Bring Your Own Device Policy
Bring Your Own Device Policy
OWN DEVICE
(BYOD) POLICY
1
© Distributed by Resilify.io under a Creative Commons Share Alike License.
Document Information
Distribution
Held Format Location Comments
By
User Digital / Physical
Status
X Status Approved By Date
X Working DD/MM/YYYY
Draft
Provisional Approval
Publication
Classification
Please refer to ISMS 02 Information Handling & Classification Procedure
X Confidential
Restricted
Unclassified
Relevance to Standard
License
2
© Distributed by Resilify.io under a Creative Commons Share Alike License.
3
© Distributed by Resilify.io under a Creative Commons Share Alike License.
Contents
Document Information_____________________________________________________________________________2
Mobile Device Policy________________________________________________________________________________2
Contents_______________________________________________________________________________________________3
Bring Your Own Device (BYOD) Policy__________________________________________________________4
1.0 Overview______________________________________________________________________________________4
2.0 Policy______________________________________________________________________________________________4
2.1 Registering Mobile Devices (and (BYOD)________________________________________________________________4
2.2 Securing the Device________________________________________________________________________________________4
2.3 Physical Security___________________________________________________________________________________________5
2.4 Software & App Installation_______________________________________________________________________________5
2.5 Network Connections______________________________________________________________________________________6
2.6 Malware Protection & Security Controls_________________________________________________________________6
2.7 Remote Administration____________________________________________________________________________________6
2.8 Backup______________________________________________________________________________________________________7
2.9 iCloud & Other Device Accounts__________________________________________________________________________7
2.10 Removing Organisational Data & Apps_________________________________________________________________7
4
© Distributed by Resilify.io under a Creative Commons Share Alike License.
Bring Your Own Device (BYOD) Policy
1.0 Overview
The organization permits use of personal devices to access, store or process its
information assets on the following basis only.
2.0 Policy
All devices shall be registered with the IT Department before being used to access
the organisation’s information assets.
The following information may be recorded and retained by the IT Department for
support and security purposes:
5
© Distributed by Resilify.io under a Creative Commons Share Alike License.
The user may be required to install security apps that permit remote
erasure or control of the device. The organization accepts no responsibility
for any loss or damaged caused by such apps and the user installs and
uses the apps at their own risk.
Where devices have a memory card capability, the user will ensure that
the memory card is encrypted and so far, as possible, ensure
organizational data is NOT stored on removable media.
When using a mobile device, the user should always consider the
environment they are working in and be aware of opportunities to be
overlooked or overheard.
Mobile devices should not be left unattended in public at any time, and the
loss or theft of devices will be reported to the IT Department immediately.
The user will seek advice from the IT Department before installing any
apps where they are not confident in the above.
Any security notification or warning that may affect the organisation’s apps
or information assets will be reported to the IT Department immediately.
All software and apps installed on a mobile device shall be kept up to date
by the user to avoid any security vulnerabilities.
6
© Distributed by Resilify.io under a Creative Commons Share Alike License.
2.5 Network Connections
Users will exercise caution when connecting mobile devices to public WIFI
hotspots, or other connections, and this should be avoided as far as
possible.
Security alerts and warnings should never be ignored, and where one
occurs the user should cease their activity immediately and report it to the
IT Department.
Any applied Malware protection and any other security software should not
be disabled or removed from the device.
If the user believes that the software is not functioning correctly, it should
be reported to the IT Department at the earliest opportunity.
7
© Distributed by Resilify.io under a Creative Commons Share Alike License.
2.8 Backup
Data and/or the mobile device settings will be backed up subject to the
data backup policy.
The user agrees to assist the IT Department where these accounts are
required and where these passwords must be entered to administer the
device.
The IT Department will NEVER ask for your password or account details to
be disclosed to them directly, however you will be required to enter the
details into your device in a reasonable time.
The user agrees NOT to sell or otherwise dispose of their personal device
before the organisation’s information assets have been removed and
securely erased by the IT department.
The organisation reserves the right to audit and monitor devices in line with
the policy above, and the user will make the device available within a
reasonable time frame.
8
© Distributed by Resilify.io under a Creative Commons Share Alike License.
3.2 Ownership
9
© Distributed by Resilify.io under a Creative Commons Share Alike License.