Federal CIO Councils Bring Your Own Device (BYOD) Toolkit

Bring Your Own Device program

IS 336: Enterprise Architecture

Bring Your Own Device program

The Bring Your Own Device program has taken different shapes based on the policies of the implementing organization. The Alcohol and Tobacco Tax and Trade Bureau made a decision to cut down on the costs, effort and time in refreshing computer devices to enable efficient client computing needs for the clients. The implication of the decision has enabled the organization to reduce the high operational costs and the disruption of the IT programs at the firm for several months. The employees of the firm currently access all computing resources at TTB through the help of thin devices (Morley, 2016). The “opt in” and “opt out” of government is not clearly outlined here but any elimination is required to meet the set legal requirements for al the policy issues. There is a reduced expenditure from the state government collectively from the high number of employees working from home.

The second case study is by the United States Equal Employment Opportunity pilot project on BYOD. The agency requires that all employees who wish to use personal smart phones at work should allow third party software to be installed. Through this, the government manages all security settings on the smart phone and is able to remotely wipe all government information from the devices if they are lost. The government has saved a lot through this process from exposing its confidential information to unauthorized parties as it has occurred before on several occasions.

The third case study borders on the state of Delaware BYOD program. The state has made a decision to embrace the BOYD concept that will save both the federal and local government significantly as it intends to favor personal devices over state owned devices (Lee, 2015). To gain support from all the employees, the state made a decision to reimburse all employees who return their state owned devices in favor of their personal devices. There is a plan for the government to spend once and for all on device migration by totally reducing the number of state owned wireless computing devices. The state government will be able to save almost three million US dollars every year resulting from the reimbursement program. The state will also save on the costs of the lifecycle trends and frequent support for the state owned devices.

There are numerous IT support requirements for the personal employee devices. The agency installs specific software in the personal devices enabling them to remotely wipe confidential data and clean government emails (Morley, 2016). The employees are also reimbursed as a motivation for them to have a preference of personal computing devices over state owned devices. The personally owned computing are therefore upgraded and installed with up to date software to enable efficient operation.

The whole process has been threatened by potential security risks that agencies try to limit. There is a high chance for other parties who are non employees to access the data and information in the personal devices (Ballard, 2012). To prevent these acts, the agencies need to have a way where all organizational data is secured under a password. This will ensure that, all parties’ wit the intent to view or update information on the device will require a password to gain entry.

The security breach due to loss of the device has been handled by enabling the agencies to remotely delete data from the personal device. This prevents any unauthorized persons from using the data in the device. There is also need to encrypt all the information to ensure that all those who have access to this information have encryption keys.


Ballard, M. (2012). Bring your own device – Unabridged Guide. Dayboro: Emereo Publishing.

Lee, N. (2015). Counterterrorism and cybersecurity: total information awareness. Cham: Springer.

Morley, D. (2016). Understanding computers: today and tomorrow. [Place of publication not identified]: Cengage Learning.