYOD and make appropriate decisions for the BYOD strategy. • Realize goal-driven results By rooting the development of a BYOD program in well-defined goals. and by the right people. leading practices and trends. HR. an enterprise is better positioned to openly discuss and address its needs. Bring your own device 11 . such as industry peer comparisons. • Balance enterprise needs By engaging business and technology stakeholders to help define BYOD objectives. an organization will: • Align with business strategies By engaging business stakeholders and reviewing business goals and strategies. as part of the journey towards building a BYOD program.g. The result is a “no surprises” experience and a BYOD program that reflects pre-defined risk mitigation decisions determined by key members of an organization. This allows it to leverage relevant data and insights. is consistent with HR policies and reflects financial considerations.. • Proactively manage relevant risks Through an emphasis on risk evaluation and involvement of key stakeholders from across the enterprise. This enables the creation of a BYOD program that addresses compliance requirements. This allows an organization to define a BYOD program that promotes corporate objectives–whether this includes developing a more mobile workforce or extending an existing enterprise mobility strategy. risk decisions are made at the right time. you can begin to build a BYOD program in a structured and measured way.

Unlocking these objectives will set you on the right path. An approach that starts with defining your BYOD objectives and assessing your risks can help you navigate the multitude of BYOD management pitfalls. Technology must work hand-in-hand with its business counterparts. BYOD is inevitable. technologies and processes that help them mature their infrastructures and extend their capabilities. balances the needs of your enterprise. and is rooted in its core objectives and reflects risk mitigation decisions proactively made with appropriate representation from relevant stakeholders. Organizations are revisiting IT policy decisions made several years ago. More significantly. 12 Bring your own device . and efforts must be rooted in the answer to a basic yet fundamental question: why are you doing BYOD? The result is a BYOD program that is aligned with core business strategies. often requiring organizations to react to pressures imposed by BYOD with little structure and forward thinking. but when. Your employees are driving the trend. reject to fail Current BYOD management practices are fraught with a variety of different challenges and pitfalls. it is important to clarify misconceptions and understand key business drivers. it does contribute to improved productivity and employee morale. The lack of standardized and commonlyaccepted BYOD solutions only magnifies these challenges. Building an effective BYOD strategy and management capability has become a critical exercise.Embrace to succeed. The choice to address BYOD is not a matter of if. To get started. this is a technology problem) and a tendency to fall back to age-old processes have led organizations to policies that poorly serve the enterprise and expose the organization to increased security threats and risks. Although BYOD has yet to deliver significant cost savings. as organizations adopt new BYOD policies. Your peers are managing its opportunities and threats.g. in the midst of an ever-changing landscape of devices and platforms. Traditional mindsets (e. Misconceptions regarding potential cost savings and employee adoption hinder executive leadership from steering the organization down the right path. engage your business and technology stakeholders to understand your rationale for BYOD. relevant functional groups must be engaged throughout the process. Before any organization can succeed at this. There are several steps involved in building an effective BYOD program. its true value may lie in the future.

Retrieved from http://www. Gartner: Mobility and Security. Bring your own device to work is more than a trend. Globe and Mail. Retrieved from http://resources. Nick.ca Endnotes 1 Rockel. Chris.zdnet. (October 2011). (February 2012). Leif-Olof.com/blog/microsoft/ the-consumerization-of-it-and-of-microsoft/5019 Wallin. (April 2012).ca Jaspal Dhillon 416-775-7187 jdhillon@deloitte. (April 23 2012). Marsh. Kaneshige. (2011).com/original/AST-0055442_BradfordWP0103_2_. Trend Micro. Tyler. (February 2012). idgenterprise.pdf Lessard.ca Ashwin Kumar 416-643-8292 ashwikumar@deloitte. Bradford Networks. Bring Your Own Device (BYOD) Unleashed in the Age of IT Consumerization. idgenterprise. Are BYOD Workers More Productive?.ca Erick Vandeweghe 416-775-7405 evandeweghe@deloitte. Trend Micro Releases New Consumerization and BYOD Research: IT Executives and CEO Survey Final Report. (2012). Retrieved from http://resources. (January 2010). Cheng 416-775-4756 iacheng@deloitte. CIO Magazine. Seven Steps to Planning and Developing a Superior Mobile Device Policy. Gartner Girard. Foley. The consumerization of IT–and of Microsoft. Barcelona: Mobile World Congress 2012. Gartner’s View on ‘Bring Your Own’ in Client Computing.com/original/AST-0055442_BradfordWP0103_2_. Barcelona: Mobile World Congress 2012. Tom.ca David Noseworthy 416-874-3288 dnoseworthy@deloitte. Gartner 2 3 4 5 6 7 8 9 10 11 12 Bring your own device 13 . John. (September 2010).com/cm/community/ features/guestopinions/blog/byod-powerful-enabler-or-impending-catastrophe/?cs=50155 Bradford Networks. E. Trend Micro Releases New Consumerization and BYOD Research: IT Executives and CEO Survey Final Report.ca Fawad Baig 416-867-8146 fbaig@deloitte. Mary Jo. (October 2011).Contacts Arish Kathawala 416-601-6506 akathawala@deloitte. (February 2012).ca Urooj Khan 416-775-8606 urkhan@deloitte.ca Ian Y.itbusinessedge. (2011). Gartner Maiwald. BYOD: Powerful Enabler or Impending Catastrophe? Retrieved from http://www. Bring Your Own Device (BYOD) Unleashed in the Age of IT Consumerization. Latest Enterprise Mobility Survey: Sometimes Less Control Means More Productivity.pdf Trend Micro. Yankee Group Research Inc.

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited. Deloitte operates in Québec as Samson Bélair/ Deloitte & Touche s.www.e. consulting. each of which is a legally separate and independent entity. provides audit. is the Canadian member firm of Deloitte Touche Tohmatsu Limited.c. and its network of member firms. a UK private company limited by guarantee. one of Canada’s leading professional services firms. an Ontario Limited Liability Partnership. Deloitte & Touche LLP. Please see www.r.000 people in 56 offices. and financial advisory services through more than 8. 12-2814 .l.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms.deloitte.ca Deloitte.n. © Deloitte & Touche LLP and affiliated entities. tax.

Sign up to vote on this title
UsefulNot useful