Camden council BYOD uptake is just 4 percent

Employees overwhelmingly opt for Apple products such as iPhones and iPads

The number of devices on Camden Council's network under its 'Bring Your Own Device' (BYOD) scheme has jumped from 74 in 2012 to 171 in 2013 to 252 today to reach an underwhelming 4 percent of the workforce.

The figures, which were released under the Freedom of Information (FoI) Act, show that the authority's employees overwhelmingly prefer Apple products, with the BYOD scheme operating 132 personal iPhones and 60 iPad tablets.

Rival Samsung lags behind with 45 devices in use at the council. There are also a small number of devices from Motorola, HTC, Sony, Nexus and Psion according to the response to the request, which was submitted by UK think tank Parliament Street.

Camden Council is part way through executing an IT strategy published in 2012 which promised to encourage and support flexible working, led by CIO John Jackson.

The strategy aims to save at least £120 million up to 2018 and make access to the council's IT systems available from any device in any location.

Camden Council has 6,000 staff and serves an area of 22 square kilometres with a population of 217,000.

A Socitm report published at the end of last year predicted that BYOD will grow in local public services despite restrictions presented by central government regulations, such as compliance with the Public Sector Network (PSN).

The report said that many local authorities have already brought in BYOD policies in order to save money plus increase productivity and efficiency, but also because employees are increasingly demanding to use their own (often superior) technology for work.

Socitm particularly pointed to councils in Leeds, Solihull, and Stoke-on-Trent for their pioneering BYOD policies.

"Introducing BYOD policies is a highly effective strategy for councils to simultaneously save money whilst improving mobility of the workforce," said Patrick Sullivan, CEO of the Parliament Street think tank.

Join the CSO newsletter!

Error: Please check your email address.

Tags SocitmMotorolaapplicationssecuritysoftwareParliamentsonypublic sectorMobile & WirelessApplehtc

More about Camden CouncilFreedomHTCMotorolaPsionSamsungSony

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Charlotte Jee

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place