I’m watching my two-year-old son and wonder how amazingly he handles tablets and phones. I involuntarily recall a famous joke:

“- My child, at three years old, can turn on the computer himself and choose a cartoon for himself!
“What did you do when you were three?”
“I ate sand ...”

And I really often ask myself a rhetorical question: “Are these children so smart now?” or "Modern technologies are so understandable and obvious that even a peanut can understand them?"

A modern child receives from parents their personal first telephone, tablet, watch-phone at a fairly early age, from 5-6 years. For what? So that the parent can always contact his child. And as a rule, and this is natural, the model, and at the same time, the technical possibilities remain with the choice of the parent. The parent pays for the device itself, its maintenance, and in case of problems (technical, software), it itself is engaged in their elimination.

In such a simple manner, we just examined one interesting and growing concept in organizations, the so-called CYOD (Choose Your Own Device) concept, which literally means "choose your device." In this case, the organization, at its discretion, offers its employee a certain choice of devices, while the company itself is engaged in the purchase and payment of services, as well as maintenance. At the same time, the choice of model and software remains with the company and, first of all, is determined by the financial component, as well as by the capabilities of the company's technical personnel who will serve this device.

Meanwhile, our baby is growing up and even well versed in all the capabilities of his phone. And maybe even not well versed in its settings. But as before, they are not able to purchase the device on their own. For example, due to financial insolvency.

So in our article there is another concept, conceptCOPE (Corporate-Owned Personally Enabled) , which in literal translation means "corporate devices, the configuration and maintenance of which the employee is engaged in independently." As in the previous case, the company acquires the employee a phone, tablet or laptop, but in this concept, the employee is independently responsible for its configuration and maintenance, at least to a certain extent.

Time is inexorable and our baby is no longer a child, he has some savings and no steady income, even if it’s pocket money. He already has some baggage of technical knowledge and he already has his own opinion on the choice of device and it is not so important that this, phone, tablet or laptop, at the current level of technology, the boundaries of these concepts are blurred. He acquires for himself the model of the device that he likes and can afford, with the technical characteristics that he needs. He pays for the installed application (out of pocket) and even pays for the connection himself, ideally. What remains unchanged? That's right, mom should still know how to contact her child, even if this is a new device. And if we consider this everyday situation in the prism of the organization. And we’ll make mom the head of this company,

BYOD (Bring Your Own Device) which literally means “bring your device”. And the meaning of this concept is very simple. Bring your mobile device and be always in touch and at work. This term first appeared in 2005, with the release of the work of Raphael Ballagas "BYOD: Bring Your Own Device", but has gained special popularity recently. As it’s not difficult to guess, an employee in the company, from his personal smartphone-tablet-laptop, being in the company’s walls or not, has the opportunity to work.

Any of the concepts presented has a number of undeniable advantages, but it also has a number of disadvantages, and sometimes insurmountable difficulties. It is impossible to dispute that the employee of the company is always in touch always up to date, but at the same time, where is this border within the framework of the labor code, with respect to this “always”? Well, and, of course, at the forefront, the safety and confidentiality of company information, devices can and are attacked, but they can simply be left or forgotten somewhere. In this case, this is a great human risk.

Also popular now: