SlideShare a Scribd company logo
1 of 2
Raymond Roth
Bring Your Own Device (BYOD) Policy
Introduction Thissecuritypolicyprovidesthe rules to abide by if you so choose to bring
your own device to our business environment.
Effective Date The controls appendedwithinthisdocument are to take affect September
19, 2012.
Audience Thispolicyappliestoall personswho choose to take part in our company’s
bring your device to work pilot program. This includes all persons who
choose to connectto our company’snetwork, be that of employees of the
company or outside contractors.
Background Thispolicyisbeingsetforthbecause personal devicesbroughtfromoutside
sources are not as secure as devices used specifically for our private work
environment.Please adhere to the controls within this document to keep
your device and networking activities secure.
Definitions The definitions that follow have been added to help the reader of this
document understand abbreviations set forth in the policy.
 HTTP – Hypertext Transfer Protocol
 VM– Virtual Machine
 VPN – Virtual Private Network
Bring Your Own
Device (BYOD)
Policy
 Before anyuseris able touse theirowndevice,theyshall signawritten
acceptance of understanding to the terms set forth in this document.
 Before being permitted to use a personal device all users must sit
through a class room session, informing the user of how to secure a
personal device and the dangers of not securing a device.
 Users whom bring their own device to work shall have the company’s
best interest in mind when using personal devices.
 When using a personal device one shall connect to a predefined IP
address created for secure networking through a remote desktop
connection or VMsoftware.
 All usersshall disable VPN programsortunnelingsoftware thathidesIP
address, internet activities and trends while using HTTP.
 All persons shall either upload all work related materials to our team
collaboration site or to a share-drive that resides on the company’s
private network.
 There are to be no inappropriate materials viewed with your device
while on the company’s network.
 All private devices shall be checked in and checked out with the front
desk each and every day, until further notified.
 There is to be no illegal activities permitted from your device while
connected to the company’s network.
 If your device isdamaged on company grounds, the company holds no
responsibility for repairing said device.
 If during work hours you are onsite with a private device and that
device hasbeen compromised,yourdevicewillnolongerbe permitted
to be brought to work under this pilot policy.
Disciplinary Actions Anyusersthat do not adhere to the definitions set forth within this policy
for secure device use will be punished. Be it removal of authorization to
partake inthe BYOD privilege,suspension or expulsion from the company.
References
All work done on this assignment is solely the work of my own.

More Related Content

What's hot

Analyst sample Presentation
Analyst sample PresentationAnalyst sample Presentation
Analyst sample PresentationRichard Smiraldi
 
Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security PoliciesAamir Sohail
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an AntivirusQuick Heal Technologies Ltd.
 
Cyber Threats Presentation Sample
Cyber Threats Presentation SampleCyber Threats Presentation Sample
Cyber Threats Presentation SampleRichard Smiraldi
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
Avast Antivirus
Avast AntivirusAvast Antivirus
Avast AntivirusMizamk
 
Kisi Logistics: How to Install and Setup Keyless Access in Your Office
Kisi Logistics: How to Install and Setup Keyless Access in Your OfficeKisi Logistics: How to Install and Setup Keyless Access in Your Office
Kisi Logistics: How to Install and Setup Keyless Access in Your OfficeKISI Inc
 
Watch Guard Firebox T10 Infographic
Watch Guard Firebox T10 InfographicWatch Guard Firebox T10 Infographic
Watch Guard Firebox T10 InfographicRandolph Novino
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersPeter Hagen
 
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Mark Silverberg
 

What's hot (12)

Analyst sample Presentation
Analyst sample PresentationAnalyst sample Presentation
Analyst sample Presentation
 
Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security Policies
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
 
Cyber Threats Presentation Sample
Cyber Threats Presentation SampleCyber Threats Presentation Sample
Cyber Threats Presentation Sample
 
Cyber threats sample
Cyber threats sampleCyber threats sample
Cyber threats sample
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Avast Antivirus
Avast AntivirusAvast Antivirus
Avast Antivirus
 
Kisi Logistics: How to Install and Setup Keyless Access in Your Office
Kisi Logistics: How to Install and Setup Keyless Access in Your OfficeKisi Logistics: How to Install and Setup Keyless Access in Your Office
Kisi Logistics: How to Install and Setup Keyless Access in Your Office
 
Watch Guard Firebox T10 Infographic
Watch Guard Firebox T10 InfographicWatch Guard Firebox T10 Infographic
Watch Guard Firebox T10 Infographic
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workers
 
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
 

Viewers also liked

BYOD school policy
BYOD school policyBYOD school policy
BYOD school policyCCSD
 
88060433 international-money-market-instruments
88060433 international-money-market-instruments88060433 international-money-market-instruments
88060433 international-money-market-instrumentsGodrej & Boyce
 
Boletín CIAM-Tambo
Boletín CIAM-TamboBoletín CIAM-Tambo
Boletín CIAM-TamboMiluska Qch
 
Expenses - Capital or Revenue?
Expenses - Capital or Revenue?Expenses - Capital or Revenue?
Expenses - Capital or Revenue?Investment Banking
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
Como estructurar organizaciones adaptables y sensibles
Como estructurar organizaciones adaptables y sensiblesComo estructurar organizaciones adaptables y sensibles
Como estructurar organizaciones adaptables y sensiblesDavis Ulises Sanchez Tafur
 
Apresentação sv slideshare
Apresentação sv slideshareApresentação sv slideshare
Apresentação sv slideshareJoão Soeiro
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
IATBD Workshop JTELSS13
IATBD Workshop JTELSS13IATBD Workshop JTELSS13
IATBD Workshop JTELSS13Efi Nisiforou
 
AWS Summit 2013 | Auckland - Scalable Media Processing on the Cloud
AWS Summit 2013 | Auckland - Scalable Media Processing on the CloudAWS Summit 2013 | Auckland - Scalable Media Processing on the Cloud
AWS Summit 2013 | Auckland - Scalable Media Processing on the CloudAmazon Web Services
 

Viewers also liked (13)

BYOD school policy
BYOD school policyBYOD school policy
BYOD school policy
 
88060433 international-money-market-instruments
88060433 international-money-market-instruments88060433 international-money-market-instruments
88060433 international-money-market-instruments
 
Boletín CIAM-Tambo
Boletín CIAM-TamboBoletín CIAM-Tambo
Boletín CIAM-Tambo
 
Expenses - Capital or Revenue?
Expenses - Capital or Revenue?Expenses - Capital or Revenue?
Expenses - Capital or Revenue?
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Como estructurar organizaciones adaptables y sensibles
Como estructurar organizaciones adaptables y sensiblesComo estructurar organizaciones adaptables y sensibles
Como estructurar organizaciones adaptables y sensibles
 
Apresentação sv slideshare
Apresentação sv slideshareApresentação sv slideshare
Apresentação sv slideshare
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
ScifoBYODSample
ScifoBYODSampleScifoBYODSample
ScifoBYODSample
 
Festejandoa
 Festejandoa Festejandoa
Festejandoa
 
Dia del libro 20.13
Dia del libro 20.13Dia del libro 20.13
Dia del libro 20.13
 
IATBD Workshop JTELSS13
IATBD Workshop JTELSS13IATBD Workshop JTELSS13
IATBD Workshop JTELSS13
 
AWS Summit 2013 | Auckland - Scalable Media Processing on the Cloud
AWS Summit 2013 | Auckland - Scalable Media Processing on the CloudAWS Summit 2013 | Auckland - Scalable Media Processing on the Cloud
AWS Summit 2013 | Auckland - Scalable Media Processing on the Cloud
 

Similar to BYOD

Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 
Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020EmmanuelGazelle
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicAlleneMcclendon878
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access policARIV4
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxtodd331
 
Exemplo de política BYOD
Exemplo de política BYODExemplo de política BYOD
Exemplo de política BYODFernando Palma
 
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressedA MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressedMotasem Al Amour
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solutionHexnode
 
CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docxCSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docxmydrynan
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solutionHexnode
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device J
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 
Block Armour Case Study
Block Armour Case StudyBlock Armour Case Study
Block Armour Case StudyBlock Armour
 
Keane Organization
Keane OrganizationKeane Organization
Keane Organizationguest3f05ef
 

Similar to BYOD (20)

Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access Polic
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
 
Exemplo de política BYOD
Exemplo de política BYODExemplo de política BYOD
Exemplo de política BYOD
 
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressedA MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
License
LicenseLicense
License
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solution
 
License
LicenseLicense
License
 
CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docxCSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solution
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
IT Policy
IT Policy IT Policy
IT Policy
 
Block Armour Case Study
Block Armour Case StudyBlock Armour Case Study
Block Armour Case Study
 
Keane Organization
Keane OrganizationKeane Organization
Keane Organization
 

BYOD

  • 1. Raymond Roth Bring Your Own Device (BYOD) Policy Introduction Thissecuritypolicyprovidesthe rules to abide by if you so choose to bring your own device to our business environment. Effective Date The controls appendedwithinthisdocument are to take affect September 19, 2012. Audience Thispolicyappliestoall personswho choose to take part in our company’s bring your device to work pilot program. This includes all persons who choose to connectto our company’snetwork, be that of employees of the company or outside contractors. Background Thispolicyisbeingsetforthbecause personal devicesbroughtfromoutside sources are not as secure as devices used specifically for our private work environment.Please adhere to the controls within this document to keep your device and networking activities secure. Definitions The definitions that follow have been added to help the reader of this document understand abbreviations set forth in the policy.  HTTP – Hypertext Transfer Protocol  VM– Virtual Machine  VPN – Virtual Private Network
  • 2. Bring Your Own Device (BYOD) Policy  Before anyuseris able touse theirowndevice,theyshall signawritten acceptance of understanding to the terms set forth in this document.  Before being permitted to use a personal device all users must sit through a class room session, informing the user of how to secure a personal device and the dangers of not securing a device.  Users whom bring their own device to work shall have the company’s best interest in mind when using personal devices.  When using a personal device one shall connect to a predefined IP address created for secure networking through a remote desktop connection or VMsoftware.  All usersshall disable VPN programsortunnelingsoftware thathidesIP address, internet activities and trends while using HTTP.  All persons shall either upload all work related materials to our team collaboration site or to a share-drive that resides on the company’s private network.  There are to be no inappropriate materials viewed with your device while on the company’s network.  All private devices shall be checked in and checked out with the front desk each and every day, until further notified.  There is to be no illegal activities permitted from your device while connected to the company’s network.  If your device isdamaged on company grounds, the company holds no responsibility for repairing said device.  If during work hours you are onsite with a private device and that device hasbeen compromised,yourdevicewillnolongerbe permitted to be brought to work under this pilot policy. Disciplinary Actions Anyusersthat do not adhere to the definitions set forth within this policy for secure device use will be punished. Be it removal of authorization to partake inthe BYOD privilege,suspension or expulsion from the company. References All work done on this assignment is solely the work of my own.