While the document specifically addresses federal agencies, it provides a highresolution view of byod policies including the conceptual framework and alternative models for implementation. Bring your own device policy and rules of behavior. I will use my device during school activities at the direction of the teacher. Apr 10, 2019 a byod policy can be a tremendous benefit, but it will only be successful if it clearly establishes the rights and responsibilities of both the company and the employees. Byod policy allowing staff to use their favorite devices while cutting costs. I agree that i will abide by mkdss byod policy and that. This policy is for all staff using personally owned devices such as smart phones, tablet computers, laptops, netbooks and similar equipment, to store, access, carry, transmit, receive or use university information or data, whether on an occasional or regular basis.
Policy and guidelines for governmentprovided mobile device usage. Responding to inappropriate use of computing and network resources. Bring your own device policy 1 introduction the university of strathclyde recognises the benefits that can be achieved by allowing staff to use their own electronic devices when working, whether that is at home, on campus or while travelling. Chief information officer as part of a broader analysis of byod policies for organizations. Bring your own device byod policy bring your own device. What is byod bring your own device byod refers to technology models where students bring a personally owned device to school for the purpose of learning. Nov 02, 2019 pdf development of bring your own device risk management from byod policy sample pdf, source. With an employee using their own personal device there very well could be a temptation to use it for personal uses. Bring your own device policy south georgia state college. Individual liable user policy considerations 6 policy should be clear on whether or not you will wipe whole device and conditions under which you would do so e. Student handbook international students appendix bring your.
Use of personally owned devices for university work 3 mobile phones, smart phones and tablet devices. Sensitive business data includes all documents or data. Byod recognises that there are inherent risks in using personal devices to hold personal data. When employees use their own devices, chances are those devices are loaded with a slew of timewasting apps, games, etc. Bring your own device byod policies objective this policy sets the guidelines. Bring your own device byod is a current industry trend that allows employees to use their personal devices such as laptops, tablets, mobile phones and other devices, to connect to the internal network.
It began with a trickle and now, for many organisations, its a flood. A personally owned device is any technology device brought into the school and owned by a student or the students family, staff or guests alberta education, 2012. Byod policy sample pdf by madison evans posted on november 2, 2019. Connectivity to omes is servers including email, calendar and other services as deemed. Here is a sample byod policy template that organizations can adapt to suit. Byod significantly impacts the traditional security model of protecting the perimeter of the it organization by blurring the definition of that perimeter, both in terms of physical location and in asset ownership. Participant organizations will establish and document local policies consistent. Free download of byod policy sample 1 document available in pdf format. Download free printable byod policy template samples in pdf, word and excel formats. The use of mobile devices has become commonplace for both our personal and professional lives. Users guide to telework and bring your own device byod. Businesses understand that employees often utilize their personal mobile devices in the workplace.
View homework help bring your own device byod policies. In this article, james sherer, cipm, cippus, melinda mclellan and emily fedeles provide a list of relevant questions and issues to consider when creating or revamping a corporate byod program, including some finer points that may enhance even mature, wellfunctioning byod practices. Another drawback to a byod policy is the potential loss in productivity. The purpose of this document is only to provide a sample guideline and a framework for generating a mobile device policy for your clients use. Have a clear byod policy and keep it up to date an extensive analysis of the byod policy and strict mobile device and application management are paramount to support the adequate and reasonable protection of company data. Bring your own device byod policy state library of nsw. Bring your own device policy sample free legal documents. Through the help of a byod policy sample, you will be able to write up something that will allow your employees to know what is required of them and what you want to see happen in the workplace. That rising tide of employeeowned smartphones, tablets and laptop computers threatens to drown already weigheddown it leaders around the country, but all is not lost. If your device is second hand, restore to factory settings before using it for the first time.
Employees may use their mobile device to access the following companyowned resources. Chief information officer as part of a broader analysis of byod. The byod working group assembled sample policies in use at agencies to help inform it leaders who are considering developing a byod program for their agencies. The byod student agreement must be signed by both the student and by a parentcaregiver. You can use a byod policy sample to help you create the kind of policy that will keep everything orderly and help everyone to be in the loop. Many organizations limit the types of byod devices that can be used and which resources they can use, such as permitting.
Below is a sample byod policy template that organizations can adapt to suit their needs include additional details where it makes sense. Sample data security policies 3 data security policy. Bring your own device byod is a business policy of employees bringing personally owned mobile devices to their place of work and using those devices to access privileged company resources such as email, file servers and databases as well as their personal applications and data. This publication provides recommendations for securing byod devices used for telework and remote access, as well as those directly attached to the enterprises own networks. S upport e xpectations omes is will offer the following limited support for the personal smart device. Bring your own device policy university of strathclyde. Use of personally owned devices for university work. A breach of the data protection act can lead to the university being fined up to. Byod policy template 1 free templates in pdf, word, excel. Bring your own device byod programs call for three critical components. This mobile device byod policy template is meant to be used only as a guide for creating your own mobile device byod policy based on the unique needs of your company.
The number of external devices that can now connect to a company that implements a byod policy. Johnson, 2011 successfully implementing a mobile device policy is critical to the success of a byod initiative, this covers the entire. Data leakage prevention data in motion using this policy this example policy is intended to act as a guideline for organizations looking to implement or update their dlp controls. You must read, understand and formally accept this policy by signing and returning the bring your own device application form and acceptable use statement found in. It is for this reason we have established our byod and acceptable use policy. Students breaching the byod policy if a student breaches the byod policy or if a member of staff feels that they are likely to have breached this policy then the students device will be confiscated and held in the school office. Policy for deed information, ommunication and technology ict resources, as well as, uninyong primarys acceptable use agreement, internet and network usage policy and social media policy. This device policy applies, but is not limited to all devices and accompanying. Micro, 2012 this model complicates policy and data control in organizations and increases the importance of having a strong policy. Rationale the focus of the byod program at buninyong primary school is to provide tools and resources to the 21st century learner. Byod acceptable use policy p a g e 6 of 12 device owners with devices that are not in line with our standard approved device lists may not be allowed to have their devices added to the servers. With facebook, twitter, itunes, personal email, and an absurdly high number of gaming applications at their fingertips, a loss in productivity is a reality.
It is important for you to write up a policy that is going to be easy to understand, and the byod policy sample can help with that. Configure your device to enable you to remotewipe it should it become lost. Oct 03, 2012 a bring your own device byod policy is absolutely essential if youre going to allow employees to use their own gear. The students parent will be contacted and they will need to come into school to collect the device. Byod acceptable use policy purpose the purpose of this policy is to define standards, procedures, and restrictions for end users who are connecting a personallyowned device to company names organization network for business purposes. Byod policy template 1 free templates in pdf, word. This document describes acceptable use pertaining to using your own device whilst accessing university systems. Failure to comply with this byod policy may, at the full discretion of sgsc, result in the suspension of. In fact, with a little planning, the flow of byo devices while not diverted can in fact be harnessed for the betterment of employer and employees. Employees need to know where they stand in regards to usage rules and guidelines. Therefore, staff must follow the guidance in this document when considering using byod to process personal data. Bring your own device byod and acceptable use policy security of information, and the tools that create, store and distribute that information are vital to the longterm health of our organization. The term for such devices is byod bring your own device.
1518 1208 1532 1557 1577 78 1466 18 185 1081 161 1319 531 274 576 164 145 1288 851 616 909 1153 710 1262 286 1328 529 313 692 203 1018 845 18 1574 145 740 1299 306 1118 764 1426 1409 534 480 22 827