Wired Workplace Wired WorkplaceWired Workplace
How information technology is changing the landscape for federal employees.

BYOD As a Right, Not a Privilege

ARCHIVES
The younger generation entering the workforce is expecting to be able to use their own devices for work purposes, and many are bypassing their organization’s security policies to do so, according to a new report by security company Fortinet.


A survey of more than 3,800 active employees in their 20s found that 74 percent already regularly use their own personal devices for work purposes. Fifty-five percent said they view the use of their own device at work as a right rather than a privilege.

At the same time, younger workers understand the risks of using their personal devices for work purposes, with 42 percent of 20-somethings saying they believe potential data loss and exposure to malicious IT threats to be the most dominant risk associated with BYOD, according to the survey. But that’s not stopping some of them, with 36 percent admitting they have or would contravene a corporate policy banning the use of personally-owned devices for work purposes.

Organizations also may face resistance from younger workers in implementing security controls on an employee’s device, the survey found. The majority (66 percent) of respondents consider themselves, not the company, to be responsible for the security of personal devices they use for work purposes. Only 22 percent consider their organization responsible for securing personal devices used for work, the survey found.

Do younger workers at your agency consider BYOD a right rather than a privilege? What implications does this have for your agency going forward, particularly as more and more Generation Y workers enter the federal workforce?

Reporter Portrait for GovernmentExecutive.com

Brittany Ballenstedt writes Nextgov's Wired Workplace blog, which delves into the issues facing employees who work in the federal information technology sector. Before joining Nextgov, Brittany covered federal pay and benefits issues as a staff correspondent for Government Executive and served as an associate editor for National Journal's Technology Daily. She holds a bachelor's degree in journalism from Mansfield University and originally hails from Pennsylvania. She currently lives near Travis Air Force Base, Calif., where her husband is stationed.

FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.