Use these requirements to form your organisational policy for byod, which you should document to clarify organisation and employee. All relevant university policies still apply to staff using byod. Power up your legal research with modern workflow tools, ai conceptual search and premium content sets that leverage lexologys archive of. Any member of staff found to have deliberately breached the act may be. This document outlines a set of practices and requirements for the safe use of mobile devices and applications. This device policy applies, but is not limited to all devices and accompanying. Document process for employee to safeguard personal data if when. Therefore, staff must follow the guidance in this document when considering using byod to process personal data. This mobile device byod policy template is meant to be used only as a guide for creating your own mobile device byod policy based on the unique needs of your company. Byod acceptable use policy purpose the purpose of this policy is to define standards, procedures, and restrictions for end users who are connecting a personallyowned device to company names organization network for business purposes. Federal cio council byod resource toolkit clearwater compliance. Other it, is, and ict staff under the direction of the title, example. Cio are responsible for following the procedures and policies within information technology and.
Devices that have taken part in the byod pilot will be covered retrospectively by this policy by completing and returning the bring your own device application form and. How to write a good security policy for byod or company. It is important for you to write up a policy that is going to be easy to understand, and the byod policy sample can help with that. Therefore, staff must follow the guidance in this document when. A breach of the data protection act can lead to the university being fined up to. Bring your own device policy south georgia state college. Byod acceptable use policy p a g e 5 of 12 devices below these specifications will not comply with our policies and therefore will not be supported. Enforcing security policies at the device, application or document level demands you use a. Definitions byo bring your own refers to users using their own device or systems which are not owned. How to write a good security policy for byod or companyowned mobile devices. Page includes various formats of byod policy sample for pdf, word and excel. When you look at a sample policy, you will be able to figure out what you need to say in order to help your employees understand what you are getting at. Chief information officer as part of a broader analysis of byod. Below is a sample byod policy template that organizations can adapt to suit their needs include additional details where it makes sense.
Byod policy sample pdf by madison evans posted on november 2, 2019. Find out the best way to keep smartphones and tablets safe from hackers and the. Chief information officer as part of a broader analysis of byod policies for organizations. Require enrollment in the corporate mobile security management suite. While the document specifically addresses federal agencies, it provides a highresolution view of byod policies including the conceptual framework and alternative models for implementation. The digital government strategy the strategy pdfhtml, issued by. Some companies may need to add sections that apply to different user groups with varying job requirements. A sampling of byod user policies here are several actual byod policies that you can use as the framework for your own policy. While the case studies and example policies that the byod working group has. Failure to comply with this byod policy may, at the full discretion of sgsc, result in the suspension of.
1250 782 348 33 706 697 382 847 315 1153 1380 915 49 287 777 1200 897 23 774 1008 755 195 947 394 1213 487 1255 102 284 304 205 191 633 1074 1039 374 207