Bring Your Own Device (BYOD): Legal Protection of The Employee in Malaysia

  • Muammar Kamil Abd. Mohsin Harun M. Hashim Law Centre, Level 2, Ahmad Ibrahim Kulliyyah of Laws, International Islamic University Malaysia, PO Box 10, 50728, Kuala Lumpur, Malaysia.
  • Zuraini Ab Hamid Department of Legal Practice, Ahmad Ibrahim Kulliyyah of Laws, International Islamic University Malaysia, P. O. Box 10, 50728, Kuala Lumpur, Malaysia.
Keywords: BYOD, WFH, Employee, Internet


Due to the portability of the devices and the broad coverage of the Internet access provided by the telecommunication carrier, the usage of mobile devices is not only limited to personal matters but has also been used to perform work-related tasks. The practice has led to the emergence of Bring Your Own Device ("BYOD") practice. BYOD has become popular because the companies can extend their confidence and trust in the employee, leading to an efficient team of human resources. The arrival of the COVID-19 pandemic has driven millions of employees to change their working practice from being physically in the office to adapting Work from Home ("WFH") practice. Unfortunately, BYOD has shown its bias toward the employees when there is a violation of employees' rights on working hours and privacy issues. Employees believe that the current legal system in Malaysia is insufficient to safeguard them against unfair BYOD practices. This study investigates the BYOD practice of using employees' personal mobile devices for work purposes and the worry regarding the employee's data stored on the devices when used for work and personal purposes. This report also suggests introducing Malaysian binding guidelines or policies to include a device definition and standardise BYOD practice in the workplace. This strategy is critical for protecting both employers and employees when introducing a BYOD policy at work.


Download data is not yet available.


Chountalas P. & Karagiorgos Α. (2015). Bring Your Own Device philosophy from the user's perspective: An empirical investigation. Proceedings of the 2nd HOBA International Conference. Patras, March 7-8, 1-12.

Brynjolfsson, E., Horton, J. J., Ozimek, A., Rock, D., Sharma, G., Tuye, H.-Y., & Upwork, A. O. (2020). COVID-19 and Remote Work: An Early Look at US Data. National Bureau of Economic Research.

B.Suresh Ram. (2019, November 15). Survey: Malaysian employees are overworked, sleep deprived, unhealthy. New Straits Times. Retrieved from

Franklin Onyechere Ugochukwu, & Mohamed Ismail Z. (2015). The Future of BYOD in Organisations and Higher Institution of Learning. International Journal of Information Systems and Engineering, 3(1), 110–28.

Harris, A., & Cooper, M. (2019). Mobile Phones: Impacts, Challenges, and Predictions. Human Behavior and Emerging Technologies, 1(1), 15–17.

Fara Jamal, Mohd. Taufik, Azizol Abdullah, & Zurina Mohd. Hanapi (2020). A Systematic Review of Bring Your Own Device (BYOD) Authentication Technique. Journal of Physics: Conference Series, 1529, 042071.

Madhavi Dhingra. (2016). Legal Issues in Secure Implementation of Bring Your Own Device (BYOD). Procedia Computer Science, 78 (January), 179–84.

Merriam-Webster. (n.d.). Device. In dictionary. Retrieved February 28, 2022 from

Mordor Intelligence. (2022). BYOD Market | 2022 - 27 | Industry Share, Size, Growth. Mordor Intelligence. Retrieved from

National Cyber Security Agency (NACSA). (2020). Malaysia Cyber Security Strategy 2020-2024.

Norhazilah Mahat & Nor’ashikin Ali. (2018). Empowering Employees through BYOD: Benefits and Challenges in Malaysian Public Sector. International Journal of Engineering & Technology, 7(4.35), 643-649.

Oxford University Press. (n.d). BYOD. In Retrieved February 28, 2022 from

Rahat Afreen. (2014). Bring Your Own Device (BYOD) in Higher Education: Opportunities and Challenges Elliptic Curve Cryptography for Embedded Systems View Project. International Journal of Emerging Trends & Technology in Computer Science, 3(1), 233-236.

Rice, A. L. (2016). Best Practices for Secure BYOD. Uoregon. Retrieved from

Roman, J. (2012, January 11). BYOD: Get Ahead of the Risk. Intel CISO: Policy, Accountability Created Positive Results. Bank Info Security. Retrieved from

Rose, C. (2013). BYOD: An Examination Of Bring Your Own Device In Business. Review of Business Information Systems (RBIS), 17(2), 65–70.

Schneider, J. (2016). BYOD: Employment and Privacy Law Issues. Lexology. Retrieved from

Schulze, H. (2021). BYOD Security Report. Cybersecurity Insiders. Retrieved from

Skrine. (2020, November 23). Protection of Employee's Personal Data in Malaysia - General Data Protection Regulation ("GDPR") and Personal Data Protection Act 2010 ("PDPA"). Skrine. Retrieved from’s-personal-data-in-malaysia

Statista. (2022). Smartphone users 2026. Statista. Retrieved from

Veljkovic, I., Mitrovic, Z., Whyte, G., & Thompson, K. (2014). The 1st Namibia Customer Service Awards & Conference. Windhoek, Namibia.

Weeger, A., Wang, X., & Gewald, H. (2016). IT consumerization: BYOD-program acceptance and its impact on employer attractiveness. Journal of Computer Information Systems, 56(1), 1-10.

Zennaro, M. (2014). Introduction to the Internet of Things. The AbdusSalam International Centre for Theoretical Physics. Trieste, Italy.

How to Cite
Abd. Mohsin, M. K. and Ab Hamid, Z. (2022) “Bring Your Own Device (BYOD): Legal Protection of The Employee in Malaysia”, Malaysian Journal of Social Sciences and Humanities (MJSSH), 7(7), p. e001609. doi: 10.47405/mjssh.v7i7.1609.