Bring-Your-Own-Device Advice

13 May, 2014 By: Robert Green

Read more about how to handle personal handheld devices in the workplace at

The issue of users accessing company files and conducting work communications on their own smartphones, tablets, and other electronic devices is a serious concern for CAD managers. (For an introduction to this problem and ways to address it, see my series of articles, "CAD Is the Least of Our Problems.")

I came across an article by Jonathan Hassell on that deals with specific legal and policy issues that arise from users bringing their own devices (BYOD) to the workplace — including some you may not have thought of.

The article, "7 Tips for Establishing a Successful BYOD Policy," is organized into these steps:

  1. Specify which devices are permitted.
  2. Establish a stringent security policy for all devices.
  3. Define a clear service policy for devices under BYOD criteria.
  4. Make it clear who owns apps and data.
  5. Decide which apps will be allowed or banned.
  6. Integrate your BYOD plan with your Acceptable Use policy.
  7. Set up an employee exit strategy.

The article is targeted toward IT professionals, but CAD managers with a working knowledge of IT should be able to follow along on the key points. As you read through the article, pay particular attention to the human resource and liability issues the author brings up, as these are topics many CAD managers aren't conversant with.

This article is a very worthwhile read because, as we've seen, the BYOD problem is infiltrating CAD environments very quickly. I hope you find this resource as valuable as I have, and that you'll use it to start a discussion with your management on the topic.

7 Tips for Establishing a Successful BYOD Policy

Do you have a helpful tip, web site, article, or utility for the CAD Manager's Newsletter? Send it to me at If I use your tip in the newsletter you'll receive a prize!

About the Author: Robert Green

Robert Green

Add comment


Re: Bring-Your-Own-Device Advice
by: amelieheat
May 29, 2014 - 1:20pm
The CIO article offers some great tips for BYOD and CAD managers who need to deal with securing their data. BYOD is a big security problem for enterprise firms, but many companies are willing to deal with it because of the potential productivity gains. The most important thing is to do is secure the data and not just on the network; but with the various ways device that connect to the network. It is good that the article points out how important a BYOD policy is. Our hospital put a BYOD policy in place to use Tigertext for HIPAA complient text messaging, mostly to deal with the reality that the doctors were sending patient data over regular SMS which is not HIPAA compliant. Here is an example of a BYOD policy:
More News and Resources from Cadalyst Partners

For Mold Designers! Cadalyst has an area of our site focused on technologies and resources specific to the mold design professional. Sponsored by Siemens NX.  Visit the Equipped Mold Designer here!

For Architects! Cadalyst has an area of our site focused on technologies and resources specific to the building design professional. Sponsored by HP.  Visit the Equipped Architect here!