{"id":2349,"date":"2013-08-22T15:08:42","date_gmt":"2013-08-22T15:08:42","guid":{"rendered":"http:\/\/www.backupassist.com\/blog\/?p=2349"},"modified":"2019-11-13T02:15:35","modified_gmt":"2019-11-13T02:15:35","slug":"byod-and-backups","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/byod-and-backups","title":{"rendered":"BYOD and Backups"},"content":{"rendered":"<p><a href=\"http:\/\/www.backupassist.com\/blog\/news\/byod-and-backups\/attachment\/byod\/\" rel=\"attachment wp-att-2350\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2350\" title=\"BYOD\" alt=\"\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/08\/BYOD.png\" width=\"640\" height=\"250\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/08\/BYOD.png 640w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/08\/BYOD-300x117.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Bring Your Own Device (BYOD) was one of those ideas that exploded across IT last year. Although the practice of having staff integrate their personal smartphones and tablets into secure business systems had been around for several years, the fact that more and more companies were embracing BYOD meant that 2012 was the year that it really broke through. Amongst all the chatter about possible benefits and probable dangers little has been said about how to organize and arrange backups for company data on employees&#8217; devices.<!--more--><\/p>\n<p>What does BYOD mean for all your carefully crafted backup strategies? It can be disruptive to say the least, but some thought before unleashing BYOD will mean your backups and BYOD won&#8217;t be in a Google\/Facebook-like perpetual conflict.<\/p>\n<p>BYOD is all about trust. Trust by the employee that you won&#8217;t remotely wipe their brand new Galaxy S4 for no reason or snoop through their personal emails. And trust by you that your employee won&#8217;t leave her S4 lying around with your latest financials open. As with most trust based arrangements it helps to lay down some rules and guidelines first.<\/p>\n<p>To help out we&#8217;ve pulled together some ways to make sure your critical data on employees&#8217; devices will be backed up while remaining respectful to employees&#8217; privacy.<\/p>\n<h2>Put it in writing<\/h2>\n<p>A BYOD contract is a good place to start. This contract should lay out the basics of the agreement and might include the type of device to be used, which applications are acceptable and security measures such as lock screens or remote wiping or it might not contain any of these. IT Manager Daily has a decent but basic <a href=\"http:\/\/www.itmanagerdaily.com\/byod-policy-template\/\" target=\"_blank\" rel=\"noopener noreferrer\">BYOD employee agreement template<\/a> that you could use.<\/p>\n<p>You should also mandate that the employee using the device backs it up according to a pre-determined schedule, especially if this person works from home or is on the road most of the time. This will ensure they are aware of their responsibility for the upkeep of the company&#8217;s sensitive information and that they must take steps to ensure they create backups regularly, which can then be transmitted to your central backup scheme.<\/p>\n<h2>Automatic backups all the way<\/h2>\n<p>An employee walks into your office. He&#8217;s been overseas for the last two weeks and his tablet is filled with new sales and customer data that hasn&#8217;t been backed up. As soon as he reaches your Wi-Fi signal his tablet starts backing up to your server.<\/p>\n<p>An automatic backup to your servers is one of the techniques that you should consider as part of your front line in the BYOD backup department. It means you can be sure that backups of critical company data on personal devices are occurring whenever an employee steps into the office adding an extra level of protection and security to your BYOD backup plan.<\/p>\n<p>While there aren&#8217;t a vast number of business-level backup apps available for this yet (at least, not as many as there are iterations of Angry Birds), I managed to find <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.Odroid.ObackupGold&amp;hl=en\" target=\"_blank\" rel=\"noopener noreferrer\">this one<\/a> and <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.cronsult.andmp&amp;hl=en\" target=\"_blank\" rel=\"noopener noreferrer\">this one<\/a> with a quick search of Google&#8217;s Play Store.<\/p>\n<h2>Know where to start and where to stop<\/h2>\n<p>Gigabytes upon gigabytes of an employees&#8217; cat pictures isn&#8217;t what you want clogging up your servers each time they back up their phone or tablet (or <a href=\"http:\/\/www.partyviberadio.com\/forums\/attachments\/jokes-humour\/81159d1324504478-http-status-cat-status-cat-500-internal-server\" target=\"_blank\" rel=\"noopener noreferrer\">perhaps it is<\/a>). And they almost certainly don&#8217;t want texts and IM&#8217;s to their significant other on your backup server either.<\/p>\n<p>To avoid this it&#8217;s a good idea to work with employees on BYOD to make sure that only business related information is backed up. Start with a solid two-way conversation when you set up the BYOD regime to get this issue out in the open and to reinforce how important it is that they follow the procedures you have set up for their own sake as much as the business&#8217;.<\/p>\n<p>On an operational level, there are a few things you can do to ensure you are only backing up company data. Firstly, you should work to separate the employee&#8217;s email on their device with two email accounts and apps &#8211; one personal the other business &#8211; so they know you are only getting their work stuff. You should also create specific folders for storing work documents and designate which apps and app data you will be backing up so that your employee knows to use only these for work purposes.<\/p>\n<p><em>This article was originally published in our Documentation section in January 2013.&nbsp;<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bring Your Own Device (BYOD) was one of those ideas that exploded across IT last year. Although the practice of having staff integrate their personal smartphones and tablets into secure business systems had been around for several years, the fact that more and more companies were embracing BYOD meant that 2012 was the year that &#8230; <a title=\"BYOD and Backups\" class=\"read-more\" href=\"https:\/\/www.backupassist.com\/blog\/byod-and-backups\">Read more <span class=\"screen-reader-text\">BYOD and Backups<\/span><\/a><\/p>\n","protected":false},"author":13,"featured_media":2350,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,760],"tags":[187,93,188,189,190,191],"class_list":["post-2349","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-legacy","tag-android","tag-backup","tag-byod","tag-ios","tag-iphone","tag-tablet"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BYOD Backups | BackupAssist<\/title>\n<meta name=\"description\" content=\"How to make sure an employees&#039; (BYOD) device is backed up while respecting the employees&#039; privacy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/byod-and-backups\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BYOD Backups | BackupAssist\" \/>\n<meta property=\"og:description\" content=\"How to make sure an employees&#039; (BYOD) device is backed up while respecting the employees&#039; privacy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/byod-and-backups\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-22T15:08:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-13T02:15:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/08\/BYOD.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rick Dwyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick Dwyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/byod-and-backups#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/byod-and-backups\"},\"author\":{\"name\":\"Rick Dwyer\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\"},\"headline\":\"BYOD and Backups\",\"datePublished\":\"2013-08-22T15:08:42+00:00\",\"dateModified\":\"2019-11-13T02:15:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/byod-and-backups\"},\"wordCount\":744,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/byod-and-backups#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/08\/BYOD.png\",\"keywords\":[\"android\",\"Backup\",\"byod\",\"iOS\",\"iPhone\",\"tablet\"],\"articleSection\":[\"News\",\"Z-Legacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/byod-and-backups#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/byod-and-backups\",\"url\":\"https:\/\/www.backupassist.com\/blog\/byod-and-backups\",\"name\":\"BYOD Backups | BackupAssist\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/byod-and-backups#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/byod-and-backups#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/08\/BYOD.png\",\"datePublished\":\"2013-08-22T15:08:42+00:00\",\"dateModified\":\"2019-11-13T02:15:35+00:00\",\"description\":\"How to make sure an employees' (BYOD) device is backed up while respecting the employees' privacy.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/byod-and-backups#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/byod-and-backups\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/byod-and-backups#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/08\/BYOD.png\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/08\/BYOD.png\",\"width\":640,\"height\":250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/byod-and-backups#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BYOD and Backups\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\",\"name\":\"Rick Dwyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"caption\":\"Rick Dwyer\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BYOD Backups | BackupAssist","description":"How to make sure an employees' (BYOD) device is backed up while respecting the employees' privacy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/byod-and-backups","og_locale":"en_US","og_type":"article","og_title":"BYOD Backups | BackupAssist","og_description":"How to make sure an employees' (BYOD) device is backed up while respecting the employees' privacy.","og_url":"https:\/\/www.backupassist.com\/blog\/byod-and-backups","og_site_name":"Cyber Resilience Blog","article_published_time":"2013-08-22T15:08:42+00:00","article_modified_time":"2019-11-13T02:15:35+00:00","og_image":[{"width":640,"height":250,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/08\/BYOD.png","type":"image\/png"}],"author":"Rick Dwyer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rick Dwyer","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/byod-and-backups#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/byod-and-backups"},"author":{"name":"Rick Dwyer","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61"},"headline":"BYOD and Backups","datePublished":"2013-08-22T15:08:42+00:00","dateModified":"2019-11-13T02:15:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/byod-and-backups"},"wordCount":744,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/byod-and-backups#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/08\/BYOD.png","keywords":["android","Backup","byod","iOS","iPhone","tablet"],"articleSection":["News","Z-Legacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/byod-and-backups#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/byod-and-backups","url":"https:\/\/www.backupassist.com\/blog\/byod-and-backups","name":"BYOD Backups | BackupAssist","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/byod-and-backups#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/byod-and-backups#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/08\/BYOD.png","datePublished":"2013-08-22T15:08:42+00:00","dateModified":"2019-11-13T02:15:35+00:00","description":"How to make sure an employees' (BYOD) device is backed up while respecting the employees' privacy.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/byod-and-backups#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/byod-and-backups"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/byod-and-backups#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/08\/BYOD.png","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/08\/BYOD.png","width":640,"height":250},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/byod-and-backups#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"BYOD and Backups"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61","name":"Rick Dwyer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","caption":"Rick Dwyer"},"url":"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=2349"}],"version-history":[{"count":2,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2349\/revisions"}],"predecessor-version":[{"id":13670,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2349\/revisions\/13670"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/2350"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=2349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=2349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=2349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}