SlideShare a Scribd company logo
1 of 4
Download to read offline
NoticeBored information security awareness BYOD policy
Copyright © 2012 IsecT Ltd. Page 1 of 4
Information security policy
BYOD (Bring Your Own Device)
Policy summary
Employees who prefer to use their personally-owned IT equipment for work purposes must be
explicitly authorized to do so, must secure corporate data to the same extent as on corporate IT
equipment, and must not introduce unacceptable risks (such as malware) onto the corporate
networks by failing to secure their own equipment.
Applicability
This policy forms part of the corporate governance framework. It is particularly relevant to
employees who wish to use PODs (see below) for work purposes. This policy also applies to third
parties acting in a similar capacity to our employees whether they are explicitly bound (e.g. by
contractual terms and conditions) or implicitly bound (e.g. by generally held standards of ethics and
acceptable behavior) to comply with our information security policies.
Policy detail
Background
In contrast to Information and Communications Technology (ICT) devices owned by the
organization, Personally Owned Devices (PODs) are ICT devices1
owned by employees or by third
parties (such as suppliers, consultancies and maintenance contractors). Authorized employees
and third parties may wish to use their PODs for work purposes, for example making and receiving
work phone calls and text messages on their own personal cellphones, using their own tablet
computers to access, read and respond to work emails, or working in a home-office.
Bring Your Own Device (BYOD) is associated with a number of information security risks such as:
 Loss, disclosure or corruption of corporate data on PODs;
 Incidents involving threats to, or compromise of, the corporate ICT infrastructure and other
information assets (e.g. malware infection or hacking);
 Noncompliance with applicable laws, regulations and obligations (e.g. privacy or piracy);
 Intellectual property rights for corporate information created, stored, processed or
communicated on PODs in the course of work for the organization.
Due to management’s concerns about information security risks associated with BYOD,
individuals who wish to opt-in to BYOD must be authorized by management and must
explicitly accept the requirements laid out in this policy beforehand. Management reserves
the right not to authorize individuals, or to withdraw the authorization, if they deem BYOD not to be
appropriate and in the best interests of the organization. The organization will continue to provide
1
PODs are typically laptops, tablet computers, ultra-mobile PCs (UMPCs), desktop PCs, Personal Digital
Assistants (PDAs), palmtops, cellphones, smartphones, digital cameras, digital memo recorders, printers
etc., plus the associated portable storage media such as USB memory sticks, memory cards, portable hard
drives, floppy disks etc.
NoticeBored information security awareness BYOD policy
Copyright © 2012 IsecT Ltd. Page 2 of 4
its choice of fully owned and managed ICT devices as necessary for work purposes, so there is no
compulsion for anyone to opt-in to BYOD if they choose not to participate in the scheme.
Policy axioms (guiding principles)
A. The organization and the owners and users of PODs share responsibilities for information
security.
B. Nothing in this policy affects the organization’s ownership of corporate information, including
all work-related intellectual property created in the course of work on PODs.
Detailed policy requirements
1. Corporate data can only be created, processed, stored and communicated on personal
devices running the organization’s chosen Mobile Device Management (MDM) client
software. Devices not running MDM (including devices that cannot run MDM, those on which
the owners decline to allow IT to install MDM with the rights and privileges it needs to operate
correctly, and those on which MDM is disabled or deleted after installation) may connect to
designated guest networks providing Internet connections, but will not be granted access to
the corporate LAN. They must not be used to create, modify, store or communicate
corporate data.
2. PODs must use appropriate forms of device authentication approved by Information Security,
such as digital certificates created for each specific device. Digital certificates must not be
copied to or transferred between PODs.
3. BYOD users must use appropriate forms of user authentication approved by Information
Security, such as userIDs, passwords and authentication devices.
4. The following classes or types of corporate data are not suitable for BYOD and are not
permitted on PODs:
 Anything classified SECRET or above;
 Other currently unclassified but highly valuable or sensitive corporate information which is
likely to be classified as SECRET or above;
 Large quantities of corporate data (i.e. greater than 1 Gb in aggregate on any one POD or
storage device).
5. The organization has the right to control its information. This includes the right to backup,
retrieve, modify, determine access and/or delete corporate data without reference to the
owner or user of the POD.
6. The organization has the right to seize and forensically examine any POD believed to
contain, or to have contained, corporate data where necessary for investigatory or control
purposes.
7. Suitable antivirus software must be properly installed and running on all PODs.
8. POD users must ensure that valuable corporate data created or modified on PODs are
backed up regularly, preferably by connecting to the corporate network and synchronizing the
data between POD and a network drive, otherwise on removable media stored securely.
9. Any POD used to access, store or process sensitive information must encrypt data
transferred over the network (e.g. using SSL or a VPN) and while stored on the POD or on
separate storage media (e.g. using TrueCrypt), whatever storage technology is used
(e.g. hard disk, solid-state disk, CD/DVD, USB/flash memory stick, floppy disk etc.).
10. Since IT Help/Service Desk does not have the resources or expertise to support all possible
devices and software, PODs used for BYOD will receive limited support on a ‘best endeavors’
basis for business purposes only.
11. While employees have a reasonable expectation of privacy over their personal information on
their own equipment, the organization’s right to control its data and manage PODs may
NoticeBored information security awareness BYOD policy
Copyright © 2012 IsecT Ltd. Page 3 of 4
occasionally result in support personnel unintentionally gaining access to their personal
information. To reduce the possibility of such disclosure, POD users are advised to keep
their personal data separate from business data on the POD in separate directories, clearly
named (e.g. “Private” and “BYOD”).
12. Take care not to infringe other people’s privacy rights, for example do not use PODs to make
audio-visual recordings at work.
Responsibilities
 Information Security Management is responsible for maintaining this policy and advising
generally on information security controls. It is responsible for issuing digital certificates to
authenticate authorized PODs, and for monitoring network security for unauthorized access,
inappropriate network traffic etc. Working in conjunction with other corporate functions, it is
also responsible for running educational activities to raise awareness and understanding of
the obligations identified in this policy.
 IT Department is responsible for managing the security of corporate data and configuring
security on authorized PODs using MDM. IT is also explicitly responsible for ensuring the
security of the MDM software and related procedures in order to minimize the risk of hackers
exploiting MDM to access mobile devices.
 IT Help/Service Desk is responsible for providing limited support for BYOD on PODs on a
‘best endeavors’ basis for work-related issues only. Information security incidents affecting
PODs used for BYOD should be reported promptly to IT Help/Service Desk in the normal
way.
 All relevant employees are responsible for complying with this and other corporate policies
at all times.
 Internal Audit is authorized to assess compliance with this and other corporate policies at
any time.
Related policies, standards, procedures and guidelines
Item Relevance
Information security
policy manual
Defines the overarching set of information security controls reflecting
ISO/IEC 27002, the international standard code of practice for information
security management
Mobile/portable
computing policy
Specifies a number of information security controls applicable to the use
of mobile and portable devices. Although it was
MDM standards and
procedures
Given stringent information security requirements and the diverse nature
of mobile/portable devices, the choice, installation, configuration and use
of Mobile Data Management software is non-trivial. IT’s responsibilities
are fulfilled through MDM technical standards and operating procedures.
Information Asset
Ownership policy
Information Asset Owners are responsible for classifying their assets and
may determine whether BYOD is or is not appropriate for them.
Human Resources
policies,
procedures, code of
conduct etc.
Explain standards of behavior expected of employees, and disciplinary
processes if the rules are broken.
NoticeBored information security awareness BYOD policy
Copyright © 2012 IsecT Ltd. Page 4 of 4
Item Relevance
BYOD guidelines
and briefings
Further security awareness materials are available on this topic.
Contacts
For further information about this policy or general advice on information security, contact the IT
Help/Service Desk. Security standards, procedures, guidelines and other materials supporting and
expanding upon this and other information security policies are available on the intranet Security
Zone. The Information Security Manager can advise on more specific issues.
Important note from IsecT Ltd.
This policy is unlikely to be entirely sufficient or suitable for you without customization.
This is a generic model or template policy incorporating a selection of common controls in this
area derived from our knowledge of good security practices and international standards. It does
not necessarily reflect your organization’s specific requirements. We are not familiar with your
particular circumstances and cannot offer tailored guidance. It is not legal advice. It is meant to
be considered by management as part of the security awareness program, ideally as part of the
regular review and update of your information security policies.
For the Word version of this and over 40 other security policies, see www.NoticeBored.com.

More Related Content

What's hot

Módulo 1 carta desportiva europeia
Módulo 1 carta desportiva europeiaMódulo 1 carta desportiva europeia
Módulo 1 carta desportiva europeiaPedro Alves
 
Conformidade com LGPD - AWS Summit
Conformidade com LGPD - AWS Summit Conformidade com LGPD - AWS Summit
Conformidade com LGPD - AWS Summit Diogo Guedes
 
現場ではこう使った~Office 365 と Azure Functions、Azure Data Factory、Azure SQL Database,...
現場ではこう使った~Office 365 と Azure Functions、Azure Data Factory、Azure SQL Database,...現場ではこう使った~Office 365 と Azure Functions、Azure Data Factory、Azure SQL Database,...
現場ではこう使った~Office 365 と Azure Functions、Azure Data Factory、Azure SQL Database,...Masayuki Ota
 
Workshop Catálogo de serviços - Visão Executiva
Workshop  Catálogo de serviços - Visão ExecutivaWorkshop  Catálogo de serviços - Visão Executiva
Workshop Catálogo de serviços - Visão ExecutivaBlue Hawk - B&IT Management
 
Treinamento - Manipulação de Alimentos - DEMONSTRADORAS.pptx
Treinamento - Manipulação de Alimentos - DEMONSTRADORAS.pptxTreinamento - Manipulação de Alimentos - DEMONSTRADORAS.pptx
Treinamento - Manipulação de Alimentos - DEMONSTRADORAS.pptxBruno José Guimarães
 
Una - Testes de usabilidade - aula 01 e 02
Una - Testes de usabilidade - aula 01 e 02Una - Testes de usabilidade - aula 01 e 02
Una - Testes de usabilidade - aula 01 e 02Marcello Cardoso
 
SharePoint 2013 アーキテクチャの変更点と新機能
SharePoint 2013 アーキテクチャの変更点と新機能SharePoint 2013 アーキテクチャの変更点と新機能
SharePoint 2013 アーキテクチャの変更点と新機能Hirofumi Ota
 
MODELOS DE GERENCIAMENTO DE SERVICOS DE TI
MODELOS DE GERENCIAMENTO DE SERVICOS DE TIMODELOS DE GERENCIAMENTO DE SERVICOS DE TI
MODELOS DE GERENCIAMENTO DE SERVICOS DE TINilo Basílio
 
COBIT 5 Parte 01: 1º Princípio e Cascata de Objetivos
COBIT 5 Parte 01: 1º Princípio e Cascata de ObjetivosCOBIT 5 Parte 01: 1º Princípio e Cascata de Objetivos
COBIT 5 Parte 01: 1º Princípio e Cascata de ObjetivosFernando Palma
 
Módulo 4 salas e pavilhões desportivos
Módulo 4   salas e pavilhões desportivosMódulo 4   salas e pavilhões desportivos
Módulo 4 salas e pavilhões desportivosCatarinaNeivas
 
Manual Illustrator
Manual IllustratorManual Illustrator
Manual IllustratorEADCONSULTOR
 
Boas Práticas na Produção de Alimentos 2009
Boas Práticas na Produção de Alimentos 2009Boas Práticas na Produção de Alimentos 2009
Boas Práticas na Produção de Alimentos 2009SEBRAE MS
 
Ficha avaliação intermédia_0349_05_nov21
Ficha avaliação intermédia_0349_05_nov21Ficha avaliação intermédia_0349_05_nov21
Ficha avaliação intermédia_0349_05_nov21Adelino Aguiar
 
Shakespeare para apaixonados - Allan Percy
Shakespeare para apaixonados - Allan Percy Shakespeare para apaixonados - Allan Percy
Shakespeare para apaixonados - Allan Percy Jana
 
E book: Como acontece uma contaminação cruzada?
E book: Como acontece uma contaminação cruzada?E book: Como acontece uma contaminação cruzada?
E book: Como acontece uma contaminação cruzada?Neoprospecta
 

What's hot (20)

Módulo 1 carta desportiva europeia
Módulo 1 carta desportiva europeiaMódulo 1 carta desportiva europeia
Módulo 1 carta desportiva europeia
 
Balanced Scorecard para TI
Balanced Scorecard para TIBalanced Scorecard para TI
Balanced Scorecard para TI
 
Conformidade com LGPD - AWS Summit
Conformidade com LGPD - AWS Summit Conformidade com LGPD - AWS Summit
Conformidade com LGPD - AWS Summit
 
現場ではこう使った~Office 365 と Azure Functions、Azure Data Factory、Azure SQL Database,...
現場ではこう使った~Office 365 と Azure Functions、Azure Data Factory、Azure SQL Database,...現場ではこう使った~Office 365 と Azure Functions、Azure Data Factory、Azure SQL Database,...
現場ではこう使った~Office 365 と Azure Functions、Azure Data Factory、Azure SQL Database,...
 
Workshop Catálogo de serviços - Visão Executiva
Workshop  Catálogo de serviços - Visão ExecutivaWorkshop  Catálogo de serviços - Visão Executiva
Workshop Catálogo de serviços - Visão Executiva
 
Implantação de um PMO modelo Canvas
Implantação de um PMO modelo CanvasImplantação de um PMO modelo Canvas
Implantação de um PMO modelo Canvas
 
Treinamento - Manipulação de Alimentos - DEMONSTRADORAS.pptx
Treinamento - Manipulação de Alimentos - DEMONSTRADORAS.pptxTreinamento - Manipulação de Alimentos - DEMONSTRADORAS.pptx
Treinamento - Manipulação de Alimentos - DEMONSTRADORAS.pptx
 
A atividade física como ferramenta para a inclusão
A atividade física como ferramenta para a inclusãoA atividade física como ferramenta para a inclusão
A atividade física como ferramenta para a inclusão
 
Una - Testes de usabilidade - aula 01 e 02
Una - Testes de usabilidade - aula 01 e 02Una - Testes de usabilidade - aula 01 e 02
Una - Testes de usabilidade - aula 01 e 02
 
SharePoint 2013 アーキテクチャの変更点と新機能
SharePoint 2013 アーキテクチャの変更点と新機能SharePoint 2013 アーキテクチャの変更点と新機能
SharePoint 2013 アーキテクチャの変更点と新機能
 
MODELOS DE GERENCIAMENTO DE SERVICOS DE TI
MODELOS DE GERENCIAMENTO DE SERVICOS DE TIMODELOS DE GERENCIAMENTO DE SERVICOS DE TI
MODELOS DE GERENCIAMENTO DE SERVICOS DE TI
 
COBIT 5 Parte 01: 1º Princípio e Cascata de Objetivos
COBIT 5 Parte 01: 1º Princípio e Cascata de ObjetivosCOBIT 5 Parte 01: 1º Princípio e Cascata de Objetivos
COBIT 5 Parte 01: 1º Princípio e Cascata de Objetivos
 
Módulo 4 salas e pavilhões desportivos
Módulo 4   salas e pavilhões desportivosMódulo 4   salas e pavilhões desportivos
Módulo 4 salas e pavilhões desportivos
 
Meraki Datasheet MR16
Meraki Datasheet MR16Meraki Datasheet MR16
Meraki Datasheet MR16
 
Manual Illustrator
Manual IllustratorManual Illustrator
Manual Illustrator
 
Boas Práticas na Produção de Alimentos 2009
Boas Práticas na Produção de Alimentos 2009Boas Práticas na Produção de Alimentos 2009
Boas Práticas na Produção de Alimentos 2009
 
Ficha avaliação intermédia_0349_05_nov21
Ficha avaliação intermédia_0349_05_nov21Ficha avaliação intermédia_0349_05_nov21
Ficha avaliação intermédia_0349_05_nov21
 
Shakespeare para apaixonados - Allan Percy
Shakespeare para apaixonados - Allan Percy Shakespeare para apaixonados - Allan Percy
Shakespeare para apaixonados - Allan Percy
 
Esportes no Brasil
Esportes no BrasilEsportes no Brasil
Esportes no Brasil
 
E book: Como acontece uma contaminação cruzada?
E book: Como acontece uma contaminação cruzada?E book: Como acontece uma contaminação cruzada?
E book: Como acontece uma contaminação cruzada?
 

Viewers also liked

Exemplo de política de segurança
Exemplo de política de segurançaExemplo de política de segurança
Exemplo de política de segurançaFernando Palma
 
Classificação da informação
Classificação da informaçãoClassificação da informação
Classificação da informaçãoFernando Palma
 
BIA - Business Impact Analysis
BIA - Business Impact AnalysisBIA - Business Impact Analysis
BIA - Business Impact AnalysisAllan Piter Pressi
 

Viewers also liked (6)

Pesquisa sobre BYOD
Pesquisa sobre BYODPesquisa sobre BYOD
Pesquisa sobre BYOD
 
Exemplo de política de segurança
Exemplo de política de segurançaExemplo de política de segurança
Exemplo de política de segurança
 
Classificação da informação
Classificação da informaçãoClassificação da informação
Classificação da informação
 
BIA - Business Impact Analysis
BIA - Business Impact AnalysisBIA - Business Impact Analysis
BIA - Business Impact Analysis
 
Resumo ISO 27002
Resumo ISO 27002Resumo ISO 27002
Resumo ISO 27002
 
Aula 3 - Política de Segurança da Informação (PSI)
Aula 3 - Política de Segurança da Informação (PSI)Aula 3 - Política de Segurança da Informação (PSI)
Aula 3 - Política de Segurança da Informação (PSI)
 

Similar to NoticeBored BYOD policy

Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidanceGary Chambers
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou MilradLou Milrad
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
University Personal Devices (BYOD) Policy
University Personal Devices (BYOD) PolicyUniversity Personal Devices (BYOD) Policy
University Personal Devices (BYOD) Policykeyashaj
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore Seclore
 

Similar to NoticeBored BYOD policy (20)

Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidance
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Term assignment
Term assignmentTerm assignment
Term assignment
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
University Personal Devices (BYOD) Policy
University Personal Devices (BYOD) PolicyUniversity Personal Devices (BYOD) Policy
University Personal Devices (BYOD) Policy
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Byod
ByodByod
Byod
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore
 

More from Fernando Palma

CRM Gerenciamento Do Relacionamento Com Clientes | Prof. Francisco Alves | C...
CRM Gerenciamento Do Relacionamento Com Clientes | Prof. Francisco Alves |  C...CRM Gerenciamento Do Relacionamento Com Clientes | Prof. Francisco Alves |  C...
CRM Gerenciamento Do Relacionamento Com Clientes | Prof. Francisco Alves | C...Fernando Palma
 
Formação em ciência de dados
Formação em ciência de dadosFormação em ciência de dados
Formação em ciência de dadosFernando Palma
 
Apostila de Introdução ao Arduino
Apostila de Introdução ao ArduinoApostila de Introdução ao Arduino
Apostila de Introdução ao ArduinoFernando Palma
 
Apostila Arduino Basico
Apostila Arduino BasicoApostila Arduino Basico
Apostila Arduino BasicoFernando Palma
 
Cartilha Segurança na Internet - CERT.br
Cartilha Segurança na Internet - CERT.brCartilha Segurança na Internet - CERT.br
Cartilha Segurança na Internet - CERT.brFernando Palma
 
Ebook Apache Server: Guia Introdutório
Ebook Apache Server: Guia IntrodutórioEbook Apache Server: Guia Introdutório
Ebook Apache Server: Guia IntrodutórioFernando Palma
 
Apostila Zend Framework
Apostila Zend FrameworkApostila Zend Framework
Apostila Zend FrameworkFernando Palma
 
Ebook Governança de TI na Prática
Ebook Governança de TI na PráticaEbook Governança de TI na Prática
Ebook Governança de TI na PráticaFernando Palma
 
Simulado ITIL Foundation - Questões Comentadas
Simulado ITIL Foundation - Questões ComentadasSimulado ITIL Foundation - Questões Comentadas
Simulado ITIL Foundation - Questões ComentadasFernando Palma
 
Introdução à Aprendizagem de Máquina
Introdução à Aprendizagem de MáquinaIntrodução à Aprendizagem de Máquina
Introdução à Aprendizagem de MáquinaFernando Palma
 
PDTI - Plano Diretor de Tecnologia da Informação (modelo)
PDTI - Plano Diretor de Tecnologia da Informação (modelo)PDTI - Plano Diretor de Tecnologia da Informação (modelo)
PDTI - Plano Diretor de Tecnologia da Informação (modelo)Fernando Palma
 
Guia Salarial 2017 Robert Half Brasil
Guia Salarial 2017 Robert Half BrasilGuia Salarial 2017 Robert Half Brasil
Guia Salarial 2017 Robert Half BrasilFernando Palma
 
Gerenciamento na nuvem e System Center
Gerenciamento na nuvem e System CenterGerenciamento na nuvem e System Center
Gerenciamento na nuvem e System CenterFernando Palma
 
SAN: Storage Area Network
SAN: Storage Area NetworkSAN: Storage Area Network
SAN: Storage Area NetworkFernando Palma
 
Ebook ITIL Na Prática
Ebook ITIL Na PráticaEbook ITIL Na Prática
Ebook ITIL Na PráticaFernando Palma
 
Exemplo de Plano Estratégico de TI - MEC
Exemplo de Plano Estratégico de TI - MECExemplo de Plano Estratégico de TI - MEC
Exemplo de Plano Estratégico de TI - MECFernando Palma
 
Apostila Tutorial CakePHP
Apostila Tutorial CakePHPApostila Tutorial CakePHP
Apostila Tutorial CakePHPFernando Palma
 

More from Fernando Palma (20)

CRM Gerenciamento Do Relacionamento Com Clientes | Prof. Francisco Alves | C...
CRM Gerenciamento Do Relacionamento Com Clientes | Prof. Francisco Alves |  C...CRM Gerenciamento Do Relacionamento Com Clientes | Prof. Francisco Alves |  C...
CRM Gerenciamento Do Relacionamento Com Clientes | Prof. Francisco Alves | C...
 
Formação em ciência de dados
Formação em ciência de dadosFormação em ciência de dados
Formação em ciência de dados
 
Apostila de Introdução ao Arduino
Apostila de Introdução ao ArduinoApostila de Introdução ao Arduino
Apostila de Introdução ao Arduino
 
Apostila Arduino Basico
Apostila Arduino BasicoApostila Arduino Basico
Apostila Arduino Basico
 
Cartilha Segurança na Internet - CERT.br
Cartilha Segurança na Internet - CERT.brCartilha Segurança na Internet - CERT.br
Cartilha Segurança na Internet - CERT.br
 
Ebook Apache Server: Guia Introdutório
Ebook Apache Server: Guia IntrodutórioEbook Apache Server: Guia Introdutório
Ebook Apache Server: Guia Introdutório
 
Apostila Zend Framework
Apostila Zend FrameworkApostila Zend Framework
Apostila Zend Framework
 
Hacker Ético
Hacker ÉticoHacker Ético
Hacker Ético
 
Ebook Governança de TI na Prática
Ebook Governança de TI na PráticaEbook Governança de TI na Prática
Ebook Governança de TI na Prática
 
Simulado ITIL Foundation - Questões Comentadas
Simulado ITIL Foundation - Questões ComentadasSimulado ITIL Foundation - Questões Comentadas
Simulado ITIL Foundation - Questões Comentadas
 
Introdução à Aprendizagem de Máquina
Introdução à Aprendizagem de MáquinaIntrodução à Aprendizagem de Máquina
Introdução à Aprendizagem de Máquina
 
PDTI - Plano Diretor de Tecnologia da Informação (modelo)
PDTI - Plano Diretor de Tecnologia da Informação (modelo)PDTI - Plano Diretor de Tecnologia da Informação (modelo)
PDTI - Plano Diretor de Tecnologia da Informação (modelo)
 
Guia Salarial 2017 Robert Half Brasil
Guia Salarial 2017 Robert Half BrasilGuia Salarial 2017 Robert Half Brasil
Guia Salarial 2017 Robert Half Brasil
 
Tutorial memcached
Tutorial memcachedTutorial memcached
Tutorial memcached
 
Gerenciamento na nuvem e System Center
Gerenciamento na nuvem e System CenterGerenciamento na nuvem e System Center
Gerenciamento na nuvem e System Center
 
SAN: Storage Area Network
SAN: Storage Area NetworkSAN: Storage Area Network
SAN: Storage Area Network
 
Linguagem ABAP
Linguagem ABAPLinguagem ABAP
Linguagem ABAP
 
Ebook ITIL Na Prática
Ebook ITIL Na PráticaEbook ITIL Na Prática
Ebook ITIL Na Prática
 
Exemplo de Plano Estratégico de TI - MEC
Exemplo de Plano Estratégico de TI - MECExemplo de Plano Estratégico de TI - MEC
Exemplo de Plano Estratégico de TI - MEC
 
Apostila Tutorial CakePHP
Apostila Tutorial CakePHPApostila Tutorial CakePHP
Apostila Tutorial CakePHP
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

NoticeBored BYOD policy

  • 1. NoticeBored information security awareness BYOD policy Copyright © 2012 IsecT Ltd. Page 1 of 4 Information security policy BYOD (Bring Your Own Device) Policy summary Employees who prefer to use their personally-owned IT equipment for work purposes must be explicitly authorized to do so, must secure corporate data to the same extent as on corporate IT equipment, and must not introduce unacceptable risks (such as malware) onto the corporate networks by failing to secure their own equipment. Applicability This policy forms part of the corporate governance framework. It is particularly relevant to employees who wish to use PODs (see below) for work purposes. This policy also applies to third parties acting in a similar capacity to our employees whether they are explicitly bound (e.g. by contractual terms and conditions) or implicitly bound (e.g. by generally held standards of ethics and acceptable behavior) to comply with our information security policies. Policy detail Background In contrast to Information and Communications Technology (ICT) devices owned by the organization, Personally Owned Devices (PODs) are ICT devices1 owned by employees or by third parties (such as suppliers, consultancies and maintenance contractors). Authorized employees and third parties may wish to use their PODs for work purposes, for example making and receiving work phone calls and text messages on their own personal cellphones, using their own tablet computers to access, read and respond to work emails, or working in a home-office. Bring Your Own Device (BYOD) is associated with a number of information security risks such as:  Loss, disclosure or corruption of corporate data on PODs;  Incidents involving threats to, or compromise of, the corporate ICT infrastructure and other information assets (e.g. malware infection or hacking);  Noncompliance with applicable laws, regulations and obligations (e.g. privacy or piracy);  Intellectual property rights for corporate information created, stored, processed or communicated on PODs in the course of work for the organization. Due to management’s concerns about information security risks associated with BYOD, individuals who wish to opt-in to BYOD must be authorized by management and must explicitly accept the requirements laid out in this policy beforehand. Management reserves the right not to authorize individuals, or to withdraw the authorization, if they deem BYOD not to be appropriate and in the best interests of the organization. The organization will continue to provide 1 PODs are typically laptops, tablet computers, ultra-mobile PCs (UMPCs), desktop PCs, Personal Digital Assistants (PDAs), palmtops, cellphones, smartphones, digital cameras, digital memo recorders, printers etc., plus the associated portable storage media such as USB memory sticks, memory cards, portable hard drives, floppy disks etc.
  • 2. NoticeBored information security awareness BYOD policy Copyright © 2012 IsecT Ltd. Page 2 of 4 its choice of fully owned and managed ICT devices as necessary for work purposes, so there is no compulsion for anyone to opt-in to BYOD if they choose not to participate in the scheme. Policy axioms (guiding principles) A. The organization and the owners and users of PODs share responsibilities for information security. B. Nothing in this policy affects the organization’s ownership of corporate information, including all work-related intellectual property created in the course of work on PODs. Detailed policy requirements 1. Corporate data can only be created, processed, stored and communicated on personal devices running the organization’s chosen Mobile Device Management (MDM) client software. Devices not running MDM (including devices that cannot run MDM, those on which the owners decline to allow IT to install MDM with the rights and privileges it needs to operate correctly, and those on which MDM is disabled or deleted after installation) may connect to designated guest networks providing Internet connections, but will not be granted access to the corporate LAN. They must not be used to create, modify, store or communicate corporate data. 2. PODs must use appropriate forms of device authentication approved by Information Security, such as digital certificates created for each specific device. Digital certificates must not be copied to or transferred between PODs. 3. BYOD users must use appropriate forms of user authentication approved by Information Security, such as userIDs, passwords and authentication devices. 4. The following classes or types of corporate data are not suitable for BYOD and are not permitted on PODs:  Anything classified SECRET or above;  Other currently unclassified but highly valuable or sensitive corporate information which is likely to be classified as SECRET or above;  Large quantities of corporate data (i.e. greater than 1 Gb in aggregate on any one POD or storage device). 5. The organization has the right to control its information. This includes the right to backup, retrieve, modify, determine access and/or delete corporate data without reference to the owner or user of the POD. 6. The organization has the right to seize and forensically examine any POD believed to contain, or to have contained, corporate data where necessary for investigatory or control purposes. 7. Suitable antivirus software must be properly installed and running on all PODs. 8. POD users must ensure that valuable corporate data created or modified on PODs are backed up regularly, preferably by connecting to the corporate network and synchronizing the data between POD and a network drive, otherwise on removable media stored securely. 9. Any POD used to access, store or process sensitive information must encrypt data transferred over the network (e.g. using SSL or a VPN) and while stored on the POD or on separate storage media (e.g. using TrueCrypt), whatever storage technology is used (e.g. hard disk, solid-state disk, CD/DVD, USB/flash memory stick, floppy disk etc.). 10. Since IT Help/Service Desk does not have the resources or expertise to support all possible devices and software, PODs used for BYOD will receive limited support on a ‘best endeavors’ basis for business purposes only. 11. While employees have a reasonable expectation of privacy over their personal information on their own equipment, the organization’s right to control its data and manage PODs may
  • 3. NoticeBored information security awareness BYOD policy Copyright © 2012 IsecT Ltd. Page 3 of 4 occasionally result in support personnel unintentionally gaining access to their personal information. To reduce the possibility of such disclosure, POD users are advised to keep their personal data separate from business data on the POD in separate directories, clearly named (e.g. “Private” and “BYOD”). 12. Take care not to infringe other people’s privacy rights, for example do not use PODs to make audio-visual recordings at work. Responsibilities  Information Security Management is responsible for maintaining this policy and advising generally on information security controls. It is responsible for issuing digital certificates to authenticate authorized PODs, and for monitoring network security for unauthorized access, inappropriate network traffic etc. Working in conjunction with other corporate functions, it is also responsible for running educational activities to raise awareness and understanding of the obligations identified in this policy.  IT Department is responsible for managing the security of corporate data and configuring security on authorized PODs using MDM. IT is also explicitly responsible for ensuring the security of the MDM software and related procedures in order to minimize the risk of hackers exploiting MDM to access mobile devices.  IT Help/Service Desk is responsible for providing limited support for BYOD on PODs on a ‘best endeavors’ basis for work-related issues only. Information security incidents affecting PODs used for BYOD should be reported promptly to IT Help/Service Desk in the normal way.  All relevant employees are responsible for complying with this and other corporate policies at all times.  Internal Audit is authorized to assess compliance with this and other corporate policies at any time. Related policies, standards, procedures and guidelines Item Relevance Information security policy manual Defines the overarching set of information security controls reflecting ISO/IEC 27002, the international standard code of practice for information security management Mobile/portable computing policy Specifies a number of information security controls applicable to the use of mobile and portable devices. Although it was MDM standards and procedures Given stringent information security requirements and the diverse nature of mobile/portable devices, the choice, installation, configuration and use of Mobile Data Management software is non-trivial. IT’s responsibilities are fulfilled through MDM technical standards and operating procedures. Information Asset Ownership policy Information Asset Owners are responsible for classifying their assets and may determine whether BYOD is or is not appropriate for them. Human Resources policies, procedures, code of conduct etc. Explain standards of behavior expected of employees, and disciplinary processes if the rules are broken.
  • 4. NoticeBored information security awareness BYOD policy Copyright © 2012 IsecT Ltd. Page 4 of 4 Item Relevance BYOD guidelines and briefings Further security awareness materials are available on this topic. Contacts For further information about this policy or general advice on information security, contact the IT Help/Service Desk. Security standards, procedures, guidelines and other materials supporting and expanding upon this and other information security policies are available on the intranet Security Zone. The Information Security Manager can advise on more specific issues. Important note from IsecT Ltd. This policy is unlikely to be entirely sufficient or suitable for you without customization. This is a generic model or template policy incorporating a selection of common controls in this area derived from our knowledge of good security practices and international standards. It does not necessarily reflect your organization’s specific requirements. We are not familiar with your particular circumstances and cannot offer tailored guidance. It is not legal advice. It is meant to be considered by management as part of the security awareness program, ideally as part of the regular review and update of your information security policies. For the Word version of this and over 40 other security policies, see www.NoticeBored.com.