Bring Your Own Device Policies Let Non-Profits Get More Out of Their Employees and Volunteers

 In Cyber Security, Mobile

For non-profits, allowing employees and volunteers to use their own mobile devices brings major advantages. It lets the organization redirect spending from buying equipment to other purposes; allows employees and volunteers to work with devices and software they’re already comfortable with; and increases productivity and connectivity when doing fieldwork.

However, there are risks that come with the use of equipment that isn’t managed by your IT team. Non-profits don’t have customer data, but they do have sensitive information about their donors and the people who receive their services. This data can potentially be exposed if a mobile device is lost or attacked by malware. For these reasons, it’s important non-profits establish a “bring your own device” policy and use tools to establish controls over how these devices are used.

Start With a Policy

Before looking at tools to manage employee and volunteer use of devices, define the policy you’ll use the tools to enforce. It’s important that anyone who uses their own device receives a copy of the policy and agrees to abide by its terms.

The policy should explain who can use their own mobile device to access the non-profit’s systems, the kinds of devices that can connect to the organization’s network, and the activities that are allowed. Security requirements, such as mandating the use of passwords and screen locks, should be defined. The policy should describe how use of the device will be monitored and how the employee or volunteer’s private data will be protected, particularly if the device may be remotely wiped if it is lost or stolen.

Related: “Bring Your Own Device” Policies Need to Protect Both Employees and Businesses

Enforce the Policy with Tools

Don’t rely on the good will of your employees and volunteers to adhere to your BYOD policy; enforce the policy by using appropriate tools. Mobile Device Management, Mobile Application Management, and Enterprise Mobility Management software offer different levels of control over devices, applications, and usage. These tools can ensure that only authorized types of devices operating systems connect to your network, that only authorized applications are used, and that users are only granted permission appropriate to their roles. They can enforce security restrictions on the device, such as locking screens after a period of inactivity, and make sure devices affected by malware don’t connect to your network. The tools can also wipe sensitive data from the device if it is lost or the employee or volunteer leaves your organization.

Related: For BYOD Security, Manage Devices, Applications, and Users

Get Expert Help to Ensure Your Mobile Security

Prescient Solutions has 20 years of experience supporting the IT needs of Chicago-area companies, government agencies, and non-profit organizations. We offer a full range of IT services and support, including assessing your needs, implementing solutions, and monitoring systems. Our mobile support services include helping users manage their devices and helping you manage your mobile device users. Contact us to learn how our team of certified experts can help your non-profit maximize your effectiveness through using mobile devices effectively and securely.

Additional Nonprofit Resources

Non-Profits Need to Protect Their Mission By Protecting Their Data

IT services for Non-Profits

Recent Posts

Leave a Comment

top information security riskslimitations of encryption cybersecurity